Please go to my self hosted site to get more updated info:
General keyboard shortcuts
* CTRL+C (Copy)
* CTRL+X (Cut)
* CTRL+V (Paste)
* CTRL+Z (Undo)
How to wire your own ethernet cables and connectors.
What You Need:
* Cable – bulk Category (Cat) 5, 5e, 6 or higher cable
* Wire Cutters – to cut and strip the cable if necessary
* For Patch Cables: RJ45 Plugs
* RJ45 Crimper
Basic Cisco Router Commands
Router Name> User executable mode, view but can’t make changes
Router Name> enable Gets you to Privilege mode allowing you to make changes to the router
Router Name # Privilege mode, changes can now be made to router
Router Name # disable To get back to user mode
Router Name # exit To exit router
The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks. The Internet, an international Wide Area Network, uses TCP/IP to connect government and educational institutions across the world. TCP/IP is also in widespread use on commercial and private networks. The TCP/IP suite includes the following protocols.
Many network administrators by now have encountered serious Web server intrusions that have resulted in legal action. Often IIS logs are the primary evidence used to track down Web intruders.
Proving that your log files are credible requires that you provide convincing arguments that they are trustworthy and therefore valid as evidence. You must take measures to protect the accuracy, authenticity, and accessibility of your IIS log files. Below are some tips that should increase the credibility of your IIS logs.
These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as:
/etc/profile – System wide environment variables for all users.
/etc/aliases – Where the user’s name is matched to a nickname for e-mail.
OpenVZ allows the user to create VEs, or Virtual Environments, which seem very much like real computers. Real computer can run various distributions: Debian, Gentoo, Red Hat and Novell products, etc. In the same way, a VE can be based on various OS (Operating System) templates. On the LiveCD only few minimal OS templates are installed because of disk space limit. Each VE is identified by its number — a VEID.