#tech notez#

site moved and updated : tech-notez.com

Posted in Uncategorized by arunvarughese on August 1, 2010

Please go to my self hosted site to get more updated info:

tech-notez.com

Tagged with:

Windows Shortcut Keys

Posted in Windows by arunvarughese on November 29, 2009

General keyboard shortcuts

* CTRL+C (Copy)
* CTRL+X (Cut)
* CTRL+V (Paste)
* CTRL+Z (Undo)

(more…)

Tagged with: , ,

Wiring Ethernet Cables

Posted in Networking by arunvarughese on November 2, 2009

How to wire your own ethernet cables and connectors.
What You Need:
Required:

* Cable – bulk Category (Cat) 5, 5e, 6 or higher cable
* Wire Cutters – to cut and strip the cable if necessary
* For Patch Cables: RJ45 Plugs
* RJ45 Crimper

(more…)

Cisco Router and Switch Commands

Posted in Networking by arunvarughese on November 2, 2009

Basic Cisco Router Commands
Router Name> User executable mode, view but can’t make changes
Router Name>  enable Gets you to Privilege mode allowing you to make changes to the router
Router Name # Privilege mode, changes can now be made to router
Router Name #  disable To get back to user mode
Router Name #  exit To exit router

(more…)

Comments Off on Cisco Router and Switch Commands

TCP / IP

Posted in Networking by arunvarughese on October 31, 2009

The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks. The Internet, an international Wide Area Network, uses TCP/IP to connect government and educational institutions across the world. TCP/IP is also in widespread use on commercial and private networks. The TCP/IP suite includes the following protocols.

(more…)

Maintaining IIS Log Files

Posted in Windows by arunvarughese on October 26, 2009

Many network administrators by now have encountered serious Web server intrusions that have resulted in legal action. Often IIS logs are the primary evidence used to track down Web intruders.

Proving that your log files are credible requires that you provide convincing arguments that they are trustworthy and therefore valid as evidence. You must take measures to protect the accuracy, authenticity, and accessibility of your IIS log files. Below are some tips that should increase the credibility of your IIS logs.

(more…)

Tagged with:

Comments Off on Maintaining IIS Log Files

Linux System Monitoring Tools

Posted in Linux by arunvarughese on October 26, 2009

These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as:

(more…)

Comments Off on Linux System Monitoring Tools

Log files

Posted in Linux by arunvarughese on October 26, 2009
  • /var/log/message: General message and system related stuff
  • (more…)
Tagged with: ,

Comments Off on Log files

Configuration Files

Posted in Linux by arunvarughese on October 26, 2009

/etc/profile – System wide environment variables for all users.

/etc/aliases – Where the user’s name is matched to a nickname for e-mail.

(more…)

Comments Off on Configuration Files

OpenVZ

Posted in Linux by arunvarughese on October 25, 2009

OpenVZ allows the user to create VEs, or Virtual Environments, which seem very much like real computers. Real computer can run various distributions: Debian, Gentoo, Red Hat and Novell products, etc. In the same way, a VE can be based on various OS (Operating System) templates. On the LiveCD only few minimal OS templates are installed because of disk space limit. Each VE is identified by its number — a VEID.

(more…)

Tagged with: ,

Comments Off on OpenVZ