tag:blogger.com,1999:blog-47678263481313299322024-03-14T03:15:01.039+05:30System Administration/EngineeringHi all here you can find all the details about your Computer system related resourcesGanapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.comBlogger29125tag:blogger.com,1999:blog-4767826348131329932.post-84847796437798244072009-11-20T09:42:00.000+05:302009-11-20T09:43:29.979+05:30UNIX CoomandsStarting and Ending<br />login: `Logging in'<br />ssh: Connect to another machine<br />logout: `Logging out'<br /><br />--------------------------------------------------------------------------------<br /><br />File Management<br />emacs: `Using the emacs text editor'<br />mkdir: `Creating a directory'<br />cd: `Changing your current working directory'<br />ls: `Finding out what files you have'<br />cp: `Making a copy of a file'<br />mv: `Changing the name of a file'<br />rm: `Getting rid of unwanted files'<br />chmod: `Controlling access to your files'<br />cmp: Comparing two files<br />wc: Word, line, and character count<br />compress: Compress a file<br /><br />--------------------------------------------------------------------------------<br /><br />Communication<br />e-mail: `Sending and receiving electronic mail'<br />talk: Talk to another user<br />write: Write messages to another user<br />sftp: Secure file transfer protocol<br /><br />--------------------------------------------------------------------------------<br /><br />Information<br />man: Manual pages<br />quota -v: Finding out your available disk space quota<br />ical: `Using the Ical personal organizer'<br />finger: Getting information about a user<br />passwd: Changing your password<br />who: Finding out who's logged on<br /><br />--------------------------------------------------------------------------------<br /><br />Printing<br />lpr: `Printing'<br />lprm: Removing a print job<br />lpq: Checking the print queues<br /><br />--------------------------------------------------------------------------------<br /><br />Job control<br />ps: `Finding your processes'<br />kill: `Killing a process'<br />nohup: Continuing a job after logout<br />nice: Changing the priority of a job<br />&: `What is a background process?'<br />Cntrl-z: Suspending a process<br />fg: `Resuming a suspended process'Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-32177143932478421042009-11-20T09:38:00.000+05:302009-11-20T09:39:23.201+05:30Basic UNIX commandsFiles<br />ls --- lists your files <br />ls -l --- lists your files in 'long format', which contains lots of useful information, e.g. the exact size of the file, who owns the file and who has the right to look at it, and when it was last modified. <br />ls -a --- lists all files, including the ones whose filenames begin in a dot, which you do not always want to see. <br />There are many more options, for example to list files by size, by date, recursively etc. <br />more filename --- shows the first part of a file, just as much as will fit on one screen. Just hit the space bar to see more or q to quit. You can use /pattern to search for a pattern. <br />emacs filename --- is an editor that lets you create and edit a file. See the emacs page. <br />mv filename1 filename2 --- moves a file (i.e. gives it a different name, or moves it into a different directory (see below) <br />cp filename1 filename2 --- copies a file <br />rm filename --- removes a file. It is wise to use the option rm -i, which will ask you for confirmation before actually deleting anything. You can make this your default by making an alias in your .cshrc file. <br />diff filename1 filename2 --- compares files, and shows where they differ <br />wc filename --- tells you how many lines, words, and characters there are in a file <br />chmod options filename --- lets you change the read, write, and execute permissions on your files. The default is that only you can look at them and change them, but you may sometimes want to change these permissions. For example, chmod o+r filename will make the file readable for everyone, and chmod o-r filename will make it unreadable for others again. Note that for someone to be able to actually look at the file the directories it is in need to be at least executable. See help protection for more details. <br />File Compression <br />gzip filename --- compresses files, so that they take up much less space. Usually text files compress to about half their original size, but it depends very much on the size of the file and the nature of the contents. There are other tools for this purpose, too (e.g. compress), but gzip usually gives the highest compression rate. Gzip produces files with the ending '.gz' appended to the original filename. <br />gunzip filename --- uncompresses files compressed by gzip. <br />gzcat filename --- lets you look at a gzipped file without actually having to gunzip it (same as gunzip -c). You can even print it directly, using gzcat filename | lpr <br />printing <br />lpr filename --- print. Use the -P option to specify the printer name if you want to use a printer other than your default printer. For example, if you want to print double-sided, use 'lpr -Pvalkyr-d', or if you're at CSLI, you may want to use 'lpr -Pcord115-d'. See 'help printers' for more information about printers and their locations. <br />lpq --- check out the printer queue, e.g. to get the number needed for removal, or to see how many other files will be printed before yours will come out <br />lprm jobnumber --- remove something from the printer queue. You can find the job number by using lpq. Theoretically you also have to specify a printer name, but this isn't necessary as long as you use your default printer in the department. <br />genscript --- converts plain text files into postscript for printing, and gives you some options for formatting. Consider making an alias like alias ecop 'genscript -2 -r \!* | lpr -h -Pvalkyr' to print two pages on one piece of paper. <br />dvips filename --- print .dvi files (i.e. files produced by LaTeX). You can use dviselect to print only selected pages. See the LaTeX page for more information about how to save paper when printing drafts. <br />Directories<br />Directories, like folders on a Macintosh, are used to group files together in a hierarchical structure. <br />mkdir dirname --- make a new directory <br />cd dirname --- change directory. You basically 'go' to another directory, and you will see the files in that directory when you do 'ls'. You always start out in your 'home directory', and you can get back there by typing 'cd' without arguments. 'cd ..' will get you one level up from your current position. You don't have to walk along step by step - you can make big leaps or avoid walking around by specifying pathnames. <br />pwd --- tells you where you currently are. <br />Finding things<br />ff --- find files anywhere on the system. This can be extremely useful if you've forgotten in which directory you put a file, but do remember the name. In fact, if you use ff -p you don't even need the full name, just the beginning. This can also be useful for finding other things on the system, e.g. documentation. <br />grep string filename(s) --- looks for the string in the files. This can be useful a lot of purposes, e.g. finding the right file among many, figuring out which is the right version of something, and even doing serious corpus work. grep comes in several varieties (grep, egrep, and fgrep) and has a lot of very flexible options. Check out the man pages if this sounds good to you. <br />About other people<br />w --- tells you who's logged in, and what they're doing. Especially useful: the 'idle' part. This allows you to see whether they're actually sitting there typing away at their keyboards right at the moment. <br />who --- tells you who's logged on, and where they're coming from. Useful if you're looking for someone who's actually physically in the same building as you, or in some other particular location. <br />finger username --- gives you lots of information about that user, e.g. when they last read their mail and whether they're logged in. Often people put other practical information, such as phone numbers and addresses, in a file called .plan. This information is also displayed by 'finger'. <br />last -1 username --- tells you when the user last logged on and off and from where. Without any options, last will give you a list of everyone's logins. <br />talk username --- lets you have a (typed) conversation with another user <br />write username --- lets you exchange one-line messages with another user <br />elm --- lets you send e-mail messages to people around the world (and, of course, read them). It's not the only mailer you can use, but the one we recommend. See the elm page, and find out about the departmental mailing lists (which you can also find in /user/linguistics/helpfile). <br />About your (electronic) self<br />whoami --- returns your username. Sounds useless, but isn't. You may need to find out who it is who forgot to log out somewhere, and make sure *you* have logged out. <br />finger & .plan files <br />of course you can finger yourself, too. That can be useful e.g. as a quick check whether you got new mail. Try to create a useful .plan file soon. Look at other people's .plan files for ideas. The file needs to be readable for everyone in order to be visible through 'finger'. Do 'chmod a+r .plan' if necessary. You should realize that this information is accessible from anywhere in the world, not just to other people on turing. <br />passwd --- lets you change your password, which you should do regularly (at least once a year). See the LRB guide and/or look at help password. <br />ps -u yourusername --- lists your processes. Contains lots of information about them, including the process ID, which you need if you have to kill a process. Normally, when you have been kicked out of a dialin session or have otherwise managed to get yourself disconnected abruptly, this list will contain the processes you need to kill. Those may include the shell (tcsh or whatever you're using), and anything you were running, for example emacs or elm. Be careful not to kill your current shell - the one with the number closer to the one of the ps command you're currently running. But if it happens, don't panic. Just try again :) If you're using an X-display you may have to kill some X processes before you can start them again. These will show only when you use ps -efl, because they're root processes. <br />kill PID --- kills (ends) the processes with the ID you gave. This works only for your own processes, of course. Get the ID by using ps. If the process doesn't 'die' properly, use the option -9. But attempt without that option first, because it doesn't give the process a chance to finish possibly important business before dying. You may need to kill processes for example if your modem connection was interrupted and you didn't get logged out properly, which sometimes happens. <br />quota -v --- show what your disk quota is (i.e. how much space you have to store files), how much you're actually using, and in case you've exceeded your quota (which you'll be given an automatic warning about by the system) how much time you have left to sort them out (by deleting or gzipping some, or moving them to your own computer). <br />du filename --- shows the disk usage of the files and directories in filename (without argument the current directory is used). du -s gives only a total. <br />last yourusername --- lists your last logins. Can be a useful memory aid for when you were where, how long you've been working for, and keeping track of your phonebill if you're making a non-local phonecall for dialling in. <br />Connecting to the outside world<br />nn --- allows you to read news. It will first let you read the news local to turing, and then the remote news. If you want to read only the local or remote news, you can use nnl or nnr, respectively. To learn more about nn type nn, then \tty{:man}, then \tty{=.*}, then \tty{Z}, then hit the space bar to step through the manual. Or look at the man page. Or check out the hypertext nn FAQ - probably the easiest and most fun way to go. <br />rlogin hostname --- lets you connect to a remote host <br />telnet hostname --- also lets you connect to a remote host. Use rlogin whenever possible. <br />ftp hostname --- lets you download files from a remote host which is set up as an ftp-server. This is a common method for exchanging academic papers and drafts. If you need to make a paper of yours available in this way, you can (temporarily) put a copy in /user/ftp/pub/TMP. For more permanent solutions, ask Emma. The most important commands within ftp are get for getting files from the remote machine, and put for putting them there (mget and mput let you specify more than one file at once). Sounds straightforward, but be sure not to confuse the two, especially when your physical location doesn't correspond to the direction of the ftp connection you're making. ftp just overwrites files with the same filename. If you're transferring anything other than ASCII text, use binary mode. <br />lynx --- lets you browse the web from an ordinary terminal. Of course you can see only the text, not the pictures. You can type any URL as an argument to the G command. When you're doing this from any Stanford host you can leave out the .stanford.edu part of the URL when connecting to Stanford URLs. Type H at any time to learn more about lynx, and Q to exit. <br />Miscellaneous tools<br />webster word --- looks up the word in an electronic version of Webster's dictionary and returns the definition(s) <br />date --- shows the current date and time. <br />cal --- shows a calendar of the current month. Use e.g., 'cal 10 1995' to get that for October 95, or 'cal 1995' to get the whole year. <br />You can find out more about these commands by looking up their manpages: <br />man commandname --- shows you the manual page for the commandGanapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-62091633359106099572009-10-24T16:19:00.000+05:302009-10-24T16:21:29.487+05:30Sun VirtualBoxAt a Glance<br /><br /> * Enterprise-class open source virtualization from the desktop to the server<br /> * Handles massive workloads of up to 32 vCPUs<br /> * Share and publish appliances with other virtualization platforms<br /> * Runs multiple operating systems at once on one PC<br /> * Enables cross-platform, multi-tier applications<br /> * Supports the Solaris OS, OpenSolaris, Windows, Macintosh OS X, and Linux<br /> * Provides remote access to guest virtual machines from anywhere<br /> * Supports virtual server environments<br /> * Protects hardware investment<br /><br />See All Features<br />What's New<br /><br /> * Sun Microsystems Unveils VirtualBox 3.0 with Powerful New Server Virtualization Features<br /> * Take Windows 7 for a Spin with VirtualBox<br /> Computerworld's Vaughan-Nichols recommends fast and flexible VirtualBox for trying Windows 7 before deploying.<br /> * Illuminata Research Report: Sun's Virtualization Strategies<br /> Spotlights Sun's virtualization strategy and, in particular, VirtualBox and Sun virtualization software.<br /> * Blueprint: Optimizing the desktop using Sun VirtualBox<br /> Intro to Sun VirtualBox. Easily enable multiple virtual machines (VMs) on one desktop and access other operating systems in a native OS environment.<br /><br /><br /><br /><br /><object id="flashObj" width="486" height="322" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0"><param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9/1640183659?isVid=1&publisherID=1460825906" /><param name="bgcolor" value="#FFFFFF" /><param name="flashVars" value="videoId=1689589911&playerID=1640183659&domain=embed&" /><param name="base" value="http://admin.brightcove.com" /><param name="seamlesstabbing" value="false" /><param name="allowFullScreen" value="true" /><param name="swLiveConnect" value="true" /><param name="allowScriptAccess" value="always" /><embed src="http://c.brightcove.com/services/viewer/federated_f9/1640183659?isVid=1&publisherID=1460825906" bgcolor="#FFFFFF" flashVars="videoId=1689589911&playerID=1640183659&domain=embed&" base="http://admin.brightcove.com" name="flashObj" width="486" height="322" seamlesstabbing="false" type="application/x-shockwave-flash" allowFullScreen="true" swLiveConnect="true" allowScriptAccess="always" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash"></embed></object>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-21121662762900522112009-10-22T14:15:00.000+05:302009-10-22T14:16:44.107+05:304.6 C IDES installation procedure<span style="font-weight:bold;">4.6 C IDES installation procedure<br /><br />Below is the 4.6 C IDES installation procedure.<br /><br />Code<br /><br />On Drive C:<br /><br />1. Install Win2k server on<br />2. Install all drivers<br />3. Install IE6 SP1<br />4. Install Win2k SP4<br />5. Restart Computer<br /><br />1. Modify network settings to use IP addr 192.168.1.27, add IPX, add NetBIOS<br />2. Increase Virtual Memory<br />3. Optimize file cashed for network apps<br />4. Add 192.168.1.27 srv1 SAPTRANSHOST<br />5. Create User - C11adm; Assign administrator privileges<br />6. Restart<br />7. Update DLL's from Kernal CD<br />8. Login as c11adm and continue installation<br /><br />On Drive C:<br /><br />1. Install oracle server+when listener config window pops up choose "typical config"<br />2. Stop all oracle services<br />3. Install oracle 8.1.7.1 hot fix for server – Manually copy folders see readme.txt after extracting sap81701srv.exe<br />4. Give all users access to ora_dba<br />5. Restart, login as c11adm and continue installation.<br /><br />1. Install R3SETUP tool<br />2. Click R3SETUP.BAT on kernel CD (CD Drive:NTCommonR3setup.bat)<br />3. Install everything on drive E<br />4. logoff as per R3SETUP<br />5. logon as c11adm<br /><br />1. Install Central Instance<br />2. Start>Programs>SAP system setup – install central instance<br />3. System name: C11<br />4. Instance: 00<br />5. domain:<br />6. transport host: SAPTRANSHOST<br />7. DB sys name: C11<br />8. DB inst host: srv1<br />9. Dir for SAP system: E:<br />10. Defaults for remaining entries<br />11. Location of kernel D:<br />12. Password 2X<br />13. Password 2X<br />14. SAP System Management Console will show up on desktop<br />15. Restart computer; login as c11adm.<br /><br />1. Insert IDES CD1, copy D:IDESNTORADB_IDES.R3S to E:Usersc11admInstall.<br />2. Start>Programs>SAP System>Command file editor<br />3. Load DB_IDES.R3S, click install.<br />4. At 89% they will request a password for 'sapr3' pass word is 'sap'<br />5. At 94% you may need to start SAP in you SAPMMC then start the install up again<br />6. Import DOKCLUTX.EXT into database per IDES installation manual.<br /><br />1. Once installation is complete upload SAP service packs<br />2. configure transports transaction ostms<br />3. Apply the latest SPAM/SAINT update<br />4. Apply service packs using transaction SPAM<br /><br />Configure Transport Management System<br /><br />Login as User DDIC<br />Password 19920706<br />/ostms<br />click on button transport routes (shift + F7)<br /><br />Under Configuration status<br />Click on C11 (it is yellow)<br />Click on green check to activate it. </span>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-16339473813386135532009-10-13T01:32:00.003+05:302010-03-15T13:15:12.348+05:30CISCO 2801 Router - Integrated Services for Small and Medium Business<table border="0" cellpadding="0" cellspacing="0"><tbody><tr><td style="font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; font-size: inherit; line-height: inherit; font-size-adjust: inherit; font-stretch: inherit;" valign="top"><div>Key Features of the Cisco 2801 Integrated Services Router:</div><!--begin security--> <ul class="bulleted"> <li class="last-li">Mid/High-Density, High Performance Services <ul class="bulleted"> <li>Security: On-board encryption, up to 800 VPN tunnels (AIM); IOS FW, NAC, IPS, or Content Security</li> <li>Voice: Mid/High-density analog/digital voice with IP Telephony, Voice Mail; CallManager Express or Survivable Remote Site Telephony support for up to 24 IP phones</li></ul><!--end security--> </li><li>High-performance concurrent security, voice and advanced services to multiple T1/E1 WAN rates</li> <li>Integrated Dual 10/100 ports</li> <li>Optional integration of L2 switching with PoE</li> <li>Enhanced Modularity and Investment Protection</li> <li>Flexible expansion ( 2 HWIC slots), additional concurrent services</li> <li>Existing WIC/VIC/VWIC, AIM support</li> <li>Scalable services deployment and availability features</li><br /><br /></ul></td></tr></tbody></table><br /> <!--3--><hr size="1">Details Provided By <a href="http://www.geeztech.com">Geez Technologies </a>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-82283168125368922862009-10-13T01:06:00.002+05:302009-10-13T01:23:13.274+05:30CISCO Router commandsRouter commands<br />Usermode Commands<br />Sl. No. Command Comments, if any.<br />1 disconnect Terminates the suspended telnet session and then logout it. <br />2 enable <br />3 ping <host-name> Used to tests the connectivity.It uses ICMP to initiate the connection.<br />4 ping <ip-address> <br />5 traceroute <hostname> Lists all routers along path to destination and finds the routing problems if any.<br />6 traceroute <ip-address> <br /> <br />Privilegemode Commands<br />Sl. No. Command Comments, if any.<br />1 clear arp-cache <br />2 configure terminal Allows to execute commands that change the router's configuration. <br />3 copy running-config startup-config It saves the active configuration of the router.<br />4 copy startup-config running-config <br />5 debug ip packet <br />6 disable Returns to the UserEXEC mode from Privilege mode.<br />7 disconnect <TELNET_ID> <br />8 erase startup-config Deletes all the configuration files present on a router. <br />9 logout It exits router from the user or privilege mode.<br />10 ping <host-name> Used to tests the connectivity.It uses ICMP to initiate the connection.<br />11 ping <ip-address> <br />12 reload <br />13 resume <TELNET_ID> <br />14 show access-list Displays all accesslists from all protocols present in a specified router.<br />15 show banner <br />16 show cdp Shows the status of CDP such as holdtime value,no.of packets for every 60sec.<br />17 show cdp interface It tells the CDP configuration on an interface-by-interface basis.<br />18 show cdp neighbor <br />19 show cdp traffic <br />20 show clock <br />21 show flash Used to view all IOS images and file stored in flash(Default location of IOS images is in flash).<br />22 show frame-relay lmi Shows the detailed statistics regarding LMI. <br />23 show frame-relay map <br />24 show frame-relay pvc <dlci_num> Shows all the frame relay PVC's terminated and their statistics at a specified router. <br />25 show history Shows the previously executed commands.IOS device stores the last ten commands that are executed. <br />26 show hosts <br />27 show interfaces To view interfaces,status,and statistics for an interface.If u don't lists a specific interface,all of the interfaces on the router are listed.<br />28 show interfaces ethernet 0 <br />29 show interfaces loopback 0 <br />30 show interfaces serial 0 displays the lmi type that is being used and also sme LMI statisstics. <br />31 show ip arp <br />32 show ip eigrp neighbors Shows the list of eigrp neighbors that a specified router has. <br />33 show ip eigrp neighbors detail <br />34 show ip eigrp topology Displays the list of successor and feasible successors,as well as other types of routes. <br />35 show ip eigrp traffic It shows the information about trafiic statistics for eigrp <br />36 show ip interface <br />37 show ip interface brief Verifies the IP configuration. <br />38 show ip ospf database <br />39 show ip ospf interface <br />40 show ip ospf neighbor detail <br />41 show ip route Verifies the configurationof static and default routes on a router. <br />42 show protocols Displays the routing protocols that have been configured and running on a specified router. <br />43 show running-config <br />44 show sessions shows the telnet sessions that are currently suspended. <br />45 show startup-config <br />46 show version Display version information for the hardware and firmware. <br />47 telnet <host-name> <br />48 telnet <IP-address> <br />49 traceroute <hostname> <br />50 traceroute <ip-address> Lists all routers along path to destination and finds the routing problems if any.<br />51 vlan database Used to access all VLAN and VTP configuration. <br />52 write erase <br />53 write memory <br />54 write terminal <br /> <br />Global configuration mode Commands<br />Sl. No. Command Comments, if any.<br />1 access-list <list-num> {permit | deny} <source-ip-address> Only standard access list of the format given is supported.<br />2 access-list <list-num> {permit | deny} <any> <br />3 access-list <list-num> {permit | deny} <ip-address> <ip-address> <br />4 access-list <list-num> {permit | deny} <host-name> <ip-address> <br />5 banner motd <banner> It creates the login banner on a specified router. <br />6 cdp advertise-v2 <br />7 cdp holdtime <seconds> <br />8 cdp run <br />9 cdp timer <seconds> <br />10 config-register <value> Hexadecimal or decimal value that represents the 16-bit configuration register value. It is used at the router start-up. The value range is from 0x0 to 0xFFFF (0 to 65535 in decimal). Normally, the default value is 0x2102<br />11 dialer-list<list-num>protocol ip permit <br />12 enable password <password> Sets the paasword.The level number is either 1 or 15. <br />13 enable secret <password> Encrypts the password when it is saved. <br />14 end <br />15 hostname <host-name> <br />16 interface ethernet 0 Used to access ethernet interface and enter Interface subconfiguration mode. <br />17 interface fastethernet <pnum> <br />18 interface loopback 0 Used to create loopback interface.Port numbers can specify between 0 to 2147483647.<br />19 interface serial 0 <br />20 interface vlan <vlan_num> <br />21 ip default-gateway <ip-address> Tells the router which router to use when the router needs to reach the destination thats not in its configured subnet. <br />22 ip default-network <ip-address> <br />23 ip domain-lookup <br />24 ip host <name> <ip-address> Complete syntax for this command: ip host name [tcp-port-number] address1 [address2...address8]<br />25 ip name-server<ip-address> By using this Router access the DNS server to resolve the names to ip addresses. <br />26 ip route <prefix> <mask> {next-hop-ip-addr | interface-type} The command supported by the simulator are:<br />ip route <prefix> <mask> <next-hop-ip> and<br />ip route <prefix> <mask> serial <br />27 ip route 0.0.0.0 0.0.0.0 <ip-address> <br />28 ip route<ip-address> <ip-address> <ip-address> <br />29 ip route <ip-address> <ip-address> serial 0 Not supported at this time<br />30 ip routing <br />31 ipx routing <br />32 isdn switch-type <switch_type> <br />33 line aux <br />34 line console 0 To enter into console interface.Here 0 specifies the console part. <br />35 line vty It supports 16 simultaneous telnet connections and each connection is internally tracked by a number:0-15. <br />36 no banner motd <br />37 no cdp run It can globally enable or disable the cdp on a router. <br />38 no ip domain-lookup It disables all the DNS lookups on the router. <br />39 no ip routing <br />40 no router eigrp <br />41 no router ospf <br />42 no router rip <br />43 no vlan <vlan_num> <br />44 router eigrp <aut_sys> <br />45 router ospf <proc_id> Process_id is locally significant and is used to differentiate different ospf processes running on a router. <br />46 router rip Enters into the RIP routing protocol configuration mode. <br />47 snmp-server enable traps vtp <br />48 username <name> password <password> <br /> <br /> <br />Interface subconfiguration mode Commands<br />Sl. No. Command Comments, if any.<br />1 bandwidth <kilobits> Required bandwidth, in kilobits per second.<br />2 cdp enable <br />3 clock rate <bps> Desired clock rate in bits per second: 1200, 2400, 4800, 9600, 19200, 38400, 56000, 64000 etc.<br />4 compress stac <num> in <br />5 description <string> Character string from 1 to 80 characters.<br />6 dialer-group<dialer_list_#> <br />7 dialer map ip <ip-address> <des-phone> <br />8 dialer map ip <ip-address> name <hostname> <des-phone> <br />9 dialer string< phone_#> <class map_name> <br />10 encapsulation <encapsulation-type> Only PPP/HDLC are supported at this time by the simulator.<br />ex: encapsulation hdlc<br />11 encapsulation framerelay<num> in <br />12 frame-relay lmi-type <lmi_type> Specifies the LMI type that is used to communicate between a router and carrier's switch.LMI type is specific to the entire interface,not to a VC. <br />13 frame-relay map<protocol-name> <ip-address> <dlci_num> It configures the manual resolution of PVC's.<br />14 frame-relay map<protocol-name> <ip-address> <dlci_num> broadcast <br />15 frame-relay map<protocol-name> <ip-address> <dlci_num> broadcast cisco <br />16 frame-relay map<protocol-name> <ip-address> <dlci_num> broadcast ietf <br />17 frame-relay map<protocol-name> <ip-address> <dlci_num> cisco <br />18 frame-relay map<protocol-name> <ip-address> <dlci_num> ietf <br />19 ip access-group <num> in <br />20 ip access-group <num> out <br />21 ip address <ip-address> <sub-net mask> <br />22 isdn spid1<spid_num> Defines the spid's that are used to authenticate call requests.Used only on local connection between router and isdn switch. <br />23 isdn spid2<spid_num> <br />24 keepalive <seconds> <br />25 login <br />26 no bandwidth <br />27 no cdp enable <br />28 no clock rate <br />29 no frame map <protocol name> <ip-address> <dlci_num> <br />30 no frame map<protocol-name> <ip-address> <dlci_num> broadcast <br />31 no frame map<protocol-name> <ip-address> <dlci_num> cisco <br />32 no frame map<protocol-name> <ip-address> <dlci_num> ietf <br />33 no ip address <br />34 no shutdown <br />35 shutdown It disable the interfaces.Interfaces are enabled by default. <br />36 shutdown switchport <br />37 speed <br />38 switchport access vlan <vlan_num> <br />39 switchport port-security mac-address sticky<mac_addr> <br />40 switchport port-security maximum <max_macadd> <br />41 switchport port-security violation <violat_mode> <br /> <br />Line subconfiguration mode Commands<br />Sl. No. Command Comments, if any.<br />1 exec-timeout <minutes> [seconds] seconds is optional. <br />2 logging synchronous <br />3 password <password> <br /> <br />Subinterface Subconfiguration mode Commands<br />Sl. No. Command Comments, if any.<br />1 discription<string> It specifies the DLCI number.Uses a dynamic resolution with inverse ARP. <br />2 frame-relay interface-dlci<dlci_num> It specifies the DLCI number.Uses a dynamic resolution with inverse ARP. <br />3 frame-relay map<protocol-name> <ip-address> <dlci_num> <br />4 frame-relay map<protocol-name> <ip-address> <dlci_num> broadcast <br />5 frame-relay map<protocol-name> <ip-address> <dlci_num> broadcast cisco <br />6 frame-relay map<protocol-name> <ip-address> <dlci_num> broadcast ietf <br />7 frame-relay map<protocol-name> <ip-address> <dlci_num> cisco <br />8 frame-relay map<protocol-name> <ip-address> <dlci_num> ietf <br />9 ip address<ip-address> <subnet-mask> <br />10 no ip address <br />11 no shutdown It specifies the DLCI number.Uses a dynamic resolution with inverse ARP. <br />12 shutdown It specifies the DLCI number.Uses a dynamic resolution with inverse ARP. <br /> <br />IP Routing Protocol Subconfiguration mode Commands<br />Sl. No. Command Comments, if any.<br />1 network <ip-address> Used with routing rip, igrp etc.<br /> <br />User mode Commands <br /> <br />Supported Switch Commands<br /> <br />Sl.No. commands Comments, if any.<br />1 enable <br /> <br />Privilegemode Commands <br />Sl.No. commands Comments, if any.<br />1 clock set hh:mm:ss <1-31> Month <2004-2035> <br />2 configure terminal Allows to execute commands that change the switch's configuration. <br />3 copy running-config startup-config It saves the active configuration of the switch. <br />4 copy startup-config running-config <br />5 disable Returns to the UserEXEC mode from Privilege mode.<br />6 erase startup-config <br />7 logout It exits switch from the user or privilege mode.<br />8 reload <br />9 show banner <br />10 show flash Used to view all IOS images and file stored in flash(Default location of IOS images is in flash).<br />11 show history <br />12 show interfaces To view interfaces,status,and statistics for an interface.If u don't lists a specific interface,all of the interfaces on the switch are listed.<br />13 show ip interface brief Verifies the IP configuration. <br />14 show running-config It examine the active configuration on a switch. <br />15 show startup-config <br />16 show version Display version information for the hardware and firmware<br /><br /> <br />Global Configuration mode Commands <br />Sl.No. commands Comments, if any.<br />1 banner motd <phrase> It creates the login banner on a specified router. <br />2 cdp advertise-v2 <br />3 cdp holdtime <seconds> <br />4 cdp run <br />5 cdp timer <seconds> <br />6 enable password <password> It sets the paasword.The level number is either 1 or 15. <br />7 enable secret <secret> Encrypts the password when it is saved. <br />8 end <br />9 hostname <name> <br />10 ip default-gateway <ip-address> Tells the switch which router or switch have to use when the switch needs to reach the destination thats not in its configured subnet. <br />11 ip host<hostname> <ip-address> <br />12 interface fastethernet <0-0>/<0-24> Depends on the switch type. For module 0, port 1 the command is interface fastethernet 0/1<br />13 interface vlan <vlan #> You can enter interface config mode.<br />example: interface vlan 1<br />(config-if)#ip address 192.168.10.1 255.255.255.0<br />14 line console 0 <br />15 line vty 0 15 <br />16 mac-address-table static <mac-address> vlan <valn_num> interface fastethernet <pnum> <br />17 snmp-server enable traps vtp <br />18 speed <speed> Enter switch port speed 10,100, auto. <br /><br /> <br />Interface Subconfiguration mode Commands <br />Sl.No. commands Comments, if any.<br />1 description <phrase> <br />2 duplex <duplex-type> <br />3 ip address <ip-address> <subnet mask> A switch can have one IP address. The IP address of the switch can be accessed only through ports that belong to the management VLAN. <br />4 ip name-server <ip-address> <br />5 login <br />6 no ip address <br />7 no shutdown It reenables the interface when the interface is disabled.By default interfaces are enabled. <br />8 no switchport <port_security> <br />9 shutdown Disables a port and shuts-down management vlan. no shutdown command enables a port.<br /><br /> <br />Line Subconfiguration mode Commands <br />Sl.No. commands Comments, if any.<br />1 password <password> <br /><br /> <br /> <br />Vlan mode Commands <br />Sl.No. commands Comments, if any.<br />1 vlan<vlan_num> VLAN numbers can range 1-1000,However only 64VLANs can be active ata time. <br />2 vtp client Specifies the VTP mode of the switch. <br />3 vtp domain Defines the domain name for a specified switch.For switches to share VTP informtion they must be in the same domain. <br />4 vtp password <br />5 vtp pruning <br />6 vtp server <br />7 vtp transparent <br /><br /> <br />Workstation Commands<br />Sl. No. Command Comments, if any.<br />1 ip address <ip-address> <subnet-mask> <br />2 ping <ip-address> <br />3 ping <hostname> <br />4 telnet <host-name> <br />5 telnet <ip-address> <br />6 traceroute <hostname> <br />7 traceroute <ip-address>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-77223568763475380012009-10-09T11:20:00.005+05:302009-10-13T01:23:13.275+05:30Windows Server 2003 to act as a NAT routerIP addresses were handed out to companies on an indiscriminant basis. As the popularity of the Internet increased, IP addresses soon grew to be a scarce commodity. Internet service providers began to strictly limit the number of IP addresses that they would lease to companies. This presented an interesting challenge. A PC has to have an IP address in order to communicate with the Internet, but there weren’t enough IP addresses left for every PC to be given one. The solution to this problem was a technology called Network Address Translation (NAT). Today, NAT is alive and well, and more popular than ever. In this article, I will explain what NAT is and how you can configure Windows Server 2003 to act as a NAT router.<br /><br />So what is NAT? Network Address Translation, or NAT, is a technology that uses a router to share an Internet connection among the PCs on your private network, even though those PCs do not have a valid public IP address. There are both hardware and software NAT routers. In this particular situation, we will be configuring a Windows Server 2003 machine to act as a software based NAT router. <br />As you probably know, a router’s primary purpose is to regulate traffic flow between two networks, and a NAT router is no exception. The server that you will use as a NAT router must have two network interface cards (NICs) installed. One of these NICs will connect to the Internet and the other will connect to the private network. PCs on the private network will then send HTTP requests to the NAT server via the server’s private network connection. The server will then retransmit the request over the Internet on behalf of the client. When the requested Web site responds, the response is sent to the NAT server, which in turn forwards it to the client who made the original request. The client never communicates across the Internet directly.<br />IP Addressing Considerations<br />As I explained in the section above, a NAT router acts as a gateway between your private network and the Internet. The server that is acting as the NAT router must have two NICs. One of the NICs is connected to the Internet. This NIC must be assigned the IP address that was given to you by your Internet Service Provider.<br />The other NIC connects to your private network. As I mentioned, NAT does not expect you to have valid IP addresses on your private network. Instead, you are basically free to pick an address range at random. There is the off chance that the range that you pick might already be in use by a popular Web site, but I have only seen someone pick an address range that caused problems once. If you want to use an address range that is guaranteed not to interfere with anything on the Internet, you can use the 192.168.x.x address range. <br />After you pick an address range, I recommend setting up a DHCP server so that it will assign addresses from your chosen address range (the DHCP term for an address range is a scope) to the workstations on your network. You must however statically assign an address to the NIC on the NAT server that connects to your private network. For example, if you chose to use the address range 192.168.1.0 to 192.168.1.99, then you might consider assigning the address 192.168.1.0 to the NAT server. You could then use the 192.168.1.1 to 192.168.1.99 address block as your DHCP scope.<br />While you are configuring your DHCP server, there are a couple of other considerations that you need to make. As you may know, DHCP allows you to optionally assign a default gateway and a DNS server to workstations along with an IP address. When doing so, you must set the default gateway address to match the private network address that you assigned to your NAT server.<br />You have a few different options when choosing which DNS server address the DHCP server should assign to the workstations on your network. If you don’t have your own DNS server, then the best thing that you can do is to just use the IP address of your Internet service provider’s DNS server. If your network is running Active Directory though, then you already have a DNS server and you should use its address. It doesn’t matter if your DNS server is authoritative for your domain or not. Simply point the workstations to it. You can then set up a forwarder on the DNS Server so that any unresolved queries get forwarded to your ISP’s DNS server. <br />The advantage to pointing clients to your own DNS server rather than to your ISP’s DNS server is that doing so will provide your users with better performance. Your DNS server is local, so queries reach the server more quickly than they would reach a remote server. Furthermore, your DNS server has a built in cache so that popular Web sites do not have to be resolved each time a user visits them.<br />Setting Up NAT<br />Begin by selecting the Routing and Remote Access command from Windows’ Administrative Tools menu. When you do, Windows will display the Routing and Remote Access console. Locate your server (just below the Server Status). There should be a big red dot to the left of the server, indicating that the server is currently inactive. Now, right click on the server and select the Configure and Enable Routing and Remote Access command from the resulting shortcut menu. When you do, Windows will launch the Routing and Remote Access Server Setup Wizard.<br />Click Next to bypass the wizard’s Welcome screen. You will now see a screen that’s similar to the one that’s shown in Figure A. This screen allows you to select various configurations for Routing and Remote Access (RRAS). RRAS can be configured to do just about anything that you want, but Microsoft has included several templates to make the configuration process easier for common deployment types. Select the Network Address Translation (NAT) option and click Next.<br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPj8Ql0W_OntrSNKceeFDnPyo8u-M3ZIe0069SNvzh6bl5JrKgRXKHkfazWEsmsqQhBfk8NCQzJ2BHJ0spQ1DzaF4Bia65DDpECcyvzjvjnIqr28xu31gdr8q4A3UnqTB2CVL126hjioQJ/s1600-h/Windows+Server+2003+to+act+as+a+NAT+router1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 325px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPj8Ql0W_OntrSNKceeFDnPyo8u-M3ZIe0069SNvzh6bl5JrKgRXKHkfazWEsmsqQhBfk8NCQzJ2BHJ0spQ1DzaF4Bia65DDpECcyvzjvjnIqr28xu31gdr8q4A3UnqTB2CVL126hjioQJ/s400/Windows+Server+2003+to+act+as+a+NAT+router1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390484859232612450" /></a><br />Figure 1: Select the Network Address Translation (NAT) option and click Next<br />The next screen that you will see, shown in Figure B, is a rather important one to pay attention to. The screen gives you the choice of selecting a network interface that is connected to the external network (usually the Internet) or to select a demand dial interface. In case you are wondering, demand dial is a feature that allows Windows to establish a dial-up connection when ever external connectivity is needed. For the purpose of this article, I am assuming that you have a broadband connection to the Internet. Additionally, I am assuming that the NIC that the broadband connection comes in through has a static IP address assigned to it. You will have to select that network interface.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7mh3UUDfwEEQeMDTWm-JICEk-vUjT73ZJdLmcy8xiMa2yQ-UcSOz8nQ-INga9tiV1GVojG3fdD0Zm1XG9a4uSWmUzJyehsuA1mGARA5fn2yRHUbIJCUIc9zXjgnVR3x-cHxFrhK21BK-h/s1600-h/Windows+Server+2003+to+act+as+a+NAT+router2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 325px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7mh3UUDfwEEQeMDTWm-JICEk-vUjT73ZJdLmcy8xiMa2yQ-UcSOz8nQ-INga9tiV1GVojG3fdD0Zm1XG9a4uSWmUzJyehsuA1mGARA5fn2yRHUbIJCUIc9zXjgnVR3x-cHxFrhK21BK-h/s400/Windows+Server+2003+to+act+as+a+NAT+router2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390474550974509538" /></a> <br />Figure 2: Select the NIC that connects the server to the outside world<br />Before you click Next, you should notice that there is a check box that allows you to enable a firewall for the connection. I recommend always selecting this option. The firewall will keep unwanted traffic out of your network. If you need to grant external users access to some service on your network, you have the option of configuring port forwarding to pass packets through the firewall to the desired network resource.<br />After you enable the RRAS firewall, click Next and you will see a screen asking you to select the network that will have shared Internet access. Although the dialog box uses some weird wording, it is basically just asking you to select the NIC that is attached to your private network. Make your selection, and click Next, followed by Finish to complete the process.<br />Conclusion<br />In this article, I have explained how you can use a NAT server as a way of sharing an Internet connection among the users on your network. I then went on to explain how IP addressing should be configured and how to configure RRAS to act as a NAT router.Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-79015815052911870422009-10-09T11:05:00.007+05:302009-10-13T01:23:13.276+05:30Designing Group Policy in an Active Directory environmentIf you’ve implemented your sites, domains and OUs in the wrong way, Group Policy will be difficult to use and troubleshoot. So the first step in planning how you’re going to implement Group Policy on your network is to plan how you’re going to implement Active Directory itself. Such planning includes decisions like: How many forests you will deploy (one or several)? How many domain trees? Will there be child domains? What kind of OU structure will each domain have? And so on. Each of these decisions should always be made by asking the question: What impact will my decision have on how Group Policy is implemented in my enterprise? Let’s look at some guidelines that can help you design Active Directory effectively as far as Group Policy is concerned. <br />K.I.S.S.<br />The first and obvious principle is to “Keep It Simple, Stupid!” or “K.I.S.S.” In the context of Group Policy planning, this means two things:<br />If a single domain will meet all your company’s needs, then use only one domain. The reason simply is that the number of Group Policy Objects (GPOs) you will need to create is roughly proportional to the number of domains you have in your forest. For while linking a GPO residing in one domain to a container (domain, site or OU) in a different domain does reduce the total number of GPOs you need to deploy, it can have a significant performance impact and shouldn’t generally be done. <br />Keep your OU structure relatively simple, for example two or three levels of OUs at most. The reason is similar here to why you should keep your number of domains as low as possible: administrative overhead. <br />So let’s say you begin your Active Directory design by deciding you’re going to us a single domain (see Figure 1) with two or maybe three levels of OUs within it. That’s a good place to start. What’s next?<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUtXO2SWjI0BhhAa54UJNNCO1THkXfAx97oC8DBBzXN2FsNtVmxNibhxmg3wCah_nhC4Oy7Fk_8WmUsJf0Zk5u51-al947wGxaIzR3Lcnmv8athxRyAGzm_9HunPM5_X3YLLAh6GV7PQnb/s1600-h/Windows+Active+Directory.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 306px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUtXO2SWjI0BhhAa54UJNNCO1THkXfAx97oC8DBBzXN2FsNtVmxNibhxmg3wCah_nhC4Oy7Fk_8WmUsJf0Zk5u51-al947wGxaIzR3Lcnmv8athxRyAGzm_9HunPM5_X3YLLAh6GV7PQnb/s400/Windows+Active+Directory.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390471762111082962" /></a> <br />Figure 1: Have only one domain if possible<br />Server OUs<br />Group Policy isn’t just for managing desktops; it’s also terrific for locking down servers to ensure they’re secure and working properly. And by servers I mean both member servers (which include file servers, print servers, web servers, DHCP servers, and so on) and domain controllers. The best way to lock down domain controllers is to leave them in the default Domain Controllers OU and configure a GPO linked to that OU. There are two ways you can do this:<br />Configure the settings in the Default Domain Controllers Policy. <br />Create a new GPO, link it to the Domain Controllers OU, and configure it. <br />Which approach is better? Some experts recommend leaving the default GPO untouched and creating a new GPO and moving it to the top of the link order for GPOs linked to the OU. That way if something goes wrong later you at least have your default GPO in place and untouched. On the other hand, if you run the new Security Configuration Wizard (SCW) of Windows Server 2003 Service Pack 1 on a domain controller, then in addition to other changes it will modify certain settings in the Default Domain Controllers Policy to make your domain controller more secure. So either approach works fine, but personally I prefer the second approach. <br />What about your member servers? The trick here is to realize that the different member server roles are basically incrementally different from a baseline (having no role) member server. So a good approach is to create a top-level Member Servers OU and then beneath it add additional OUs for each role (Figure 2):<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGXEMl2nY2IjwAKj_JiVOE_ZRCQnS1CEWNppZxwnQxO33aYHnts2CUzp6mGcyaCde-Uwa4knneOS5F3JSo7f692UZJefI7R1esOMaxgV3w3guUxFd5AcunPU976Mf4ygiushiJDWPhicle/s1600-h/Windows+Active+Directory2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 306px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGXEMl2nY2IjwAKj_JiVOE_ZRCQnS1CEWNppZxwnQxO33aYHnts2CUzp6mGcyaCde-Uwa4knneOS5F3JSo7f692UZJefI7R1esOMaxgV3w3guUxFd5AcunPU976Mf4ygiushiJDWPhicle/s400/Windows+Active+Directory2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390471955414952642" /></a> <br />Figure 2: OU structure for member servers. <br />The advantage of this approach is that you can now create a baseline Member Servers GPO that generally secures any member server and link it to the Member Servers OU. That way all of the member servers in child OUs will automatically inherit this policy. Then you can create a Print Servers GPO and link it to the Print Servers OU, a File Servers GPO and link it to the File Servers OU, and so on. These different GPOs linked to child OUs of the Member Server OU can be used to incrementally harden security for each server role over the basic hardening provided by the Member Servers GPO. <br />Here’s a tip: if you want to find out more about using the above approach to harden servers using Group Policy, read the Windows Server 2003 Security Guide which is available from the Microsoft Download Center. This Guide has terrific suggestions on how to secure different server roles and it’s well worth plowing through its almost 300 pages of content. If you don’t have time to read the whole Guide, check out my blog ITreader.net and click Group Policy under Topics and you’ll find lots of useful information that I’ve culled from my own reading of the Guide as well as other Microsoft resources. <br />Desktop and User OUs<br />The OU structure you plan for your domain can depend on various things including your company org chart, branch offices, number of departments, and so on. There’s no hard and fast single best way of designing OUs for a domain, but the following tips can help you avoid problems later on when you start creating GPOs to lock down users and their desktop computers. <br />First off, you should only create an OU if there is some compelling reason for it to exist. For example, if users in the Sales, Marketing, and Reference departments all have similar needs as far as security goes, group their accounts into a single OU instead of three. Then if Sales users have some minor difference in security requirements from the other two departments, you can create and link another GPO to the OU and use security filtering to ensure only members of the Sales group have that GPO setting applied to them. <br />Next, you should try to create your OUs along departmental lines rather than geographical location. That way you can make more effective use of delegation when you need to use it. If you must have geographical OUs, make them the top-level OUs and then create child OUs beneath them for each division or department (Figure 3):<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIaUyHZGUwmNn3e-fY_JZxqfkA7pEb94fazS_XkEX1FYoRHbsx9RoZq-5r0rAZtB-ovsvCGtovynObTdqE6Q_UaIcqxBxHC4gKxxAHu9-Lt1m-mBsOoWzuBzeaxJJi3LZTdGdKNcUt3AjW/s1600-h/Windows+Active+Directory3.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 306px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIaUyHZGUwmNn3e-fY_JZxqfkA7pEb94fazS_XkEX1FYoRHbsx9RoZq-5r0rAZtB-ovsvCGtovynObTdqE6Q_UaIcqxBxHC4gKxxAHu9-Lt1m-mBsOoWzuBzeaxJJi3LZTdGdKNcUt3AjW/s400/Windows+Active+Directory3.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390472509426197042" /></a> <br />Figure 3: A typical OU structure. <br />Next, create separate OUs for computer accounts and user accounts (Figure 4). That way you can use separate OUs to lock down machine settings and user settings. Of course, you could achieve the same thing by lumping together computer and user accounts into a single OU, linking two GPOs to that OU, and disabling the machine settings in one OU and the user settings in the other OU. But keeping your computer and user accounts in separate OUs will make it easier for you to troubleshoot when Group Policy doesn’t do what you expected, and it makes mistakes in configuring policy less likely also. <br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDyugSnQG6JCm6MceDgCiBJCGEp6wbEvZ5DroHw5Ihpd38cZp4QRhHxzcy5t95buchOKxQ1Zwp5Ir8KpsRXmS01Wer6LhalwKpEDA3xwzq9XxCNlm0RF3yQKJKW69cvOXX19ntl6Qsm3fj/s1600-h/Windows+Active+Directory4.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 306px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDyugSnQG6JCm6MceDgCiBJCGEp6wbEvZ5DroHw5Ihpd38cZp4QRhHxzcy5t95buchOKxQ1Zwp5Ir8KpsRXmS01Wer6LhalwKpEDA3xwzq9XxCNlm0RF3yQKJKW69cvOXX19ntl6Qsm3fj/s400/Windows+Active+Directory4.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390472691211232290" /></a> <br />Figure 4: Use separate OUs for computer and user accounts. <br />Also, try to avoid using Blocking, Enforced, Loopback, and other ways of modifying the default Group Policy inheritance order. That’s because using these features can make it really hard to troubleshoot why Group Policy isn’t doing what you intend it to do. If you find you absolutely must use these features in your Group Policy design, you probably haven’t designed your Active Directory structure very well. The one exception to this rule is security filtering, which is a powerful tool that can help make GPO targeting more accurate without complicating the design. I’ll cover security filtering in a future article on WindowsNetworking.com. <br />Finally, avoid making changes to the Default Domain Policy. Instead, create a new GPO, link it to the domain, and configure its settings as needed. But be very careful what you configure in any GPO linked to a domain because any settings you configure will be inherited by all computer and user accounts in all OUs in the domain. So the moral is, wherever possible configure policy at the OU level and not at the domain level, and use domain GPOs only for configuring account policy for the domain.Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-4459238730124357132009-10-09T11:02:00.001+05:302009-10-13T01:23:13.277+05:30Windows 2003: Data Backup and RecoveryThe loss of data can bring an enterprise down – be it for a few hours, days, or even weeks. For smaller businesses, data loss can be devastating. For home users, it can be heart-breaking and utterly annoying. Whatever brings about data loss is bound to cause an organization to suffer – not only from the loss of the data itself but from loss in employee productivity during the time it takes to restore information from a backup set. Having said this, it becomes clear that backup is, without a doubt, one of the most significant aspects of a business continuity plan. <br />Essentially the term “backup” means a duplicate copy of key information, both physical (paper) and computer records. An organization must create a decent set of backup procedures to ensure that data is protected, and then follow them to a Tee. <br />Vital paper records that should be stored safely include tax records, financial statements, contracts, personnel information, and corporate documents. Data that should be backed up regularly includes, but is not limited to, e-mail correspondence, audit files, user information, utilities and applications, operating systems, financial data and databases, as well as customer lists. Ideally every byte of data on every system in an organization would be backed up every night. In today’s world this is not a realistic possibility – due to a lack of time and resources. These days, you are obliged to choose what will or won’t be backed up, based on the importance of the data.<br />Planning for Backup and Recovery<br />When planning for backup and recovery, you must ask yourself a number of questions to help you make a decision on how, when and what data will be backed up. These include the following:<br />When is the most convenient time to schedule backups?<br />Backing up data should ideally be done at off-peak hours when system usage is low. However, due to the type of data being backed up this is not always possible. Considerations must be made as to when key system data is to be backed up.<br />Will you store backups off-site?<br />It is highly recommended that backup media (containing data) is stored off-site in case of a natural disaster, fire, leak, etc. It would also be wise to keep a copy of the software required to install and restore operating systems, database servers, backup recovery, and so on.<br />How important is the data your systems contain?<br />Classifying the importance of your data will help you decide if the data needs to be backed up, how it should be backed up and when it should be backed up. Critical data (such as financial data, databases, etc) will take priority and should have a long-term redundant backup set, whereas data of less importance should be backed up daily and easily be recoverable.<br />How fast will restoring data from backup need to be?<br />Bringing a critical system back online would normally be done as soon as possible. Your backup plan depends a lot on the time it takes to recover a system. Data should be classified by priority and restored in sequence.<br />How regularly does data change?<br />Data that changes daily should be backed up daily. The rate at which your data changes will reflect your decision on how often the data should be backed up. <br />What type of information does the data residing on the systems contain?<br />As well as knowing what information the data contains so that you can identify it as critical, confidential, etc, it’s important to note that although data may not seem important to you, it might be to someone else. This will help you determine when and how certain data should be backed up.<br />Do you have what’s necessary to perform backups?<br />Make sure that you have the right hardware and enough media needed to perform a backup. Choosing backup media is an important factor in the backup and recovery process. Backup tapes are a common form of media since they can store large amounts of data and are cheap. They are however much slower than alternative options.<br />Types of Backup<br />Each file or folder on your system consists of what is called an Archive attribute. If this attribute is enabled then the file or folder may require backing up at the next backup time. <br />To view the archive attribute in Windows 2003, right click a file or folder and select properties. Press the Advanced button to bring up the Advanced Attributes dialog box. This will allow you to select whether you want the object to be ready for archiving.<br />There are five backup types which you can use depending on the importance of the data you are backing up and how convenient you want the restoration process to be.<br />Daily<br />Backs up files that have changed since the last daily backup. If a file is modified on the same day as the backup, it will be backed up. The archive attribute of the files is not changed. <br />Incremental<br />Backs up files that have changed since the most recent full (normal) or incremental backup. If the archive attribute is present then it means the file has been modified – only files with this attribute are backed up. Once the file has been backed up, the archive attribute is cleared and only set once the data has been modified again.<br />Full (Normal)<br />Backs up all files that have been selected, despite the archive attribute setting. Once the file has been backed up, the archive attribute is cleared until the file is modified. When the archive attribute is set again, it indicates that the file needs to be backed up.<br />Differential<br />Backs up files that have changed since the last Full backup. If the archive attribute is present, it means that the data has been modified and files having this attribute set will be backed up. However, in this case the attribute is not cleared so as to allow other types of backups to take place on this data at a later stage.<br />Copy<br />Backs up all files that have been selected, despite the archive attribute setting. The archive attribute is not changed, so that other types of backup can be performed on the same data. <br />Keep in mind:<br />A backup procedure is never considered complete until it has been fully tested. What good is it if you backup data but can’t restore it?<br />Types of Backup Media<br />The most common types of backup media available on the market today include:<br />Tape drives<br />Tape drives are the most common backup media around due to their low cost. The average capacity of a tape drive is 4 to 10 GB. The drawbacks are that they are relatively slow when compared with other media, and can tend to be unreliable. Magnetic tape cartridges are used to store the data, which leaves it susceptible to loss of information over time or through breaking/stretching the tape. <br />Disk drives<br />Disk drives are expensive but very fast compare to tape drives. The disk drive rotates at a very fast pace and has one or more heads that read and write data. If an organization is looking for a fast method of backup and recovery then disk drives are the way to go – the difference in speed between a tape drive and a disk drive is hours compared to minutes, respectively.<br />Removable Disks<br />Using a removable disk such as a ZIP/JAZ drive is becoming increasingly popular for the backup of single systems. They are quite fast, not that expensive and easy to install and carry around. The downside is that the capacity is usually (at the time of writing this article) not more than 2GB in size.Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-70488014312303843382009-10-09T10:37:00.009+05:302009-10-13T01:25:05.052+05:30Disk Quotas in Windows 2003In this article we will look at what disk quotas are, when they should be used, and how to configure them in Windows 2003. <br /><br />Windows NT Disk Quotas didn’t exist, which was much to the disappointment of Windows Administrators. Along came Windows 2000 and with the introduction of Disk Quotas it meant Administrators had the ability to track and control user disk usage. The only problem was that they didn’t really have a sufficient way of managing disk quotas. Scripting, reporting and remote usage methods were somewhat limited and ambiguous. Windows 2003 offers better all round functionality and easier enterprise-wide disk quota manageability.<br />Disk quotas are used in conjunction with NTFS, Group Policy and Active Directory technology. NTFS is the file system on which disk quotas can be set, Group Policy is what is used to set disk quotas on a specific set of users and computers, and Active Directory is used to gather a list of users to which the disk quota group policy will be set. It is important to note that disk quotas can only be used with NTFS; setting them up on FAT or FAT32 drives is not possible. <br />Disk quotas are configured on a per volume basis and cannot be set on a file or folder level. Each volume would have its individual settings which do not affect any other volumes. You may have a single disk partitioned into two volumes (drives C and D for example) with each having their own quota settings. Disk quotas can also be configured on a per user basis and different groups of users can have different limits set. Administrators are the only ones to whom a disk quota does not apply; by default there are no limits for an Administrator.<br />There are numerous reasons you may wish to make use of disk quotas. Based on the requirements of your organization you might choose to configure disk quotas if you have a restricted amount of disk space on a specific server, a limited number of servers, or perhaps the need to monitor user disk space usage without actually enforcing a quota. You might be wondering why you’d want to just monitor user disk space usage. Well, let’s say you have a fileserver set up with multiple users in your organization using it everyday to store temporary files. As time goes by and perhaps people forget to delete the files from the server, the amount of available disk space will continue to decrease. If nothing is done about it then users will be denied the right to add more files on the server (until some old files are removed). By monitoring user disk space usage with Microsoft’s disk quotas, you can be notified of when space is running out and then increase the allocated space on the server accordingly or notify your users that they need to delete their files from the server. Additionally, setting a quota warning level will allow for a system event log to be written for your review. <br />Setting a Group Policy<br />The most practical means of configuring disk quotas on a large scale would be through a domain-level group policy. This will configure the settings automatically on any of the volumes you wish to have disk quotas enabled, saving you the need to have to configure each volume independently. <br />Open the Group Policy Object Editor (gpedit.msc) and navigate to Computer Configuration > Administrative Templates > System > Disk Quotas. On the right hand pane you will see a list of policies that can be applied. Double click the “Default Quota Limit and Warning Level Properties” setting.<br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLQZX1o75YXhm6oKpsvqxPO98xbjuCiz3jNwBe6mhQ2FnWnKOX-sdas-u582e9RbJR_zJNq3eb4odQnOpCnAjyzzMQHm_GGri75CNSVYMCBQ9tYHDmqDCnxQvibvDLiqn4f_odyEqLLsTP/s1600-h/Windows+Disk1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 361px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLQZX1o75YXhm6oKpsvqxPO98xbjuCiz3jNwBe6mhQ2FnWnKOX-sdas-u582e9RbJR_zJNq3eb4odQnOpCnAjyzzMQHm_GGri75CNSVYMCBQ9tYHDmqDCnxQvibvDLiqn4f_odyEqLLsTP/s400/Windows+Disk1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390466054114811394" /></a><br /><br />Figure 1: The Default Quota Limit and Warning Level Properties Dialog<br />The default quota limit is the maximum amount of space assigned per default quota, whereas the warning level is the amount of space at which a warning is triggered. Normally 90-95% of the total value is a good limit to set as a warning. <br />Now configure any other settings you wish to be applied by selecting them from the right hand pane. To have your changes applied immediately you can enable the “Disk Quota Policy Processing” policy and choose “Process Even If The Group Policy Objects Have Not Changed” from Administrative Templates > System > Group Policy. <br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjpnH4J3vEI2hkkJcpaMIAxHwu-aDcAu1Bu2HV7wYuNn3_On9UOprXJNnjZ_a_qDQB_2_xlkh3dhyphenhyphenjLwjWumod4PgcOKqPyXSUBKx94CjY6cxUPNUqP4nVB94seF7X0vpqgyb0c5VK_vuZ/s1600-h/Windows+Disk2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 361px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjpnH4J3vEI2hkkJcpaMIAxHwu-aDcAu1Bu2HV7wYuNn3_On9UOprXJNnjZ_a_qDQB_2_xlkh3dhyphenhyphenjLwjWumod4PgcOKqPyXSUBKx94CjY6cxUPNUqP4nVB94seF7X0vpqgyb0c5VK_vuZ/s400/Windows+Disk2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390465916489478338" /></a> <br />Figure 2: The Disk Quota Policy Processing Dialog<br />You may also want to manually force a group policy update using the gpupdate utility. Simply go to Start > Run and type gpupdate followed by the return key. This will refresh both the computer and user policies.<br />Whatever changes you make in the group policy will be reflected on the Quota properties tab of each volume you wish to configure in your domain. The options will appear grayed out and non-editable. <br />Configuring Disk Quotas and Disk Quota Entries<br />Using the Computer Management console, you can configure disk quotas for a local or remote volume from a central location. To open Computer Management, you have three choices; either right click My Computer and select Manage, type compmgmt.msc in the Run bar or select Computer Management from the Administrative Tools folder.<br />Select which computer you wish to manage from the root node. To select a remote machine right click the “Computer Management” node, select “Connect to another computer…” and choose the computer you wish to manage. Now, navigate to Storage > Disk Management and select the volume you want to configure from the right hand pane and open the properties dialog. Click the Quota tab and enable the options you want to be enforced. <br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh16Hih8KVIqpovTV5XDCmRiLciOR9R1LDucGhJH9d1iiNzKXqakn9PQ7t9SZ1rrPrilPJ0b9o_er4A4I6E7QPe1rUM9iafi4BxWlD8JfD4szD9pnSbVp-iiCN7yorAolteV2Yz3ByQxEsM/s1600-h/Windows+Disk3.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 315px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh16Hih8KVIqpovTV5XDCmRiLciOR9R1LDucGhJH9d1iiNzKXqakn9PQ7t9SZ1rrPrilPJ0b9o_er4A4I6E7QPe1rUM9iafi4BxWlD8JfD4szD9pnSbVp-iiCN7yorAolteV2Yz3ByQxEsM/s400/Windows+Disk3.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390465782117106386" /></a><br /><br />Figure 3: The Disk Quota Properties Dialog<br />The traffic lights icon at the top indicate the status of the disk quota; red means quotas are disabled, orange signifies a changeover is taking place (while it rebuilds the disk information), and green means disk quotas are enabled. A textual representation of the status is shown on the right of the image. <br />Check “Deny disk space to users exceeding quota limit” to have Windows restrict users from adding more data to their allocated disk space when the quota limit has been reached. Users will be unable to add more data until some space is freed up. <br />As you can see from Figure 3 above, the quota limit for new users is greyed out. This is because we have already set it from the group policy, which overrides any customizable settings on the quota tab of a volume. In this case we have limited the user’s disk space to 500MB and set a warning level to 450MB. <br />You may choose not to limit disk usage and just enable quotas to track disk space usage on a per volume basis by leaving the “Deny disk space to users exceeding quota limit” checkbox unchecked and logging a warning when a user exceeds the warning level defined as part of the quota limit. Whenever a user exceeds this limit a Warning event log will be written to the Application Event Log and shown in the Event Viewer.<br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD75wB5mg0YDKg3cpLsTyfhgVbubUd0iVphaGakIR_Vc5Pu1aNfF6gqdhSMW_qhL_cBB0T7_XvgJW5-jH_gmCzniJcEd-JNJom6pKafxOlLDJ4-xddNexo_p4Pa4eUktXe6XzZoHMS5bHf/s1600-h/Windows+Disk4.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 361px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD75wB5mg0YDKg3cpLsTyfhgVbubUd0iVphaGakIR_Vc5Pu1aNfF6gqdhSMW_qhL_cBB0T7_XvgJW5-jH_gmCzniJcEd-JNJom6pKafxOlLDJ4-xddNexo_p4Pa4eUktXe6XzZoHMS5bHf/s400/Windows+Disk4.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390465625415693170" /></a><br />Figure 4: A warning event log for disk quotas<br />As per http://support.microsoft.com/kb/915182 there is a known issue in the pre service pack version of Windows 2003 in that the Warning event log is incorrectly shown as an Information log in Event Viewer. In the Quota Entries application however, it is correctly displayed as a Warning. <br />When you press the Apply button on the Disk Quota Properties Dialog you are notified that the volume will be rescanned to update the statistics and that this operation may take several minutes. Simply press OK to continue and have disk quotas enabled on that volume. <br />Quota Entries<br />Click the Quota Entries button on the Disk Quota Properties Dialog to view a list of individual disk quota entries. From this section you can create, delete and manage quota entries for specific users or groups. If a user requires more space than others then you can set this from here.<br />Go to Quota > New Quota Entry and the Active Directory User Picker will appear. Choose a user from Active Directory and press OK. You will be given the option to limit disk space and set a warning level or not limit disk usage at all. <br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ5ihorvF7AqcwpYe8pJi6rBEUVyDfz4sy_ENhIonkWMgYdPOQLfKT0QbuQk4hZbM8F43mgMkWYmxGFmjwxaHqmn_Bx8R0RAIw5Z90AgcM2w2QI5_3vMmvhg1U_-nV1ZYdaceun6-OMg18/s1600-h/Windows+Disk5.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 324px; height: 233px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ5ihorvF7AqcwpYe8pJi6rBEUVyDfz4sy_ENhIonkWMgYdPOQLfKT0QbuQk4hZbM8F43mgMkWYmxGFmjwxaHqmn_Bx8R0RAIw5Z90AgcM2w2QI5_3vMmvhg1U_-nV1ZYdaceun6-OMg18/s400/Windows+Disk5.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390466658126572386" /></a><br />Figure 5: Adding a new quota entry<br />Once you have chosen your preferred settings, press OK and the user will be added to the list. You can monitor a user’s disk usage by looking at the properties of each of the columns. ‘Status’ indicates whether the user is within their limit, if a warning has been logged or if the limit has been exceeded; the icon will change accordingly.<br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHfTZhjmwwG3POT_Ss2QJaXAKIOfmDyA-f99sCPzli3W-XJRDZFP_8C5PtlO8IWCGTFKqhbhapnkhnvxxhfEvUdGXlixwSWgTbJ7fuDRDS_7SPsHx1uw9zAvpZbGaivNRYykICh6JYfv_H/s1600-h/Windows+Disk6.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 121px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHfTZhjmwwG3POT_Ss2QJaXAKIOfmDyA-f99sCPzli3W-XJRDZFP_8C5PtlO8IWCGTFKqhbhapnkhnvxxhfEvUdGXlixwSWgTbJ7fuDRDS_7SPsHx1uw9zAvpZbGaivNRYykICh6JYfv_H/s400/Windows+Disk6.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5390466499369855506" /></a><br />Figure 6: Viewing a list of Quota EntriesGanapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-79739505466170893792009-08-19T13:43:00.000+05:302009-10-13T01:23:13.279+05:30E-Business Suite R12 Installation Steps on Windows XPOracle E-Business Suite R12 Installation Steps on Windows XP<br />I have installed Oracle E-Business Suite Release 12 on Windows XP Professional successfully.<br />I have done a single node installation as follows:<br /><br />Hardware & Software Specifications:<br /><br />- Intel Pentium 4, CPU 3.2 GHz<br />- 2 GB of RAM<br />- 180 GB Hard Drive<br />- Windows XP Professional with Sevice Pack 2<br /><br />Installation Steps:<br /><br />1) Install Windows XP Professional with SP2<br /><br />2) Set 'Computer Name' as well as 'Domain Name'.<br /><br />- Right click on 'My Computer' > Properties > 'Computer Name' > Change<br />- Set 'Computer Name' to<br />- Click on More<br />- Set a 'Primary DNS Suffix of this Computer' to<br /><br />3) Install Microsoft Loopback adapter and define an IP address (10.10.10.10)<br /><br />For more information on how to do this, please refer to "How to install the Microsoft Loopback adapter in Windows XP":<br /><br />http://support.microsoft.com/kb/839013<br /><br />4) Add a new entry in C:\windows\system32\drivers\etc\hosts as follows:<br /><br /><br />10.10.10.10 hostname.domainname.com<br /><br />5) From the command prompt, make sure you can do the following:<br /><br />C:\> ping 10.10.10.10<br />C:\> ping hostname<br />C:\> ping hostname.domainname.com<br /><br />6) Create a new user 'hsawwan' and make this user a member of:<br />- Administrators (local user)<br /><br />7) Install Visual C++ 8.0 (Which is included in Microsoft Visual Studio 2005) in 'C:\VCPlus' -- Make sure not to install VC++ in a directory that contains spaces.<br /><br />8) Download 'Cygwin' and install the required packages:<br /><br />- Create a Cygwin directory (C:\cygwin) -- Make sure not to install 'Cygwin' in a directory that contains spaces.<br />- Download the Cygwin Software (http://www.cygwin.com)<br />- Run 'Setup.exe' and choose 'Download without Installing'<br />- Select the following packages:<br /><br />Archive - Default, plus manually select the zip package<br />Base - Default, plus manually select: ash, coreutils, diffutils, findutils, gawk, grep, sed, tar and which<br />Devel - Default, plus manually select binutils, gcc, gcc-core, gcc-g++, make and mktemp<br />Doc - Default, plus manually select cygwin-doc and man<br />Editors - Default, plus manually select vim<br />Interpreters - Default, plus manually select gawk<br />Shells - Default, plus manually select ash and tcsh<br />Utils - Default, plus manually select cygutils and file<br /><br />- Once the download is complete, run 'Setup.exe' again and choose 'Install from Local Directory'<br />- Specify the directory where you want to install Cygwin (C:\cygwin) and DOS as the Default Text File Type<br /><br />9) GNUMake is not required when using 'Cygwin' since it comes as a part of the 'Cygwin'.<br /><br />C:\cygwin\bin>copy gawk.exe awk.exe<br />C:\cygwin\bin>copy grep.exe egrep.exe<br />C:\cygwin\bin>copy make.exe gnumake.exe<br />C:\cygwin\bin>copy gcc.exe cc.exe<br /><br />10) Add 'C:\cygwin\bin' to the system path.<br /><br />11) No JDK installation is required, JDK 5.0 (java version "1.5.0_08") is bundled with Oracle Applications R12 installation.<br /><br />12) Set Up the Stage Area:<br /><br />Stage Area (C:\Stage12) requires a 26 GB hard disk space.<br /><br />Extract the zip files (25 files) which have been downloaded from (http://edelivery.oracle.com). Nothing special to do since the extracted files will create the stage area directory structure by itself. You should see the following structure under 'C:\Stage12' once you are done with the files extraction:<br /><br />- startCD > Disk1<br />- oraAppDB > (Disk 1 to Disk 35)<br />- oraApps > (Disk 1 to Disk 7)<br />- oraAS > (Disk 1 to Disk 2)<br />- oraDB > (Disk 1 to Disk 3)<br /><br />13) Start the installation:<br /><br />C:\> cd Stage12\startCD\Disk1\rapidwiz<br />C:\Stage12\startCD\Disk1\rapidwiz> RapidWiz.cmd<br /><br />The installation wizard is similar to 11.5.10 RapidWiz. For 'VC++' and 'Cygwin' I have provided the following paths:<br /><br />s_MSDEVdir=C:\VCPlus\VC<br />s_MKSdir=C:\cygwin\bin<br /><br />- It took almost 2 hours to install the production environment (3 hours when installing the Vision instance)<br />- Total space required to install the production environment is 60 GB (153 GB is required to install the Vision instance)Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-2224700433783512682009-07-07T13:40:00.004+05:302009-10-13T01:23:13.280+05:30INSTALL phpBB making it the most widely used opensource bulletin board system in the worldINSTALL phpBB<br /><br />Please read this document completely before proceeding with installation, updating or converting.<br /><br />This document will walk you through the basics on installing, updating and converting the forum software.<br /><br />A basic overview of running phpBB3 can be found in the accompanying README file. Please ensure you read that document in addition to this! For more detailed information on using, installing, updating and converting phpBB3 you should read the documentation available online.<br /><script type="text/javascript" language="javascript" src="http://www.dpbolvw.net/placeholder-3898242?target=_top&mouseover=Y"></script><br />1. Quick install<br /><br />If you have basic knowledge of using FTP and are sure your hosting service or server will run phpBB3 you can use these steps to quickly get started. For a more detailed explanation you should skip this and go to section 2 below.<br /><br /> 1. Decompress the phpBB3 archive to a local directory on your system.<br /> 2. Upload all the files contained in this archive (retaining the directory structure) to a web accessible directory on your server or hosting account.<br /> 3. Change the permissions on config.php to be writable by all (666 or -rw-rw-rw- within your FTP Client)<br /> 4. Change the permissions on the following directories to be writable by all (777 or -rwxrwxrwx within your FTP Client):<br /> store/, cache/, files/ and images/avatars/upload/.<br /> 5. Using your web browser visit the location you placed phpBB3 with the addition of install/index.php or pointing directly to install/, e.g. http://www.mydomain.com/phpBB3/install/, http://www.mydomain.com/forum/install/ etc.<br /> 6. Click the INSTALL tab, follow the steps and fill out all the requested information.<br /> 7. Change the permissions on config.php to be writable only by yourself (644 or -rw-r--r-- within your FTP Client)<br /> 8. phpBB3 should now be available, please MAKE SURE you read at least Section 6 below for important, security related post-installation instructions.<br /><br />If you experienced problems or do not know how to proceed with any of the steps above please read the rest of this document.<br /><script type="text/javascript" language="javascript" src="http://www.dpbolvw.net/placeholder-3898243?target=_top&mouseover=Y"></script><br />2. Requirements<br /><br />phpBB3 has a few requirements which must be met before you are able to install and use it.<br /><br /> * A webserver or web hosting account running on any major Operating System with support for PHP<br /> * A SQL database system, one of:<br /> o MySQL 3.23 or above (MySQLi supported)<br /> o PostgreSQL 7.3+<br /> o SQLite 2.8.2+<br /> o Firebird 2.0+<br /> o MS SQL Server 2000 or above (directly or via ODBC)<br /> o Oracle<br /> * PHP 4.3.3+ (>=4.3.3, >4.4.x, >5.x.x, >6.0-dev (compatible)) with support for the database you intend to use.<br /> * getimagesize() function need to be enabled.<br /> * These optional presence of the following modules within PHP will provide access to additional features, but they are not required.<br /> o zlib Compression support<br /> o Remote FTP support<br /> o XML support<br /> o Imagemagick support<br /> o GD Support<br /><br />If your server or hosting account does not meet the requirements above we are afraid phpBB3 is not for you.<br />Back to Top<br /> <!-- Begin BidVertiser code --><br /><SCRIPT LANGUAGE="JavaScript1.1" SRC="http://bdv.bidvertiser.com/BidVertiser.dbm?pid=247910%26bid=605003" type="text/javascript"></SCRIPT><br /><noscript><a href="http://www.bidvertiser.com/bdv/BidVertiser/bdv_advertiser.dbm">pay per click advertising</a></noscript><br /><!-- End BidVertiser code --> <br />3. New installation<br /><br />Installation of phpBB3 will vary according to your server and database. If you have shell access to your account (via telnet or ssh for example) you may want to upload the entire phpBB3 archive (in binary mode!) to a directory on your host and unarchive it there.<br /><br />If you do not have shell access or do not wish to use it you will need to decompress the phpBB3 archive to a local directory on your system using your favourite compression program, e.g. winzip, rar, zip, etc. From there you must FTP ALL the files it contains (being sure to retain the directory structure and filenames) to your host. Please ensure that the cases of filenames are retained, do NOT force filenames to all lower or upper case doing so will cause errors later.<br /><br />All .php, .inc, .sql, .cfg, .html and .txt files should be uploaded in ASCII mode, while all graphics should be uploaded in BINARY mode. If you are unfamiliar with what this means please refer to your FTP client documentation. In most cases this is all handled transparantly by your ftp client but if you encounter problems later you should be sure the files where uploaded correctly as described here.<br /><br />phpBB3 comes supplied with english as its standard language. However a number of separate packs for different languages are available. If you are not a native english speaker you may wish to install one or more of these packages before continuing. The installation process below will allow you to select a default language from those available (you can of course change this default at a later stage). For more details of language packs, where to obtain them and how to install them please see the README.<br /><br />Once all the files have been uploaded to your site you should point your browser at this location with the addition of install/. For example if your domain name is www.mydomain.tld and you placed phpBB3 in a directory /phpBB3 off your web root you would enter http://www.mydomain.tld/phpBB3/install/ or (alternatively) http://www.mydomain.tld/phpBB3/install/index.php into your browser. When you have done this you should see the phpBB3 Installation screen appear.<br />Introduction:<br /><br />The installation screen gives you a short introduction into phpBB. It allows you to read the license phpBB3 is released under (General Public License) and provides information about how you can receive support. To start the installation, use the Install button.<br />Requirements<br /><script type="text/javascript" language="javascript" src="http://www.anrdoezrs.net/placeholder-3898244?target=_top&mouseover=Y"></script><br />The first page you will see after starting the installation is the Requirements list. phpBB3 checks automatically whether everything that it needs to run properly is installed on your server. You need to have at least the minimum PHP version installed, and at least one database available to continue the installation. Also important, is that all shown folders are available and do have the correct permissions. Please see the description of each section to find out whether they are optional or required for phpBB3 to run. If everything is in order, you can continue the installation with Start Install.<br />Database settings<br /><br />You now have to decide which database to use. See the Requirements section for information on which databases are supported. If you do not know your database settings, please contact your host and ask for them. You will not be able to continue without them. You need:<br /><br /> * The Database Type - the database you will be using.<br /> * The Database server hostname or DSN - the address of the database server.<br /> * The Database server port - the port of the database server (most of the time this is not needed).<br /> * The Database name - the name of the database on the server.<br /> * The Database username and Database password - the login data to access the database.<br /><br />Note: if you are installing using SQLite, you should enter the full path to your database file in the DSN field and leave the username and password fields blank. For security reasons, you should make sure that the database file is not stored in a location accessible from the web.<br /><br />You don't need to change the Prefix for tables in database setting, unless you plan on using multipe phpBB installations on one database. In this case you can use a different prefix for each installation to make it work.<br /><br />After you entered your details, you can continue with the Proceed to next step button. Now phpBB3 will check whether the data you entered will lead to a successful database connection and whether tables with the same prefix already exist.<br /><br />A Could not connect to the database error means that you didn't enter the database data correctly and it is not possible for phpBB to connect. Make sure that everything you entered is in order and try again. Again, if you are unsure about your database settings, please contact your host.<br /><br />If you installed another version of phpBB before on the same database with the same prefix, phpBB will inform you and you just need to enter a different database prefix.<br /><br />If you see the Successful Connection message, you can continue to the next step.<br />Administrator details<br /><br />Now you have to create your administration user. This user will have full administration access and he/she will be the first user on your forum. All fields on this page are required. You can also set the default language of your forum on this page. In a vanilla phpBB3 installation we only include English. You can download further languages from www.phpbb.com, and add them before installing or later.<br />Configuration file<br /><br />In this step, phpBB will try to write the configuration file automatically. The forum needs the configuration to run properly. It contains all database settings, so without it, phpBB will not be able to access the database.<br /><br />Usually writing the configuration file automatically works fine. But in some cases it can fail due to wrong file permissions, for instance. In this case, you need to upload the file manually. phpBB asks you to download the config.php file and tells you what to do with it. Please read the instructions carefully. After you have uploaded the file, use Done to get to the last step. If Done returns you to the same page as before, and does not return a success message, you did not upload the file correctly.<br />Advanced settings<br /><br />The Advanced settings allow you to set some parameters of the board configuration. They are optional, and you can always change them later. So if you are not sure what these settings mean, proceed to the final step and finish the installation.<br /><br />If the installation was successful, you can now use the Login button to visit the Administration Control Panel. Congratulations, you have installed phpBB3 successfully. But there is still work ahead!<br /><br />If you are unable to get phpBB3 installed even after reading this guide, please look at the support section to find out where you can ask for further assistance.<br /><br />At this point if you are converting from phpBB 2.0.x, you should refer to the conversion steps for further information. If not, you should remove the install directory from your server as you will only be able to access the Administration Control Panel whilst it is present.<br /><script type="text/javascript" language="javascript" src="http://www.anrdoezrs.net/placeholder-3898244?target=_top&mouseover=Y"></script><br />4. Updating from stable releases of phpBB 3.0.x<br /><br />If you are currently using a stable release of phpBB3 updating to this version is straightforward. You would have downloaded one of four packages and your choice determines what you need to do. Please Note: That before updating we heavily recommend you do a full backup of your database and existing phpBB3 files! If you are unsure how to achieve this please ask your hosting provider for advice.<br /><br />Please make sure you update your phpBB3 source files too, even if you run the database_update.php file.<br />4.i. Full package<br /><br />The full package is normally meant for new installations only, but if you want to replace all source files this package comes in handy.<br /><br />First you should make a copy of your existing config.php file, keep it in a safe place! Next delete all the existing phpBB3 files, you may want to leave your files/ and images/ directory in place. You can leave alternative styles in-place too. With this complete you can upload the new phpBB3 files (see New installation for details if necessary). Once complete copy back your saved config.php, replacing the new one. Another method is to just replace the existing files with the files from the full package - though make sure you do not overwrite your config.php file.<br /><br />You should now run install/database_update.php which, depending on your previous version, will make a number of database changes. You may receive FAILURES during this procedure, they should not be a cause for concern unless you see an actual ERROR, in which case the script will stop (in this case you should seek help via our forums or bug tracker).<br /><br />Once the install/database_update.php has completed you may proceed to the Administration Control Panel and check remove the install directory as advised.<br />4.ii. Changed files only<br /><br />This package is meant for those wanting to only replace changed files from a previous version to the latest version. This package normally contains the changed files from up to five previous versions.<br /><br />This package contains a number of archives, each contains the files changed from a given release to the latest version. You should select the appropriate archive for your current version, e.g. if you currently have 3.0.4 you should select the phpBB-3.0.4_to_3.0.5.zip/tar.gz file.<br /><br />The directory structure has been preserved enabling you (if you wish) to simply upload the contents of the archive to the appropriate location on your server, i.e. simply overwrite the existing files with the new versions. Do not forget that if you have installed any MODs these files will overwrite the originals possibly destroying them in the process. You will need to re-add MODs to any affected file before uploading.<br /><br />As for the other update procedures you should run install/database_update.php after you have finished updating the files. This will update your database schema and increment the version number.<br />4.iii. Patch file<br /><br />The patch file package is for those wanting to update through the patch application, and being comfortable with it.<br /><br />The patch file is one solution for those with many Modifications (MODs) or other changes who do not want to re-add them back to all the changed files if they use the method explained above. To use this you will need command line access to a standard UNIX type patch application. If you do not have access to such an application but still want to use this update approach, we strongly recommend the Automatic update package explained below. It is also the preferred update method.<br /><br />A number of patch files are provided to allow you to update from previous stable releases. Select the correct patch, e.g. if your current version is 3.0.4 you need the phpBB-3.0.4_to_3.0.5.patch file. Place the correct patch in the parent directory containing the phpBB3 core files (i.e. index.php, viewforum.php, etc.). With this done you should run the following command: patch -cl -d [PHPBB DIRECTORY] -p1 < [PATCH NAME] (where PHPBB DIRECTORY is the directory name your phpBB Installation resides in, for example phpBB3, and where PATCH NAME is the relevant filename of the selected patch file). This should complete quickly, hopefully without any HUNK FAILED comments.<br /><br />If you do get failures you should look at using the Changed files only package to replace the files which failed to patch, please note that you will need to manually re-add any Modifications (MODs) to these particular files. Alternatively if you know how you can examine the .rej files to determine what failed where and make manual adjustments to the relevant source.<br /><br />You should of course delete the patch file (or files) after use. As for the other update procedures you should run install/database_update.php after you have finished updating the files. This will update your database schema and data (if appropriate) and increment the version number.<br />4.iv. Automatic update package<br /><br />This update method is the preferred method for updating. This package allows detecting changed files automatically and merges changes if needed.<br /><br />The automatic update package contains - contrary to the others - only the information required to update the previous release version to the latest available version. These packages are meant for use with the automatic update tool.<br /><br />To perform the update, either follow the instructions from the Administration Control Panel->System Tab - this should point out that you are running an outdated version and will guide you through the update - or follow the instructions listed below.<br /><br /> * Go to the downloads page and download the latest update package listed there, matching your current version.<br /> * Upload the archives contents to your phpBB installation - only the install folder is required. Upload the whole install folder, retaining the file structure.<br /> * After the install folder is present, phpBB3 will go offline automatically.<br /> * Point your browser to the install directory, for example http://www.example.com/phpBB3/install/<br /> * Choose the "Update" Tab and follow the instructions<br /><br /> <br />4.v. All package types<br /><br />If you have non-English language packs installed you may want to see if a new version has been made available. A number of missing strings may have been added which, though not essential, may be beneficial to users. Please note that at this time not all language packs have been updated so you should be prepared to periodically check for updates.<br />Back to Top<br />5. Conversion from phpBB 2.0.x to phpBB 3.0.x<br /><br />This paragraph explains the steps necessary to convert your existing phpBB2 installation to phpBB3.<br />5.i. Requirements before converting<br /><br />Before converting we heavily recommend you do a full backup of your database and files! If you are unsure how to achieve this please ask your hosting provider for advice. You basically need to follow the basic instructions given for New installations. Please do not overwrite any old files - install phpBB3 at a different location.<br /><br />Once you made a backup of everything and also have a brand new phpBB3 installation, you can now begin the conversion.<br /><br />Note that the conversion requires CREATE and DROP privileges for the phpBB3's database user account.<br />5.ii. Converting<br /><br />To begin the conversion visit the install folder of your phpBB3 installation (the same as you have done for installing). Now you will see a new tab Convert. Click this tab.<br /><br />As with install the conversion is automated. Your previous 2.0.x database tables will not be changed as well as the original 2.0.x files remaining unaltered. The conversion is actually only filling your phpBB3 database tables and copying additional data over to your phpBB3 installation. This has the benefit that if something goes wrong you are able to either re-run the conversion or continue a conversion, while your old board is still accessible. We really recommend you disable your old installation while converting, else you may have inconsistent data after the conversion.<br /><br />Please note that this conversion process may take quite some time and depending on your hosting provider this may result in it failing (due to web server or other timeout issues). If this is the case you should ask your provider if they are willing to allow the convert script to temporarily exceed their limits (be nice and they will probably be quite helpful).<br /><script type="text/javascript" language="javascript" src="http://www.kqzyfj.com/placeholder-3898253?target=_top&mouseover=N"></script><br />Once completed your board should be immediately available. If you encountered errors you should report the problems to our bug tracker or seek help via our forums (see README for details).<br />5.iii. Things to do after conversion<br /><br />After successful conversion there may be a few items you need to do - apart from checking if the installation is accessible and everything displayed correctly.<br /><br />The first thing you may want to do is going to the administration control panel and checking every configuration item within the general tab. Thereafter you may want to adjust the forum descriptions/names if you entered HTML there. You also may want to access the other administrative sections, e.g. adjusting permissions, smilies, icons, ranks, etc.<br /><br />Within the conversion the search index has not been created or transferred. This means after conversion you are not able to find any matches if you want to search for something. We recommend you rebuild your search index within Admin -> Maintenance -> Database -> Search Index.<br /><br />After verifying the settings in the ACP, you can delete the install directory to enable the board. The board will stay disabled until you do so.<br /><br />Once you are pleased with your new installation you may want to give it the name of your old installation, changing the directory name. With phpBB3 this is possible without any problems - but you may still want to check your cookie settings within the administration panel, if the cookie path need to be adjusted prior to renaming.<br />5.iv. Common conversion problems<br /><br />Broken non-latin characters The conversion script assumes that the database encoding in the source phpBB2 matches the encoding defined in the lang_main.php file of the default language pack of the source installation. Edit that file to match the database's encoding and re-start the conversion procedure.<br /><br />http 500 / white pages The conversion is a load-heavy procedure. Restrictions imposed by some server hosting providers can cause problems. The most common causes are: too low values for the php settings memory_limit and max_execution_time. Limits on the allowed CPU time are also a frequent cause for such errors, as are caps on the number of database queries allowed. If you cannot change such settings, then contact your hosting provider or run the conversion procedure on a different computer. The phpBB.com forums are also an excellent location to ask for support.<br /><br />Password conversion Due to the utf-8 based handling of passwords in phpBB3, it is not always possible to transfer all passwords. For passwords "lost in translation" the easiest workaround is to use the "forgotten password" function.<br /><br />Path to your former board The converter expects the relative path to your old board's files. So, - for instance - if the old board is located at http://www.yourdomain.com/forum and the phpBB3 installation is located at http://www.yourdomain.com/phpBB3, then the correct value would be ../forum. Note that the webserver user must be able to access the source installation's files.<br /><br />Missing images If your default board language's language pack does not include all images, then some images might be missing in your installation. Always use a complete language pack as default language.<br /><br />Smilies During the conversion you might see warnings about image files where the copying failed. That can happen if the old board's smilies have the same file names as those on the new board. Copy those files manually after the conversion, if you want to continue using the old smilies.<br />http://www.jdoqocy.com/r470iqzwqyDHJIFJLJDFEJKIGLL<br />6. Important (security related) post-Install tasks for all installation methods<br /><br />Once you have successfully installed phpBB3 you MUST ensure you remove the entire install/ directory. Leaving the install directory in place is a very serious potential security issue which may lead to deletion or alteration of files, etc. Please note that until this directory is removed, phpBB3 will not operate and a warning message will be displayed. Beyond this essential deletion, you may also wish to delete the docs/ directories if you wish.<br /><script type="text/javascript" language="javascript" src="http://www.kqzyfj.com/placeholder-3898253?target=_top&mouseover=N"></script><br />With these directories deleted you should proceed to the administration panel. Depending on how the installation completed you may have been directed there automatically. If not, login as the administrator you specified during install/conversion and click the Administration Panel link at the bottom of any page. Ensure that details specified in Admin -> General are correct!<br />6.i. Uploadable avatars<br /><br />phpBB3 supports several methods for allowing users to select their own avatar (an avatar is a small image generally unique to a user and displayed just below their username in posts).<br /><br />Two of these options allow users to upload an avatar from their machine or a remote location (via a URL). If you wish to enable this function you should first ensure the correct paths for uploadeable avatars is set in Admin -> General -> Board Configuration -> Avatar settings. By default this is images/avatars/uploads but you can set it to whatever you like, just ensure the configuration setting is updated. You must also ensure this directory can be written to by the webserver. Usually this means you have to alter its permissions to allow anyone to read and write to. Exactly how you should do this depends on your ftp client or server operating system.<br /><br />On UNIX systems for example you set the directory to a+rwx (or ugo+rwx or even 777). This can be done from a command line on your server using chmod or via your FTP client (using the Change Permissions, chmod or other Permissions dialoge box, see your FTP clients documentation for help). Most FTP clients list permissions in the form of User (Read, Write, Execute), Group (Read, Write, Execute) and Other (Read, Write, Execute). You need to tick all of these boxes to set correct permissions.<br /><br />On Windows system you need to ensure the directory is not write-protected and that it has global write permissions (see your servers documentation or contact your hosting provider if you are unsure on how to achieve this).<br /><br />Please be aware that setting a directories permissions to global write access is a potential security issue. While it is unlikely that anything nasty will occur (such as all the avatars being deleted) there are always people out there to cause trouble. Therefore you should monitor this directory and if possible make regular backups.<br /><script type="text/javascript" language="javascript" src="http://www.kqzyfj.com/placeholder-3898253?target=_top&mouseover=N"></script><br />7. Copyright and disclaimer<br /><br />This application is opensource software released under the GPL. Please see source code and the docs directory for more details. This package and its contents are Copyright (c) 2000, 2002, 2005, 2007 phpBB Group, All Rights Reserved.<br /><br />more Visit : http://www.phpbb.comGanapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-77695137028993526772009-07-06T16:51:00.011+05:302009-10-13T01:23:13.281+05:30Free Linux Distributions And Downloads<center> <center> <span style="font-size:78%;"><b><u> Ubuntu Linux </u></b></span> </center> <table><tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Canonical Ltd.</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.ubuntulinux.org/">http://www.ubuntulinux.org/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Debian based, Live CD</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, PPC, Itanium, 64 bit</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Mainstream distribution based on Debian that includes the latest version of all major software packages. The developers aim to make it accessable in many languages.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=302"> list of download locations here </a></td></tr></tbody></table><br /><span style="font-size:78%;"><b><u> Debian GNU/Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/debian.jpg" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Debian</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.debian.org/">http://www.debian.org/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Debian based</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, PPC, Alpha, Sparc, Itanium, Mainframe, m68k, Other, 64 bit</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Debian GNU/Linux is a free distribution of the Linux based operating system.It is maintained and updated through the work of many users who volunteer their time and effort. Along with its large selection of prepackaged software is contains advanced package management tools that allow for easy installation and maintenance on individual systems and workstation clusters. Extensive pre-release testing is done to ensure the highest degree of reliability possible, and a publicly accessible bug tracking system provides an easy way to monitor customer feedback.<br /></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Books:</b></span></td> <td colspan="2" valign="top"><ul><li><a href="http://www.linux.org/books/ISBN_0672317001.html"> Debian GNU/Linux 2.1 Unleashed</a></li><li><a href="http://www.linux.org/books/ISBN_0764547100.html"> Debian GNU/Linux Bible</a></li><li><a href="http://www.linux.org/books/dist/debian.html">more...</a></li></ul> </td></tr><tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=8"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> Gentoo Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/gentoo.png" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Gentoo Technologies, Inc.</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.gentoo.org/">http://www.gentoo.org</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Power user</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, PPC, Alpha, Sparc, 64 bit</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Gentoo Linux is designed for the developer, power user and enthusiast.It incorporates the latest sources and technologies (such as ReiserFS and the Portage system).<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=12"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> Mandriva </u></b></span> </center> <img src="http://www.linux.org/dist/images/mandrake.gif" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Mandriva</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://mandriva.com/">http://mandriva.com/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, Swedish, Spanish, Chinese, Japanese, French, German, Italian, Russian, Estonian, Finnish, Portuguese, Turkish, Thai</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Red Hat based, Mandriva based</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, PPC, 64 bit</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Mandriva Linux is a powerful <a id="KonaLink0" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.linux.org/dist/list.html#"><span style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" ><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >operating </span><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >system</span></span></a> that is available for many platforms: 32 bit processors such as Intel Pentium®, AMD Athlon®, PowerPC®; and <a id="KonaLink1" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.linux.org/dist/list.html#"><span style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" ><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >64 </span><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >bit </span><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >processors</span></span></a> such as Intel Itanium® and AMD Opteron®. Mandriva Linux includes many graphical administration assistants & wizards that make it intuitive and fun to use while providing all the power and robustness of other Linux systems. Hundreds of included applications make it an ideal solution for both professional and home users.<br /></td></tr> <tr><td valign="top"><br /></td><td> <table><tbody><tr><td style="vertical-align: top;"><br /></td><td style="vertical-align: top;"><script type="text/javascript" language="javascript" src="http://www.tkqlhce.com/placeholder-3896771?target=_top&mouseover=Y"></script><br /></td></tr><tr><td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00005RHEJ&VENDOR=1"><br /></a></td> <td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00005LL29&VENDOR=1"><br /></a></td> </tr></tbody></table></td></tr> <tr><td valign="top"><br /></td> <td colspan="2" valign="top"><br /></td></tr><tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=21"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> Red Hat Enterprise Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/red_hat_logo.gif" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">RedHat Software</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.redhat.com/">http://www.redhat.com/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, Spanish, French, German</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Red Hat based</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, Alpha, Itanium</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Red Hat Enterprise Linux is a high-end Linux distribution geared toward businesses with mission-critical needs.<br /></td></tr> <tr><td valign="top"><br /></td><td> <table><tbody><tr><td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00004W4RS&VENDOR=1"><br /></a></td> <td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00005EBF2&VENDOR=1"><br /></a></td> <td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00006LS9B&VENDOR=1"><br /></a></td> <td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00006LS98&VENDOR=1"><br /></a></td> </tr></tbody></table></td></tr> <tr><td valign="top"><br /></td> <td colspan="2" valign="top"><br /></td></tr><tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=30"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> Rock Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/rock_linux.gif" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td><br /></td><td><br /></td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.rocklinux.org/">http://www.rocklinux.org/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, German</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Power user</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> ROCK Linux is a modern <a id="KonaLink2" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.linux.org/dist/list.html#"><span style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" ><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >Linux </span><span class="kLink" style="font-weight: 400; position: static; color: rgb(176, 0, 0);font-family:serif;font-size:16;" >Distribution</span></span></a> with a powerful auto-build process. It's mostly designed for skilled Linux/Unix Administrators. It's available for multiple platforms. ROCK Linux is a small distribution, but it's not a "mini distribution". It comes with over 200 packages including X11 and the GNOME Desktop - but excluding menu driven configuration tools (most professional users prefer configuration files). A reasonably well configured installation of Rock Linux should be useful for any computer user (even beginners).<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=31"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> Slackware Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/slackware.gif" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">The Slackware Linux Project</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.slackware.com/">http://www.slackware.com/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Power user</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Slackware Linux is compatible with most Intel PC hardware. Slackware will provide stellar performance on high-end systems, including support for symmetric multi-processing (up to 16 processors), PCI, and special code optimizations for the 486, Pentium, and Pentium Pro and AMD Athlon<br /></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Amazon:</b></span></td><td> <table><tbody><tr><td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00004VX5C&VENDOR=1"> <img src="http://www.linux.org/dist/images/amazon.gif" alt="Get this distribution from Amazon" border="0" /><br /><span style="">Slackware 7.1</span> </a></td> </tr></tbody></table></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Book:</b></span></td> <td colspan="2" valign="top"><ul><li><a href="http://www.linux.org/books/ISBN_0761526161.html"> Install, Configure, and Customize Slackware Linux</a></li><li><a href="http://www.linux.org/books/dist/slackware.html">more...</a></li></ul> </td></tr><tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=33"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> SUSE Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/suse.gif" valign="TOP" alt="Distribution Logo" align="right" /> <table><tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">SuSE/Novell</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.suse.com/">http://www.suse.com/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, Spanish, French, German, Italian, Portuguese</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, PPC, Alpha, Sparc, Itanium, Mainframe, Other, 64 bit</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> SUSE, now a subsidiary of Novell, produces one of the most popular mainstream Linux distrbutions.<br /></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b><br /></b></span></td><td> <table><tbody><tr><td valign="top"> <a href="http://www.linux.org/dist/bin/showdist?ISBN=B00006JT8L&VENDOR=1"><br /></a></td> </tr></tbody></table></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Book:</b></span></td> <td colspan="2" valign="top"><br /></td></tr><tr> <td><br /></td> <td><a href="http://www.linux.org/dist/download.html?ID=36"> list of download locations here<br /></a><center> <span style="font-size:78%;"><b><u> Devil-Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/devil_logo.gif" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Heiko Zuerker</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.devil-linux.org/">http://www.devil-linux.org/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Security enchanced, Minimalist</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Devil-Linux is a mini distribution especially designed for a firewall and promises easy customization. Devil-Linux Boots from CD so there is no need for a harddisk. It supports Intel 486 and higher processors and uses the latest Linux kernel.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=46"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> EnGarde Secure Linux </u></b></span> </center> <table><tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Guardian Digital Inc.</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.engardelinux.org/">http://www.engardelinux.org/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Security enchanced</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> EnGarde is a secure distribution of Linux that implements advanced security techniques. It can be used as a web, DNS, mail, database, e-commerce, and general Internet server.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b><br /></b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=48"> list of download locations here</a><br /><br /><center> <span style="font-size:78%;"><b><u> Asianux </u></b></span> </center> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Red Flag/Miracle Linux Cooperation</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.asianux.com/asianux.do">http://www.asianux.com/asia...</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, Chinese, Japanese</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Power user</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Distribution aimed at servers and developed by Red Flag of China and Miracle Linux Cooperation of Japan<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=307"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> ASLinux Desktop </u></b></span> </center> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Activa Sistemas</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.activasistemas.com/exec/men=aslinux/modulo=Publico/sc=aslinux">http://www.activasistemas.c...</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, Spanish</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Mainstream/General Public, Debian based</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Distribution from Spain aimed at home users. Based on Debian.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=308"> list of download locations here </a></td></tr> </tbody></table><script type="text/javascript" language="javascript" src="http://www.tkqlhce.com/placeholder-3896771?target=_top&mouseover=Y"></script><br /><center> <span style="font-size:78%;"><b><u> BioBrew Linux </u></b></span> </center> <img src="http://www.linux.org/dist/images/biobrew.png" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Bioinformatics.Org</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://bioinformatics.org/biobrew/">http://bioinformatics.org/b...</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Power user</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible, Other</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Linux distribution designed to be run on a cluster and enhanced for bioinformaticists and life scientists.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=314"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> BRaiLleSPEAK </u></b></span> </center> <img src="http://www.linux.org/dist/images/brlspeak.png" valign="TOP" alt="Distribution Logo" align="right" /> <table> <tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Osvaldo La Rosa</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.brlspeak.net/">http://www.brlspeak.net/</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Minimalist</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Debian-based minimalist distribution designed for sight-impared individuals.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=319"> list of download locations here </a></td></tr> </tbody></table><br /><center> <span style="font-size:78%;"><b><u> neoLinux </u></b></span> </center> <table><tbody><tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Developer:</b></span></td> <td valign="top">Console</td> </tr> <tr> <td valign="top"><span style="color: rgb(164, 31, 31);"><b>Website:</b></span></td> <td valign="top"><a href="http://www.console.com.br/">http://www.console.com.br</a></td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Languages:</b></span></td> <td>English, Portuguese</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Categories:</b></span></td> <td>Power user</td></tr> <tr><td valign="top"><span style="color: rgb(164, 31, 31);"><b>Platforms:</b></span></td> <td>Intel compatible</td></tr> <tr> <td valign="top"> <span style="color: rgb(164, 31, 31);"><b>Description:</b> </span></td> <td colspan="2" valign="top"> Distribution designed for small and medium businesses. Developed in Brazil.<br /></td></tr> <tr> <td><span style="color: rgb(164, 31, 31);"><b>Download:</b></span> </td> <td><a href="http://www.linux.org/dist/download.html?ID=329"> list of download locations here </a></td></tr></tbody></table>For More Linux Distribution List Visit<br />::http://www.linux.org/dist/list.html<br /></td></tr></tbody></table></td></tr></tbody></table><a href="http://www.debian.org/"></a>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com1tag:blogger.com,1999:blog-4767826348131329932.post-86161796674212129712009-07-06T16:39:00.003+05:302009-10-13T01:23:13.282+05:30Red Hat Linux 9 : Firewall Configuration<span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Red Hat Linux offers firewall protection for enhan</span><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >ced system security. A firewall exists between your computer and the network, and determines which resources on your computer remote users on the network can access. A properly configured firewall can greatly increase</span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9wg0SAI3QtpGiX9duOM2-49yBjsw9MpwliIxgvNRCr8RL6eV4olZpy3Ah0ROh4JGkDzQwLIM5qZ_OXHqPImJ0P0pu5bcZ7z7E6o48Kzcd1SPzjMHNMJTGwBsHBxutq5uJW7FT7Ff1B9ey/s1600-h/firewall.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 301px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9wg0SAI3QtpGiX9duOM2-49yBjsw9MpwliIxgvNRCr8RL6eV4olZpy3Ah0ROh4JGkDzQwLIM5qZ_OXHqPImJ0P0pu5bcZ7z7E6o48Kzcd1SPzjMHNMJTGwBsHBxutq5uJW7FT7Ff1B9ey/s400/firewall.jpg" alt="" id="BLOGGER_PHOTO_ID_5355303997617631698" border="0" /></a><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><br /><br /><br /></span><p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b>Figure : Firewall Configuration</b></span></p> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Choose the appropriate security level for your system.</span></p> <div class="VARIABLELIST"> <dl><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">High</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you choose <b class="GUILABEL">High</b>, your system will not accept connections (other than the default settings) that are not explicitly defined by you. By default, only the following connections are allowed: </span></p> <ul><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >DNS replies</span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >DHCP — so any network interfaces that use DHCP can be properly configured</span></p> </li></ul> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you choose <b class="GUILABEL">High</b>, your firewall will not allow the following: </span></p> <ul><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Active mode FTP (passive mode FTP, used by default in most clients, should still work)</span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >IRC DCC file transfers</span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><span class="TRADEMARK">RealAudio</span>™</span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Remote X Window System clients</span></p> </li></ul> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you are connecting your system to the Internet, but do not plan to run a server, this is the safest choice. If additional services are needed, you can choose <b class="GUIBUTTON">Customize</b> to allow specific services through the firewall.</span></p> <div class="NOTE"> <table class="NOTE" border="0" width="90%"> <tbody> <tr> <td align="center" valign="top" width="25"><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><img src="http://linux.about.com/library/graphics/redhat/note.jpg" width="25" height="25" /></span></td> <th align="left" valign="CENTER"><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b>Note</b></span></th> </tr> <tr> <td><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" > </span><br /></td> <td align="left" valign="top"> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you select a medium or high firewall to be setup during this installation, network authentication methods (NIS and LDAP) will not work.</span></p> </td> </tr> </tbody> </table> </div> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">Medium</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you choose <b class="GUILABEL">Medium</b>, your firewall will not allow remote machines to have access to certain resources on your system. By default, access to the following resources are not allowed: </span></p> <ul><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Ports lower than 1023 — the standard reserved ports, used by most system services, such as <b class="APPLICATION">FTP</b>, <b class="APPLICATION">SSH</b>, <b class="APPLICATION">telnet</b>, <b class="APPLICATION">HTTP</b>, and <b class="APPLICATION">NIS</b>. </span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >The NFS server port (2049) — NFS is disabled for both remote severs and local clients.</span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >The local X Window System display for remote X clients.</span></p> </li><li> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >The X Font server port (by default, <b class="APPLICATION">xfs</b> does not listen on the network; it is disabled in the font server).</span></p> </li></ul> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you want to allow resources such as <b class="APPLICATION"><span class="TRADEMARK">RealAudio</span>™</b> while still blocking access to normal system services, choose <b class="GUILABEL">Medium</b>. Select <b class="GUILABEL">Customize</b> to allow specific services through the firewall. </span></p> <div class="NOTE"> <table class="NOTE" border="0" width="90%"> <tbody> <tr> <td align="center" valign="top" width="25"><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><img src="http://linux.about.com/library/graphics/redhat/note.jpg" width="25" height="25" /></span></td> <th align="left" valign="CENTER"><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b>Note</b></span></th> </tr> <tr> <td><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" > </span><br /></td> <td align="left" valign="top"> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you select a medium or high firewall to be setup during this installation, network authentication methods (NIS and LDAP) will not work.</span></p> </td> </tr> </tbody> </table> </div> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">No Firewall</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >No firewall provides complete access to your system and does no security checking. Security checking is the disabling of access to certain services. This should only be selected if you are running on a trusted network (not the Internet) or plan to do more firewall configuration later. </span></p> </dd></dl> </div> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Choose <b class="GUILABEL">Customize</b> to add trusted devices or to allow additional incoming services. </span></p> <div class="VARIABLELIST"> <dl><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">Trusted Devices</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Selecting any of the <b class="GUILABEL">Trusted Devices</b> allows access to your system for all traffic from that device; it is excluded from the firewall rules. For example, if you are running a local network, but are connected to the Internet via a PPP dialup, you can check <b class="GUILABEL">eth0</b> and any traffic coming from your local network will be allowed. Selecting <b class="GUILABEL">eth0</b> as trusted means all traffic over the Ethernet is allowed, put the ppp0 interface is still firewalled. If you want to restrict traffic on an interface, leave it unchecked. </span></p> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >It is not recommended that you make any device that is connected to public networks, such as the Internet, a <b class="GUILABEL">Trusted Device</b>. </span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">Allow Incoming</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Enabling these options allow the specified services to pass through the firewall. Note, during a workstation installation, the majority of these services are <i class="EMPHASIS">not</i> installed on the system. </span></p> <div class="VARIABLELIST"> <dl><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">DHCP</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you allow incoming DHCP queries and replies, you allow any network interface that uses DHCP to determine its IP address. DHCP is normally enabled. If DHCP is not enabled, your computer can no longer get an IP address.</span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">SSH</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><i class="EMPHASIS">S</i>ecure <i class="EMPHASIS">SH</i>ell (SSH) is a suite of tools for logging into and executing commands on a remote machine. If you plan to use SSH tools to access your machine through a firewall, enable this option. You need to have the <tt class="FILENAME">openssh-server</tt> package installed in order to access your machine remotely, using SSH tools. </span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">Telnet</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Telnet is a protocol for logging into remote machines. Telnet communications are unencrypted and provide no security from network snooping. Allowing incoming Telnet access is not recommended. If you do want to allow inbound Telnet access, you will need to install the <tt class="FILENAME">telnet-server</tt> package. </span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">WWW (HTTP)</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >The HTTP protocol is used by Apache (and by other Web servers) to serve webpages. If you plan on making your Web server publicly available, enable this option. This option is not required for viewing pages locally or for developing webpages. You will need to install the <tt class="FILENAME">httpd</tt> package if you want to serve webpages. </span></p> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Enabling <b class="GUILABEL">WWW (HTTP)</b> will not open a port for HTTPS. To enable HTTPS, specify it in the <b class="GUILABEL">Other ports</b> field. </span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">Mail (SMTP)</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >If you want to allow incoming mail delivery through your firewall, so that remote hosts can connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server using POP3 or IMAP, or if you use a tool such as <tt class="COMMAND">fetchmail</tt>. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.</span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">FTP</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >The FTP protocol is used to transfer files between machines on a network. If you plan on making your FTP server publicly available, enable this option. You must install the <tt class="FILENAME">vsftpd</tt> package for this option to be useful. </span></p> </dd><dt><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b class="GUILABEL">Other ports</b></span></dt><dd> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >You can allow access to ports which are not listed here, by listing them in the <b class="GUILABEL">Other ports</b> field. Use the following format: <tt class="USERINPUT"><b>port:protocol</b></tt>. For example, if you want to allow IMAP access through your firewall, you can specify <tt class="USERINPUT"><b>imap:tcp</b></tt>. You can also explicitly specify numeric ports; to allow UDP packets on port 1234 through the firewall, enter <tt class="USERINPUT"><b>1234:udp</b></tt>. To specify multiple ports, separate them with commas. </span></p> </dd></dl> </div> </dd></dl> </div> <table class="TIP" border="0" width="100%"><tbody><tr> <td align="center" valign="top" width="25"><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><img src="http://linux.about.com/library/graphics/redhat/tip.jpg" width="25" height="25" /></span></td> <th align="left" valign="CENTER"><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" ><b>Tip</b></span></th> </tr> <tr> <td><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" > </span><br /></td> <td align="left" valign="top"> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >To change your security level configuration after you have completed the installation, use the <b class="APPLICATION">Security Level Configuration Tool</b>.</span></p> <p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Type the <tt class="COMMAND">redhat-config-securitylevel</tt> command in a shell prompt to launch the <b class="APPLICATION">Security Level Configuration Tool</b>. If you are not root, it will prompt you for the root password to continue.</span></p><p><br /></p><p><span style=";font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;" >Refrence:http://linux.about.com/od/embedded/l/blred_inst3_22.htm<br /></span></p></td></tr></tbody></table>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-1294598532487824412009-07-06T15:44:00.005+05:302009-10-13T01:23:13.283+05:30<b style="">Network File Sharing Server</b><br /><br />NFS server in just 4 simple steps. <table border="0" cellpadding="3" cellspacing="0" width="100%"><tbody><tr><td style="padding: 20px 0pt; color: rgb(0, 61, 125); font-size: 12px; line-height: 17px;" valign="top"><br /></td></tr><tr><td style="padding-bottom: 20px;" valign="top"><style></style><p class="MsoNormal" style="text-align: center;" align="center"><b style="">Setup Network File Sharing Server</b></p><p class="MsoNormal" style="text-align: center;" align="center"><b style=""><span style="text-decoration: none;"> </span></b>Basic: Configuration file exits in /etc/exports</p><p class="MsoNormal"> </p><p class="MsoNormal">Step 1: Create a directory you want to share</p><p class="MsoNormal"> Step 2: Edit exports file</p><p class="MsoNormal"><img style="display: block;" name="2.jpg" id="2.jpg" src="http://www.linuxforums.org/articles/images/330/2.jpg" vspace="6" hspace="6" /><br /></p><p class="MsoNormal"><br /></p><p class="MsoNormal"><style></style></p><p class="MsoNormal">Step 3: now restart the portmap & nfs services</p><p class="MsoNormal"><script type="text/javascript" language="javascript" src="http://www.jdoqocy.com/placeholder-3896801?target=_top&mouseover=Y"></script><br /></p><p class="MsoNormal"><span style=""> </span>service portmap restart</p><p class="MsoNormal"><span style=""> </span><span style=""> </span>service nfs restart<noscript></noscript><br /><script src="%27http://www.ftjcfx.com/javascript/get_flash_html.js%27" type="'text/javascript'"><br /></script><br /><script type="'text/javascript'"><br /> getFlashHtml('No one 468 x 60', 468, 60, 'http://www.ftjcfx.com/flash-3541575-10606283?clickTag=http://www.tkqlhce.com/click-3541575-10606283', '', 'http://www.ftjcfx.com/image-3541575-10606283', 'http://www.tkqlhce.com/click-3541575-10606283')<br /></script><br /> <br /></p><p class="MsoNormal"> </p><span style=";font-family:";font-size:85%;" >Step 4: check NFS Server</span><p class="MsoNormal"><img style="display: block;" name="1.jpg" id="1.jpg" src="http://www.linuxforums.org/articles/images/330/1.jpg" vspace="6" hspace="6" /><br /></p><p class="MsoNormal"><style></style></p><p class="MsoNormal">We can also use <b style=""><span style="font-size:14;">#mount t NFS 192, </span></b>where <b style=""><span style="font-size:14;">th</span></b>is use to define the server type </p><p class="MsoNormal">And <b style=""><span style="font-size:14;">NFS</span></b> is the type of the server.</p><p class="MsoNormal"> Have A Happy and Safe Sharing::::: :)<br /></p></td></tr></tbody></table>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-87173082267342570412009-06-18T13:11:00.002+05:302009-10-13T01:23:13.284+05:30liveusb-creator<p style="font-weight: bold;"> <span style="color: rgb(204, 0, 0);">The liveusb-creator is a cross-platform tool for easily installing live operating systems on to USB flash drives.</span></p><p style="font-weight: bold;"><br /><span style="color: rgb(204, 0, 0);"></span></p><h2 id="Features">Features<a title="Link to this section" class="anchor" href="https://fedorahosted.org/liveusb-creator/#Features"><br /></a></h2> <ul><li>Works in Windows and Linux! </li><li>Completely non-destructive install. There is no need to deal with formatting or partitioning your USB key. </li><li>Supports automatically downloading various Fedora releases, as well as <a class="ext-link" href="http://wiki.sugarlabs.org/go/Sugar_on_a_Stick"><span class="icon">Sugar on a Stick</span></a>! </li><li>Automatically detects all of your removable devices </li><li>Persistent storage creation. This lets you to allocate extra space on your USB stick, allowing you to save files and make modifications to your live operating system that will persist after you reboot. This essentially lets you carry your own personalized Fedora with you at all times. </li><li>SHA1 checksum verification of known releases, to ensure that you've downloaded the correct bits </li></ul><p style="font-weight: bold;"> </p> <h2 id="Download">Download<a title="Link to this section" class="anchor" href="https://fedorahosted.org/liveusb-creator/#Download"><br /></a></h2> <h3 id="Windows">Windows<a title="Link to this section" class="anchor" href="https://fedorahosted.org/liveusb-creator/#Windows"><br /></a></h3> <ul><li>Windows executable: <a class="ext-link" href="https://fedorahosted.org/releases/l/i/liveusb-creator/liveusb-creator-3.6.7.zip"><span class="icon">liveusb-creator-3.6.7.zip</span></a> (11M) (<a class="ext-link" href="http://git.fedoraproject.org/git/liveusb-creator?p=liveusb-creator.git;a=shortlog"><span class="icon">ChangeLog</span></a>). <ul><li>SHA1: <tt>34e1eebcd3c86bec82c84c1173fc2dbb05dc23f4</tt> </li><li>Note: Make sure to extract the entire zip file before running. </li></ul></li></ul><h3 id="Linux">Linux<a title="Link to this section" class="anchor" href="https://fedorahosted.org/liveusb-creator/#Linux"><br /></a></h3> <p> For Fedora 9, 10 and 11, simply use Add/Remove software and search for liveusb-creator and install it or do </p> <pre class="wiki"># yum install liveusb-creator<br /></pre>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-40291126369720775872009-05-26T17:25:00.001+05:302009-10-13T01:23:13.285+05:30How to Install VLC Player in Ubuntu 8.04 LTS<p>You need to make sure that you have a “universe” mirror in your /etc/apt/sources.list</p><br /><pre>% sudo apt-get update<br />% sudo apt-get install vlc vlc-plugin-esd mozilla-plugin-vlc</pre><p>This will complete the installation</p> <p>If you want to open VLC You need to go to Applications—>Sound&Video—>VLC Media Player</p>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-51371422283974100922009-05-23T09:40:00.003+05:302009-10-13T01:23:13.286+05:30Tenth Std Results linkHere you find SSLC,Anglo Indian,Matriculation,Oslc 2009 Results<br /><br /><a href="http://tnresults.nic.in/sslc/sslc.htm">http://tnresults.nic.in/sslc/sslc.htm</a>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-16768333359422651142009-05-23T09:30:00.002+05:302009-10-13T01:23:13.288+05:30Compaq Presario C700 Audio Driver Error<span class="Text">Hi anybody have problem with Compaq Presario C700 Audio Driver<br />Dont Worry your problem will be solved here this is the dead end for this problem<br /><br />First You must Download the following Drivers First<br /><br />Universal Audio Architecture (UAA) Bus Drivers<br /><a href="ftp://ftp.hp.com/pub/softpaq/sp33501-34000/sp33867.exe">ftp://ftp.hp.com/pub/softpaq/sp33501-34000/sp33867.exe</a><br /><br />After installing Microsoft Universal Audio Architecture (UAA) Bus Drivers restart the notebook and install followong drivers:<br /><br />Conexant High Definition Audio Drivers:<br /><a href="ftp://ftp.hp.com/pub/softpaq/sp34001-34500/sp34200.exe">ftp://ftp.hp.com/pub/softpaq/sp34001-34500/sp34200.exe</a><br /><br />This will create a swsetup folder in c drive ("C:\swsetup\sp34200")<br />Installing Audio drivers may result in an error. But continue with the following steps to get the audio driver installed correctly.<br />Open the Device Manager:<br />1. Click on Start and select Run. Now type devmgmt.msc and press enter.<br />2. Right click on "Audio device on High Definition Audio Bus" and click Update driver.<br />3. Select "Install from a list or specific location"<br />4. Click Next. Then select "Don't search, I will choose the driver to install"<br />5. Click Next and then select "Sound, video and game controller" from the list.<br />6. Click Next and then click Have Disk.<br />7. Click Browse C:\swsetup\sp34200 folder and select the .inf (wis30b2a) file and click open and Continue with the onscreen instructions.<br /><br />Now you Problem is solved<br />Say CHERS.....<br />If the Problem is Still arrives send a comment or Query to me<br /></span>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-89543455082393618282009-05-21T16:49:00.001+05:302009-10-13T01:23:13.289+05:30SAP Software Installation ECC5.0<p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >These are the steps to install the SAP ECC 5.0 software</span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Recommended OS : Win 2003 Adv Server </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Make three partitions </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >9 GB - OS Drive </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >62 GB - Database Drive </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >xx GB - Drive to have Dumps </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >After OS installation, install video, audio and chipset drivers. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Copy all dumps to the third drive as mentioned above. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >1. Install LoopBack Adapter. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Start -> Settings -> Conrol Panel -> Add/Remove Hardware </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click Next -> Click Next -> Select Add a New Device & Click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select the radio button( No, I want to select from list) & click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select Network Adapters in the list & Click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select Microsoft & Microsoft LoopBack Adapter on the right side panel & Click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click Next -> yes -> Click Finish. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Assign IP Address to the loopback adapter. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Go to network Connections => Change the Properties of Microsoft LoopBack Adapter to the below IP address: </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >IP : 192.168.10.1 </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Subnet Mask : 255.255.255.0 </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >2. Change the database Drive settings. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Go to System Properties (system in Control Panel) => In Advanced Tab select performance options => Click on change => In that select D Drive => Set </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Initial Size - 3000</span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Max Size - 10000 - Set and Apply the changes. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >3. Installation of Oracle 9/10</span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Go to <st1:street><st1:address>CD Drive</st1:address></st1:street> -> Oracle 9/10 -> NT -> I386 -> Setup -> Click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Change Path :- C:\Oracle\Ora9/10 </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click Next -> Select First Radio Button -> Click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select Typical -> Click Next -> </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Global DataBase Name - ORCL , </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >SID -ORCL </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click Next -> Install -> OK -> Exit -> Yes </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Wait for 20 Minutes. It varies on your computer Hardware Configuration. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >And then Restart your computer. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >4. Installation of Java Standard Development Kit </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Go to <st1:street><st1:address>CD Drive</st1:address></st1:street> -> And install J2SDK_1_4_2-nb-3_5_1-bin-windows </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click Next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> select Accept -> Click Next -> Click Next -> Opt Yes. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Deselect Two Check Boxes. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >( Yes, I want to associate java files with IDE & </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Yes, I want to associate NBM files with IDE ) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click Next -> Click Next -> Click Next -> Click Finish </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Run -> Browse -> C:\ProgramFiles -> J2SDK_n -> J2SDK1.4.2 </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select All Files in Files of Type dropdown list -> Select src -> Copy to C:\ProgramFiles -> J2SDK_n -> J2SDK1.4.2 </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >System Properties -> Advanced tab -> Environment Variables -> click NEW to generate user variables </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> variable Name : JAVA_HOME </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> variable value : paste(C:\ProgramFiles -> J2SDK_n -> J2SDK1.4.2) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >--- ok </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> select path under system variables -> edit -> </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> variable Name : PATH </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> variable value : put ; on last & paste(C:\ProgramFiles -> J2SDK_n -> J2SDK1.4.2)\bin </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >6. Installation of kernal </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >->(Go to Dumps drive -> Kernel 5.0<span style=""> </span>-> NT -> I386 ->( NT Patch) -> (Double Click on R/3 Dillins) -> ok.) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >->Go to Dumps drive -> Kernel 5.0 ->SAPINST -> NT -> double click on Setup -> I agree -> Select Standered Radio button & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select reboot radio button & click on ok -> ok </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Restart (After restart automatically installation run promt started) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select SAP R/3 Enterprise 5.0 for oracle radio button & Click on next - > I agree </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select Install server components radio button & Click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> SAP system ID : ERP </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Select Central instance radio button & Click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select Local instlation Radio button & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Give password : sap & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Again give password: sap & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> After complete press ok.( It will take 15min time)<br /></span></p><p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" ><script type="text/javascript" language="javascript" src="http://www.dpbolvw.net/placeholder-3896789?target=_top&mouseover=Y"></script><br /></span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >7.Installation of SAP Data base. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Start -> All Programs -> SAPinst oracle kernal -> Click on New Installation ( a command promt appears & closes) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Start -> All Programs -> SAPinst oracle kernal -> Click on SAPinst server with GUI </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select SAP R/3 Server with GUI & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> I agree </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select install server components & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> SAP system id : ERP </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Select Data base installation & click on next.(If it is struck close the installation restart again come from begining of 7th step) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Select install (first) SAP system into a new database & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> select local installation & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >->Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Change drives </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Drive for the directories Saparch,sapbackup,sapreorg,sapcheck&saptrace : D </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Drive for the redolog archives directories(oraarch) : D </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Click on Next. </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Give pass word : sap & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> again give password : sap & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Give Cd export location </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Brouse & choose package location of -> Db1-> Export1 -> Lable.asc & click on next </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >->Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Give remaining cd's </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Brouse & choose </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Export (2/7) --> db2 -> Export2 -> Label.asc </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Export (3/7) --> db3 -> Export3 -> Label.asc </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Export (4/7) --> db3 -> Export4 -> Label.asc </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Export (5/7) --> db3 -> Export5 -> Label.asc </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Export (6/7) --> db3 -> Export6 -> Label.asc </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >Export (7/7) --> db3 -> Export7 -> Label.asc </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >---> OK </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change)/Start </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Click on next(no change) </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >-> Continue Installation (select prepare multinational language support). </span></p> <p class="MsoNormal"><span style="color: rgb(51, 51, 51);font-family:Arial;font-size:85%;" >It will take 12 to 15 hrs time depending on your computer hardware configuration.</span></p>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-84194967612699114852009-05-21T16:40:00.001+05:302009-10-13T01:23:13.290+05:30Post Installation Steps For ECC 5.0<b style="font-family: courier new;"><span style="color: rgb(204, 0, 0);"><span style="font-size:85%;">Post Installation Steps For ECC 5.0</span></span></b> <p style="font-family: courier new;"><b>What are the post installation steps after I have installed the Central Instance and Database instance?</b> </p><p style="font-family: courier new;">Initial Consistency Check<br />SM28<br />1. Logon to the newly refreshed SAP system and run transaction SM28<br />2. Ensure that no errors are reported. Otherwise, take the necessary steps to correct the problems. </p><p style="font-family: courier new;">Edit Batch Jobs<br />1. Set the fields as follows<br />Job name: RDDIMPDP*<br />User name: *<br />Job Status: Released and Ready checked off, all others unchecked<br />Fr: 01/01/0001<br />To: 12/31/9999<br />Or after event: *<br />2. Press <f8> to execute the query<br />3. Highlight the first job in the list and press the <ctrl>+<f11> to change the job.<br />4. Examine the Exec Target field.<br />a. If the box is empty, press <f3> to exit<br />b. If the box is not empty, then clear out the contents so the field is blank and press <ctrl>+<s> to save<br />5. Repeat Steps 3 and 4 *for* each additonal job listed. </s></ctrl></f3></f11></ctrl></f8></p><p style="font-family: courier new;"><s>Workbench Organizer Reconfiguration<br />1. Logon on to client 000 of the newly refreshed system with DDIC. </s></p><p style="font-family: courier new;"><s>SE06<br />1. Select the Database Copy or migration option<br />2. Press the Post-installation Processing button.<br />3. When prompted Do you want to re-install the CTS?, press the Yes button<br />4. When prompted *for* the Source System of Database Copy?, make sure that the <sid> of the production system is selected. Press the checkmark button to continue.<br />5. When prompted Change originals from PRD to QUA?, press the Yes button<br />6. When prompted Delete TMS Configuration?, press the Yes button<br />7. When prompted Delete old TMS configuration?, press the Yes button<br />8. When prompted Delete Old Versions of transport routes?, press the No button </sid></s></p><p style="font-family: courier new;"><s>TMS Configuration<br />1. Logon on to client 000 of the newly refreshed system. </s></p><p style="font-family: courier new;"><s>STMS<br />1. Upon starting STMS, a windows with the title TMS: Include System in Transport Domain should be displayed<br />2. The information on *this* screen is automatically filled out from information provided during the SAP installation and should be correct. If it correct, then enter a description *for* the system and press <ctrl>+S to save. Otherwise, press the Other configuration button and manually configure.<br />3. From the Overview menu, select Transport Routes<br />4. From the Configuration menu, select Adjust with Controller<br />5. Press the Yes button when prompted *if* you want copy the transport routes from the controller. </ctrl></s></p><p style="font-family: courier new;"><s>Import Printers<br />1. Logon on to the production client of the newly refreshed system. </s></p><p style="font-family: courier new;"><s>STMS<br />2. Press <f5> to go to the *import* Overview.<br />3. Double click on the <sid> of the newly refresh system<br />4. From the Extras menu select Other Requests, then Add.<br />5. In the Transp. Request box, enter the transport number containing the printer definitions that was exported. Press <enter> to save.<br />6. Select the transport that was just added to the queue and press <ctrl>+<f11> to start the import.<br />7. In the Target client box, enter the productive client of the newly created system. Press <enter> to save.<br />8. Press the <yes> button to start the transport. </yes></enter></f11></ctrl></enter></sid></f5></s></p><p style="font-family: courier new;"><s>Client Configuration<br />SCC4<br />1. From the Table view menu, select Display -> Change<br />2. When warned that the table is cross-client, press the checkmark button.<br />3. Double click on one of the non-system clients (i.e. not client 000, 001 or 066)<br />4. Define client as follows:<br />Client role: Test<br />Changes and transports *for* client-specific object: Changes without automatic recording<br />Client-independent object changes: Changes to repository and cross-client customizing allowed<br />Protection: Client copier and comparison tool: Protection level 0<br />Restrictions when starting CATT and eCATT: eCATT and CATT allowed<br />5. Press <ctrl>+S to save.<br />6. Repeat steps 4 through 6 *for* any additional clients </ctrl></s></p><p style="font-family: courier new;"><s>Set System Change Option<br />SE06<br />1. Press the System Change Option button.<br />2. Set the global setting to Modifiable<br />3. From the Edit menu, select Software Components Modifiable<br />4. From the Edit menu, select Namespaces Modifiable<br />5. Press <ctrl>+S to save. </ctrl></s></p><p style="font-family: courier new;"><s>Import Users<br />STMS<br />1. Press <f5> to go to the Import overview<br />2. Double click on the <sid> of the newly refreshed system.<br />3. Press <f5> to refresh the list of transports<br />4. Locate the transport in the list containing the user exports done before the start of the refresh.<br />If the transport is NOT in the list, then from the Extras menu, select Other requests then Add. Enter the transport number and press <enter>. Then press the Yes button to add the transport.<br />5. Highlight the transport and press the Import request icon .<br />6. At the client *import* screen, enter the target client and then press the Import button<br />7. Press <enter> to confirm that the *import* will proceed </enter></enter></f5></sid></f5></s></p><p style="font-family: courier new;"><s>SCC7<br />1. Run the Post Client Import Processing<br />2. The transport number should be the same as that of the transport started in STMS<br />3. Schedule the job to run in the background. Do NOT schedule it to run immediately. We need to modify the job before it can be released.<br />4. Press <ctrl>+S to save. </ctrl></s></p><p style="font-family: courier new;"><s>SM37<br />1. Set the fields as follows<br />Job name: CLIENTIMPORT*<br />User name: *<br />Job Status: All options checked<br />Fr: 01/01/0001<br />To: 12/31/9999<br />Or after event: *<br />2. Highlight the job that was created by SCC7 and press <ctrl>+<f11> to modify the job.<br />3. Press the Step button.<br />4. Select the RSCLXCOP line and press <ctrl>+<shift>+<f7> to modify that step.<br />5. In the User box, enter the background user *for* that particular system (i.e BGDUSER, SAPBATCH, BATCHSAP).<br />6. Press <ctrl>+S to save the changes<br />7. Press <f3> to go back to the main job screen.<br />8. Press the Start condition button.<br />9. Press the Immediate button.<br />10. Press <ctrl>+S to save the changes<br />11. Press <ctrl>+S again to save all the changes to the job.<br />12. Job will start immediately once saved. Press <f8> to refresh the list of jobs<br />13. Continue to press <f8> every once in a *while* to update the status of the job. Do not *continue* until the job is completed sucessfully. </f8></f8></ctrl></ctrl></f3></ctrl></f7></shift></ctrl></f11></ctrl></s></p><p style="font-family: courier new;"><s>SCC4<br />1. From the Table view menu, select Display -> Change<br />2. When warned that the table is cross-client, press the checkmark button.<br />3. Double click on one of the non-system clients (i.e. not client 000, 001 or 066)<br />4. Set the Protection to Protection level 1<br />5. Press <ctrl>+S to save.<br />6. Repeat steps 3 through 5 *for* any additional clients </ctrl></s></p><p style="font-family: courier new;"><s>Deleting Source System Profiles<br />RZ10<br />1. From the Utilities menu, select Import Profiles then Of Active Servers.<br />(Note: All application servers of the target system must be started)<br />2. If the Display Profile Check Log screen is displayed, press <f3> to leave *this* screen.<br />3. Select the Profile field and press <f4> to bring up a list of profiles.<br />4. From the list select one of the profiles associated with the source production system.<br />5. From the Profile menu, select Delete, then All versions, then of a profile.<br />6. When prompted, press the Yes button to delete all version of the profile<br />7. When prompted to delete the file at the operating system level, press the No button.<br />8. Repeat steps 3 through 7 *for* all additional profiles associated with the source system </f4></f3></s></p><p style="font-family: courier new;"><s>Reconfigure Operation Modes<br />RZ04<br />1. From the Operation Mode menu, select Timetable<br />2. Select Normal Operation and press the Change button.<br />3. Highlight 00:00 in the left hand column and press the Delete Assignment button<br />4. If all the assignments are not deleted, then highlight the start time of the outstanding assignment and press the Delete Assignment button.<br />5. Once all the assignments are deleted, press <ctrl>+S to save.<br />6. If warned about an empty timetable, press the checkmark button and then press Yes to save the empty timetable.<br />7. Press <f3> to go back to the main RZ04 screen.<br />8. Right click on one of the listed Operation modes and select Delete<br />9. Press the Yes button to confirm the deletion.<br />10. Repeat steps 8 through 9 *for* any additional operation modes<br />11. Press <f5> to create a *new* operation mode.<br />12. Enter a name and *short* description *for* the operation mode<br />13. Press <ctrl>+S to save.<br />14. Press <f6> to create a *new* Instance<br />15. From the Settings menu, select Based on current settings, then New Instances, then Set<br />16. Press <f3> to go back to the main RZ04 screen.<br />17. Press the Yes button to save<br />18. From the Operation Mode menu, select Timetable<br />19. Select Normal Operation and press the Change button.<br />20. Highlight the 00:00 at the top and press <f2><br />21. Highlight the 00:00 at the bottom and press <f2><br />22. Press the Assign button.<br />23. Press <f4> to select the operation mode created above.<br />24. Press <ctrl>+S to save. </ctrl></f4></f2></f2></f3></f6></ctrl></f5></f3></ctrl></s></p><p style="font-family: courier new;"><s>Delete Update Failures<br />SM13<br />1. Set the fields as follows<br />Client: *<br />User: *<br />From data: 01/01/0001<br />From time: 00:00:00<br />2. Press <enter> to display the list of outstanding update requests<br />3. If ALL the outstanding update requests have a status of ERR, then it is safe to delete these requests by pressing <f5> to select all records, then selecting the Update Records menu, then Delete.<br />4. Press the Continue button to confirm the deletion. </f5></enter></s></p><p style="font-family: courier new;"><s>Delete Batch Input Sessions<br />SM35<br />1. From the Edit menu, select Select All<br />2. Press <shift>+<f2> to delete all the batch input sessions.<br />3. Press the checkmark button to confirm<br />4. Press the Yes button to start the delete. </f2></shift></s></p><p style="font-family: courier new;"><s>Reorganize Spool<br />SPAD<br />1. From the Administration menu select Clean-up Spool<br />2. Check all check boxes and enter 0 *for* minimum age<br />3. Press the Execute button<br />4. Once complete, press <f3> twice to get back to the main SPAD screen<br />5. From the Administration menu select Check Consistency<br />6. Press the Delete All button. </f3></s></p><p style="font-family: courier new;"><s>SP12<br />1. From the TemSe database menu, select Consistency check<br />2. When the check is complete, press the Delete All button. </s></p><p style="font-family: courier new;"><s>Delete Invalid Background Control Objects<br />SM61<br />1. Press <f8> to *switch* in to change mode<br />2. Press the Cleanup List button. </f8></s></p><p style="font-family: courier new;"><s>Restrict Outgoing Email and Faxes </s></p><p style="font-family: courier new;"><s>SCOT<br />1. Double click on the green Fax entry<br />2. From the Supported Address Types area, press the Set button that is beside Fax<br />3. In the Address area, ADJUST AS NECESSARY<br />4. Double click on the green SMTP entry<br />5. From the Supported Address Types area, press the Set button that is beside Internet<br />6. In the Address area, ADJUST AS NECESSARY </s></p><p style="font-family: courier new;"><s>Adjust RFC connections.<br />SM59<br />1. Expand the TCP/IP connections section<br />2. Double click on the first entry listed<br />3. Check the gateway host and gateway server to make sure it points to the appropriate NON-PRODUCTION system. </s></p><p style="font-family: courier new;"><s>Make changes as necessary.<br />4. Press the Test Connection button to test the connection<br />5. Press Press <ctrl>+S and then <f3> to save and *return* to the list of RFCs.<br />6. Repeat steps 1 through 5 *for* each additional RFC connection </f3></ctrl></s></p><p style="font-family: courier new;"><s>Convert Logical Systems<br />Under no circumstances perform *this* procedure on a Production system<br />BDLS<br />1. When warned to read the documentation, press the checkmark button.<br />2. In the Old logical system name box, press <f4>.<br />3. Select one of the production Logical System names that needs be changed (i.e. WIIPRD400)<br />4. In the New logical system name, enter what that logical system name should be called on *this* newly refreshed system (i.e.WIITRN400) Note: Ignore Error/Warning about duplicate system by clicking on the check mark.<br />5. De-select the Test Run and Existence check on *new* names in tables options<br />6. From the Program menu, select Execute in background<br />7. Press the checkmark button when asked to select a spool device<br />8. Press the Immediate button when asked *for* the schedule<br />9. Press <ctrl>+S to save<br />10. Use SM37 to monitor the job<br />11. When job is complete, repeat steps 2 through 10 *for* any additional logical system names that need to be changed. </ctrl></f4></s></p><p style="font-family: courier new;"><s>Adjust Logical Systems names<br />SALE<br />1. Expand Sending and Receiving Systems, then Logical Systems<br />2. Click on the execute icon beside Define Logical System<br />3. Press the checkmark button to confirm that the change is cross client<br />4. … </s></p><p style="font-family: courier new;"><s>Allow Certains Settings to be modifiable<br />(Refer to Note 356483 *for* more Details)<br />SM54<br />1. Enter V_T001B in the Table/View box.<br />2. Select the Generated Objects option.<br />3. Press the Create/Change button.<br />4. Enter any access keys *if* requested<br />5. Change the Recording routine to no, or user, recording routine.<br />6. Press <ctrl>+S to save<br />7. Press <enter> *if* warned that you are changing a function group that doesn't belong to you.<br />8. You are prompted *for* transport. Create a *new* local transport.<br />9. Repeat steps 1 through 8 *for* the following objects. You can specify the same transport you created above.<br />V_T001B_GL<br />V_T093B_01<br />V_T093B_02 </enter></ctrl></s></p><p style="font-family: courier new;"><s>BSI Configuration (R3 HR Systems only)<br />SM59<br />1. Expand TCP/IP Connections<br />2. Highlight BSI70-US-TAX and press the Change button<br />3. Change the program field to \\<hostname>\sapmnt\<sid>\SYS\EXE\RUN\TF60SERVER.EXE<br />4. Double check the target host and gateway point to the correct server<br />5. Press <ctrl>+S to save<br />6. Press the Test connection button to test. If the connect is not successful, take the necessary steps to resolve the issue. </ctrl></sid></hostname></s></p><p style="font-family: courier new;"><s>SE38<br />1. In the Program field, enter RPUBTCU0<br />2. Press <f8> to execute<br />3. Select option BSI version 7.0<br />4. Press <f8> to execute<br />5. BSI should *return* tax calculations. If there are errors, take the necessary steps to resolve. </f8></f8></s></p><p style="font-family: courier new;"><s>Reconfigure DB13 schedule<br />DB13<br />1. Using the print out created before the refresh, recreate the DB13 calendar. </s></p><p style="font-family: courier new;"><s>Client Configuration<br />SCC4<br />1. From the Table view menu, select Display -> Change<br />2. When warned that the table is cross-client, press the checkmark button.<br />3. Double click on one of the non-system clients (i.e. not client 000, 001 or 066)<br />4. Define clients as follows depending on client role </s></p><p style="font-family: courier new;"><s>Development<br />Client role: Customizing<br />Changes and transports *for* client-specific object: Automatic recording of changes<br />Client-independent object changes: Changes to repository and cross-client customizing allowed<br />Protection: Client copier and comparison tool: Protection level 0<br />Restrictions when starting CATT and eCATT: eCATT and CATT allowed </s></p><p style="font-family: courier new;"><s>Quality Assurance<br />Client role: Test<br />Changes and transports *for* client-specific object: No changes allowed<br />Client-independent object changes: No Changes to repository and cross-client customizing allowed<br />Protection: Client copier and comparison tool: Protection level 0<br />Restrictions when starting CATT and eCATT: eCATT and CATT allowed </s></p><p style="font-family: courier new;"><s>Training<br />Client role: Education<br />Changes and transports *for* client-specific object: No changes allowed<br />Client-independent object changes: No Changes to repository and cross-client customizing allowed<br />Protection: Client copier and comparison tool: Protection level 0<br />Restrictions when starting CATT and eCATT: eCATT and CATT allowed </s></p><p style="font-family: courier new;"><s>Sandbox<br />Client role: Test<br />Changes and transports *for* client-specific object: Changes without automatic recording<br />Client-independent object changes: Changes to repository and cross-client customizing allowed<br />Protection: Client copier and comparison tool: Protection level 0<br />Restrictions when starting CATT and eCATT: eCATT and CATT allowed </s></p><p style="font-family: courier new;"><s>5. Press <ctrl>+S to save.<br />6. Repeat steps 4 through 6 *for* any additional clients<br />Set System Change Option<br />Skip *this* section of the system is a Development or Sandbox System. </ctrl></s></p><p style="font-family: courier new;"><s>SE06<br />1. Press the System Change Option button.<br />2. Set the global setting to Not Modifiable<br />3. Press <ctrl>+S to save. </ctrl></s></p><p style="font-family: courier new;"><s>Release Background Jobs<br />Currently, all background jobs, except *for* system standard jobs have been placed on hold (status scheduled). </s></p>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-39491511131720158272009-05-14T11:42:00.001+05:302009-10-13T01:23:13.291+05:30+2 Results More linkshttp://www.squarebrothers.com/<br /><br />http://www.pallikalvi.in/<br /><br />http://www.dinakaran.com/plustwo<br /><br />http://tnresults.nic.in/hsc/hsc.htm<br /><br />http://208.101.45.126/index.asp<br /><br />http://174.36.65.6/index.aspGanapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-66778675829348635122009-05-14T10:06:00.002+05:302009-10-13T01:23:13.292+05:30Plus two resultsSee the following links<br /><br />http://www.dinakaran.com/plustwo<br /><br />http://tnresults.nic.in/hsc/hsc.htm<br /><br />http://208.101.45.126/index.asp<br /><br />http://174.36.65.6/index.asp<br /><br />Plus two results link<br /><br />Plus two results link<br /><br />Plus two resultGanapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-24982068812592386002009-05-12T19:47:00.001+05:302009-10-13T01:23:13.294+05:30Fix for Messenger webcam problem<div class="article_subhead"><h1 class="article_title">Fix for Messenger webcam problems</h1></div><div class="article_subtitle"><div style="padding-right: 0cm; margin-top: 0cm; padding-left: 0cm; margin-bottom: 0pt; line-height: 1.5;"> A workaround has been released for installing your webcam with Windows Live Messenger. </div></div><div style="width: 209px;" class="article_illustration image_right"><table><tbody><tr><td class="image_cell"><div class="article_image"><img style="width: 277px; height: 209px;" src="http://estb.msn.com/i/EE/EE67AA9E88D92FCE36753963BA5B5.jpg" alt="Windows Live Messenger" /></div></td></tr></tbody></table></div><div style="line-height: 1.5;">The following message was recently circulated by the Windows Live team in response to an issue that some users were experiencing. Follow the advice below to clear up any issues caused by installing the new version of Messenger. </div> <div style="line-height: 1.5;"> </div> <div style="line-height: 1.5;">“We’ve heard that a small number of you are experiencing audio and video problems with your webcam after installing the latest version of Windows Live Messenger. After looking into this, we found that for users who are seeing error code 0x8AC70013 or 0x8AC70202, this may be caused by an incompatibility with McAfee Site Advisor. </div> <div style="line-height: 1.5;"> </div> <div style="line-height: 1.5;">McAfee is working on a patch to fix this, but until it becomes available, if you’re having audio or video problems with the new version of Messenger and are running McAfee, McAfee has posted a workaround on its website."<br /><br /><br />more info <a href="http://windowslive.uk.msn.com/messenger/guides/article.aspx?cp-documentid=13170003">Visit here.....</a><br /></div>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0tag:blogger.com,1999:blog-4767826348131329932.post-74145043228535670832009-05-08T18:28:00.003+05:302009-10-13T01:23:13.296+05:30Subnet a Network Basic Steps<span class="newbody"><p class="first">A properly designed subnet can do wonders for the security and performance of a network. The main idea in subnetting is to divide a network into smaller pieces, which we call subnets. Actually implementing a subnet is typically more difficult than simply using the default subnet mask of 255.255.255.0. This usually means that temporary or smaller networks do not need to be subnetted.</p> <p>Security sees benefit since the IP addresses of the host computers on each subnet are masked by the network address- which means they are invisible to the outside world. We call this network address translation, or NAT. This same technique helps conserve IP addresses, since all hosts on the subnet essentially just use the network IP address during communication.</p> <h3>A Basic Review on Subnetting</h3> <p class="white">If you’re a little rusty on the basics of subnetting, don’t worry. We’ll cover everything you need to know from beginning to end. First thing first: we need to learn about the IP basics.</p> <p>The current version of internet protocol, or IP, is IP version 4. This IP version allows four octets of data to represent an IP address. Each octet is considered to be a byte, so there are 8 bits in every octet. Note that in binary form you can see that there are 8 numbers, each one consisting of a bit. Finally, each octet is separated by a period, as shown below.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/ip-address-scheme.jpg" alt="subnet" /></p> <p>Each IP address is usually represented in decimal form, as seen above as “192.168.2.1”. However, each IP address is actually used by computers in binary form. You may have noticed a huge flaw in IP version 4: the amount of unique IP addresses is limited! To be exact, only 4,294,967,296 unique IP addresses can be created. This may seem like a large number but keep in mind every single device in the world needs a unique IP address to communicate with one another while online.</p> <p>The IP version 6 protocol was created for when the transition is needed. Most computers don’t use IPv6 just yet, but in the future it will inevitably be used. (In case you were wondering, IPv6 will support 2^128 unique IP addresses… egad!)</p> <h3>Classes</h3> <p>There are three main types of classifications of IP addresses in IPv4: class A, class B, and class C. There are class D and class E types, but those are for multicasting and private uses, respectively. Each class differs by the number of network and host octets it has. Each network octet is for classifying which network a host is on. More network octets will mean more networks! Likewise, each host octet specifies a host that can be assigned to the network. More host octets means more computers per network.</p> <p>Each class has a certain range that the first octet can be assigned to. This lets us know to what network class any IP belongs to with ease. Review the diagram below to see a visual diagram.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/network-ranges.jpg" alt="how to subnet" /></p> <p>Now the bad news: you must memorize each range for each class if you hope to pass most network exams. Don’t worry! It’s actually easy- just memorize how we get the numbers, not the numbers themselves! All you have to do is remember <strong>n^8</strong> (read as “n” to the eighth power), and how many network portions each class has. Review the diagram below.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/network-range-help.jpg" alt="subnetting a network" /></p> <p>One final note before we move on. Notice how we didn’t use the IP address 127 for the class A network- that’s because this is loopback address. We use this for testing configurations on the IP network. Also take note that there are reserved IP addresses, such as those for private networks. These IP addresses will not connect to the internet, which is handy if you just want computers to be connected with each other- and not the whole world.</p> <h3>Subnet Masks</h3> <p>A subnet mask is what we use to assign different amounts of networks and hosts to an IP network. It essentially divides the IP address into two parts: the network and host. This is a trading game- the more hosts you have, the fewer networks you will have. And yet the more networks you have, the fewer hosts you will have. Review the class A default subnet masks as shown below.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/class-a-subnet.jpg" alt="class a subnet" /></p> <p>The class B network will need to recognize two network portions, and two host portions. This can be seen in the below diagram.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/class-b-subnet.jpg" alt="class b subnet" /></p> <p>Lastly, we have the class C subnet. It is the most commonly used subnet, so pay special attention to it in the upcoming lecture. You can see a diagram of the default subnet below.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/class-c-subnet.jpg" alt="class c subnet" /></p> <h3>We’ve laid Down the Foundation, Let’s Build the House!</h3> <p class="white">We just reviewed the basics of IP addresses and subnet masks. The bad news is, we usually don’t use the default subnet mask at all when we subnet a network! The good news is, learning how to subnet isn’t too hard. It will, however, take some practice.</p> <h3>An Example of Subnetting a Class C Network</h3> <p>Subnetting varies in difficulty, depending on which class you are subnetting. More often than not, you will need to create a subnet for a class C network. A class C network allows for many networks to be created, but not as many hosts. In fact, you can create a hefty 2,097,152 networks- but only 254 hosts per network are allowed.</p> <p>Let’s say we are subnetting a school’s network. We need 5 separate networks that have 30 computers on each subnet.</p> <p>First we calculate how many usable subnets we need. Next we will need to determine how many hosts are required. Both of these values can be calculated with the following equations:</p> <p><strong>Two Important Equations to Remember:</strong></p> <ul><hr /><li> <strong>1.</strong> Usable Subnets = (2^n) – 2 , where N = power of bits assigned</li><li><strong>2.</strong> Usable Hosts = (2^n) – 2 , where N = power of bits remaining</li><p><r></r></p></ul> <p>Let’s start with usable subnets. Review the diagram below for a visual example.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/subnet-problem.jpg" alt="subnet practice" /></p> <p>If you are wondering what the “-2” part of the equation is for, this is how we account for the two addresses in each subnet we can’t use. We will review what these addresses are for more specifically later on. For now, let’s find out what our usable hosts are!</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/subnet-solution.jpg" alt="subnet solutions" /></p> <h3>Alright Already! What’s My Subnet Mask?!</h3> <p class="white">Getting your subnet mask at this point is incredibly easy. Simply take all of your network bits, and add them up. Look at the diagram below for a visual guide.</p> <p style="text-align: center;"><img src="http://www.learn-networking.com/wp-content/oldimages/subnet-mask.jpg" alt="subnet mask" /></p> <p>That’s it! You’re done. You have successfully created a subnet mask that can be used on the school’s network. Keep in mind that every computer must have the subnet mask set in order for them to be on the same network. Also note that since we are using a class C network, the first three octets will always be 255. When subnetting other classes, be sure to keep the network portions in mind.</p><p><br /></p><p><a href="http://learn-networking.com/network-design/how-to-subnet-a-network">Read more......</a><br /></p></span>Ganapathy Alias SDPhttp://www.blogger.com/profile/05148294138734148643noreply@blogger.com0