difference

Windows Registry Hacks

This document assumes working knowledge of the Windows Registry. It is possible to render your computer useless by incorrectly modifying the Registry. Caution is advised… Settings pertaining to Windows NT will say Win NT. All others refer to Win9x 1.    Remove unwanted items from Control Panel | Add/Remove programs 2.    Changing Icons for Desktop Items(…)

50 quick linux command tips part 3

1. How to know which ports are listening from your IP address? # nmap -sT -O your-ip-address 2. How to grep an exact match? # grep -w textfile.txt 3. How to reverse grep matches? # grep -v textfile.txt # 4. How to know which service name is what port? Assuming port 443 # cat testfile.txt(…)

How to Sync date and time via NTP server

Syncronizing your current date and time is as important as making database backups. Without proper accurate stamped date and time, any backup file with any stamped date on it would be meaningless. Without correct time and date, those scripts that depend on date and time schedule would be executed inaccurately and would give you result(…)

How to monitor large mailbox users

Monitoring mailbox users can be done in many serveral ways via web interface or via terminal or via bash scripts. With the usual mbox type emails, incoming new email messages are automatically redirected to each users’ own spool file. This spool mail is by default located and stored in /var/spool/mail. From there, the spool file(…)

How to block yahoo chat messenger

A very old tip and trick on blocking yahoo chat messenger from connecting to internet, as per request. Considering an approved management policies, there are several ways to block yahoo chat messenger from connecting to internet coming from inside your network, depending on what equipment and boxes you have on ground. If you happen to(…)

How to take Linux backups powered by Tar

This document entry however covers a foundation approach and mostly used tar arguments on backing up data using the linux command tar. ============================================= Data backup samples using Tar Linux command ============================================= A very simple usage of tar # tar cvf backup.tar * Legend: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -c create a new tar file -v verbose mode -f select(…)

How to take Linux backups powered by Rsync

RSync backups data and does it very clean and well. Rsync only transfers those data that have been modified and changed so that the destination host has an exact replica from the source host. Rysnc is a command line backup tool that handles data transfers in an effective and secure manner like any other known(…)

How to do MAC address packet filtering using IPTables

Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter, so, for example, the network cards (or built-in network adapters) in two different computers(…)

How to Install and use HTOP in Linux

This is HTOP, an interactive process viewer for Linux. It is a text-mode application (for console or X terminals) and requires ncurses. Tested with Linux 2.4 and 2.6. HTOP process viewer is not designed to replace the current well used linux ‘top’ command, but htop is an alternative with newly added and enhanced features that(…)

Nagios Monitoring – How to install and generic setup

A lot of powerful monitoring tools are freely available from linux world. One of them is Nagios. Nagios is a fairly complex linux monitoring tool that determines current status of target host or equipment. Two good things about Nagios is that Nagios supports web-enabled administration page and user view-only mode account. The other one is(…)