<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-27391057965833544</id><updated>2026-02-02T08:06:46.023+08:00</updated><category term="windows 2000"/><category term="windows xp"/><category term="redhat"/><category term="Linux"/><category term="unix"/><category term="File Utility"/><category term="System Tuning"/><category term="Freeware"/><category term="shell scripts"/><category term="Security"/><category term="networking"/><category term="GPL GNU"/><category term="Internet"/><category term="Amazing Fact"/><category term="Windows Registry"/><category term="ms-dos"/><category term="living tips"/><category term="travel to malaysia"/><category term="Nagios"/><category term="Programming Tool"/><category term="Renovation"/><category term="funny stuff"/><category term="hardware"/><category term=".Net"/><category term="C Programming"/><category term="C#"/><category term="DB2"/><category term="Database"/><category term="Email"/><category term="Financial Freedom"/><category term="Investment"/><category term="Stock Trading"/><category term="VBScripts"/><category term="Visual Basic"/><category term="Windows Shell Scripts"/><category term="digital player"/><category term="health"/><category term="herbs"/><category term="olympic"/><category term="sport"/><title type='text'>Blogger Digest</title><subtitle type='html'>Every pieces of experience in life...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>56</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-7547855080719978251</id><published>2006-10-15T23:11:00.001+08:00</published><updated>2009-11-16T01:04:47.635+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Linux Command To Confirm Bad Sector</title><content type='html'>Hard disk being one of the vital components in computer system. Unfortunately, hard disk is also being one of the most high risk and sensitive components that is prone to failures, owed to the fact of mechanical subsystem attached!&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;The Linux command &lt;strong&gt;badblocks&lt;/strong&gt; could be used to run bad sector burn-in test on a new or suspected faulty hard disk. Just get a low end PC or server installed with Linux OS, attach the target hard disk to the IDE or SCSI bus, and run the badblocks command on the target hard disk. For example,&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;badblocks -svw -t random -p 3 /dev/sdb&lt;/strong&gt;&lt;br&gt;&lt;br&gt;get badblocks to perform three rounds of &lt;strong&gt;destructive write&lt;/strong&gt; of random data to the second SCSI hard disk.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Be careful!&lt;/strong&gt; The option switch &lt;strong&gt;-w&lt;/strong&gt; performs &lt;strong&gt;destructive write&lt;/strong&gt;. Never use this option switch on a partition with filesystem. Instead, use &lt;strong&gt;-n&lt;/strong&gt; to perform  non-destructive read-write on a partition with filesystem!&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/7547855080719978251/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/7547855080719978251?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/7547855080719978251'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/7547855080719978251'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/linux-command-to-confirm-bad-sector.html' title='Linux Command To Confirm Bad Sector'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-8569750291669660226</id><published>2006-10-15T19:50:00.001+08:00</published><updated>2009-11-16T01:04:32.141+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Database"/><category scheme="http://www.blogger.com/atom/ns#" term="DB2"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Checklist To Tune DB2 Performance</title><content type='html'>DBA suggests few of the recommended database performance tuning tips for IBM DB2 database engine that is running on Linux server.&lt;span id=&quot;fullpost&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Linux kernel parameters tuning&lt;/strong&gt; that applicable to DB2 version 8.1 and 8.2.&lt;br&gt;&lt;br&gt;Executing command &lt;strong id=&#39;kchl&#39;&gt;sysctl -A&lt;/strong&gt; to print out current kernel parameters setting. Some of the notable are&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;kernel.sem&lt;/strong&gt;  (Semaphore setting)&lt;br&gt;Recommended Value : 250 256000 32 1024&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;kernel.msgmni&lt;/strong&gt;  (Maximum system-wide queues)&lt;br&gt;Recommended Value : 1024&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;kernel.msgmax&lt;/strong&gt; (Maximum size of messages in byte)&lt;br&gt;Recommended Value : 65536&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;kernel.msgmnb&lt;/strong&gt; (Default size of queue in byte)&lt;br&gt;Recommended Value : 65536&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ul&gt;In order to retain these changes of kernel parameters on every system reboot, add the updated kernel parameters setting to &lt;strong&gt;/etc/sysctl.conf&lt;/strong&gt; system file to do the great job.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;DB2 database configurable parameters tuning.&lt;/strong&gt;&lt;br&gt;&lt;br&gt;After connecting to database called my_test_db by executing &lt;strong id=&#39;kchl&#39;&gt;db2 connect to my_test_db&lt;/strong&gt;, running another DB2 command &lt;strong id=&#39;kchl&#39;&gt;db2 autoconfigure apply none&lt;/strong&gt; to get DB2 database engine calculate the best recommended value of DB2 database configurable parameters. Some of the notable are&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;LOGPRIMARY / LOGFILSIZ&lt;/strong&gt;&lt;br&gt;Larger log buffer required for OLTP workloads with high transaction rate.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;CHNGPGS_THRESH&lt;/strong&gt;&lt;br&gt;For databases with heavy update transaction workloads, make sure there are enough clean pages in the buffer pool by setting the parameter value equal to or less than the best recommended value calculated by DB2 database engine.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LOCKLIST&lt;/strong&gt;&lt;br&gt;The amount of storage that is allocated to the lock list. Increase this value if lock escalations causing performance concerns, that logged as warnings in the db2diag.log file.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;DBHEAP&lt;/strong&gt;&lt;br&gt;Database heap per database. Needs to be increased for larger buffer pools.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;NUM_IOCLEANERS&lt;/strong&gt;&lt;br&gt;Large buffer pools require a higher number of asynchronous page cleaners.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Alternate page cleaning algorithm tuning.&lt;/strong&gt;&lt;br&gt;&lt;br&gt;DB2 UDB ESE v8.2 introduces a new buffer pool page cleaning algorithm which is not turned on by default. It is necessary to test this new page cleaning algorithm with the database workload. To turn on this alternate page cleaning algorithm, executing DB2 command&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;db2set DB2_USE_ALTERNATE_PAGE_CLEANING=YES&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/8569750291669660226/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/8569750291669660226?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8569750291669660226'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8569750291669660226'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/checklist-to-tune-db2-performance.html' title='Checklist To Tune DB2 Performance'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-156893045074949139</id><published>2006-10-15T18:39:00.001+08:00</published><updated>2009-11-16T01:04:14.826+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Disable Linux Reboot On CTRL+ALT+DEL</title><content type='html'>Don&#39;t ever press CTRL+ALT+DEL key combination in a Linux server!&lt;br&gt;&lt;br&gt;Windows guys used to press CTRL+ALT+DEL key combination follow by ENTER key to immediately lock the server running on Windows 2000 or Windows XP and above when they leave the server.&lt;span id=&quot;fullpost&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;br&gt;&lt;br&gt;What is the default behaviour when pressing CTRL+ALT+DEL key combination in a Linux machine? Well, the default action of Linux in responding to CTRL+ALT+DEL key combination is to reboot the Linux machine immediately! Just press it once, not twice as in Windows Me, and Linux will not be kind to ask confirmation before it really rebooting itself!&lt;br&gt;&lt;br&gt;Anyway, this Linux default behaviour in responding to CTRL+ALT+DEL key combination pressed could be tweaked, indeed. Edit the &lt;strong&gt;/etc/inittab&lt;/strong&gt; system file, look for the line containing &lt;strong&gt;ctrlaltdel&lt;/strong&gt; keyword, and then either &lt;ol&gt;&lt;li&gt;Remark the line &lt;strong id=&#39;kchl&#39;&gt;ca::ctrlaltdel:/sbin/shutdown -t3 -r now&lt;/strong&gt; to disable Linux from responding to the CTRL+ALT+DEL key combination&lt;br&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;or&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Replace the &lt;strong id=&#39;kchl&#39;&gt;/sbin/shutdown -t3 -r now&lt;/strong&gt; with something else, such as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;dialog --clear  --title &quot;Information&quot; --msgbox &quot;Don&#39;t press CTRL+ALT+DEL key combination in Linux machine.\n\nTo reboot server, use init 6 or init 0 to shutdown Linux.&quot; 10 40;clear&lt;/strong&gt;&lt;br&gt;&lt;br&gt;which use the dialog box command to alert users with a text-based GUI information dialog box.&lt;/li&gt;&lt;/ol&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/270056939/&quot; title=&quot;Impress Linux users with text-based GUI dialog box control.&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/100/270056939_648ba80edc_o.jpg&quot; width=&quot;358&quot; height=&quot;204&quot; border=&quot;0&quot; alt=&quot;Impress Linux users with text-based GUI dialog box control.&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;The dialog box command is not a standard program installed by most Linux distribution. Find the &lt;strong&gt;dialog&lt;/strong&gt; package from respective Linux distribution and install it.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/156893045074949139/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/156893045074949139?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/156893045074949139'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/156893045074949139'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/disable-linux-reboot-on-ctrlaltdel.html' title='Disable Linux Reboot On CTRL+ALT+DEL'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-790758136961824631</id><published>2006-10-15T17:12:00.001+08:00</published><updated>2009-11-16T01:03:52.296+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Which Command Is Linux Refer</title><content type='html'>Opss! Executing &lt;strong&gt;ls&lt;/strong&gt; command at keith login account displaying directories in blue color, executable file in green color, and plain text file in white color, etc.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;But, when executing the same simple &lt;strong&gt;ls&lt;/strong&gt; command at root login account does not differentiate file type by color scheme. How come?&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;Users who are familiar with shell built-in command &lt;strong&gt;alias&lt;/strong&gt; will know that it is the &lt;strong&gt;alias&lt;/strong&gt; that wrap the &lt;strong&gt;ls&lt;/strong&gt; command with &lt;strong&gt;--color=none&lt;/strong&gt; option switch. At the command prompt, type&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;alias | grep ls&lt;/strong&gt;&lt;br&gt;&lt;br&gt; will able to tell the fact of this.&lt;br&gt;&lt;br&gt;The &lt;strong&gt;which&lt;/strong&gt; command is used to find out which command the Linux shell interpreter is referring to in the current login session. The simple form of &lt;strong&gt;which&lt;/strong&gt; command, such as &lt;strong id=&#39;kchl&#39;&gt;which ls&lt;/strong&gt; will show the path of the &lt;strong&gt;ls&lt;/strong&gt; command without telling the alias name of it. Well, tweak &lt;strong&gt;which&lt;/strong&gt; command with its command option switch and wrap it with &lt;strong&gt;alias&lt;/strong&gt; command, such as this&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;alias which=&#39;alias | /usr/bin/which --tty-only --read-alias --show-dot --show-tilde&#39;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;Execute the &lt;strong id=&#39;kchl&#39;&gt;which ls&lt;/strong&gt; again, will now able to show both the ls command path and the alias of it, as shown in the diagram.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/269996264/&quot; title=&quot;Use the linux which command and alias command&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/116/269996264_8597d76070_o.jpg&quot; width=&quot;396&quot; height=&quot;145&quot; border=&quot;0&quot; alt=&quot;using the linux which command and alias command&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;Use the &lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/10/alias-shorten-long-linux-command.html&quot;&gt;alias command&lt;/a&gt; to shorten the long Linux command&lt;/li&gt;&lt;li&gt;Using the &lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/10/using-ls-command-by-examples.html&quot;&gt;ls command&lt;/a&gt; by examples&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/790758136961824631/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/790758136961824631?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/790758136961824631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/790758136961824631'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/which-command-is-linux-refer.html' title='Which Command Is Linux Refer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-2891091204293272563</id><published>2006-10-15T01:27:00.001+08:00</published><updated>2009-11-16T01:03:37.288+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>alias Shorten Long Linux Command</title><content type='html'>Tired of typing Linux command because of long list of command option switches? Try to use the command &lt;strong&gt;alias&lt;/strong&gt; to relieve tired of typing long Linux command then.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;As the command name suggests, the Linux shell built-in command &lt;strong&gt;alias&lt;/strong&gt; allows a user-defined command to represent&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;A system command with long arguments, such as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;find . -type d -print&lt;/strong&gt;&lt;br&gt;&lt;br&gt;This &lt;strong&gt;find&lt;/strong&gt; command used with a long option switches to list all directories that exists from the current directory downwards. The find command could be rather long if more find command option switches applied.&lt;br&gt;&lt;br&gt;This long command line could be made simple with an alias, such as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;alias dirfind=&#39;find . -type d -print&#39;&lt;/strong&gt;&lt;br&gt;&lt;br&gt; that allows user to execute the short user-defined command &lt;strong&gt;dirfind&lt;/strong&gt; instead of typing out that long command line.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;A series of system commands, such as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;tar -zcvpf bin.tgz bin; [ $? -eq 0 ] &amp;&amp; echo DONE || echo FAIL&lt;/strong&gt;&lt;br&gt;&lt;br&gt;These system commands execute sequentially, aim to check the tarball archive creation status upon its completion. If success then echo DONE else echo FAIL.&lt;br&gt;&lt;br&gt;Again, by using the &lt;strong&gt;alias&lt;/strong&gt; command could make it shorter and simple enough, such as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;alias chkbkp=&#39;tar -zcvpf bin.tgz bin; [ $? -eq 0 ] &amp;&amp; echo DONE || echo FAIL&#39;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;where the user could execute &lt;strong&gt;chkbkp&lt;/strong&gt; at command prompt and the Linux shell will expanding it to that commands series.&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;It is not advisable to declare and use alias in shell scripts. It is better to use a variable or a function for the purpose. Anyway, if insist, it is technically possible to use alias in shell scripts by turning on shell scripts option &lt;strong id=&#39;kchl&#39;&gt;shopt -s expand_aliases&lt;/strong&gt; before declaring and using an alias inside the shell scripts, such as the sample in diagram below.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/269982977/&quot; title=&quot;Use alias in bash shell scripts with shopt -s expand_aliases enabled&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/105/269982977_04bac761cd_o.jpg&quot; width=&quot;300&quot; height=&quot;150&quot; border=&quot;0&quot; alt=&quot;Use alias in bash shell scripts with shopt -s expand_aliases enabled&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;li&gt;By default, the parent shell where a shell scripts executed will always spawn the scripts execution into a subshell, unless explicitly run the shell scripts in the current shell environment. Shell scripts that is running in subshell will not able to use aliases defined in parent shell environment!&lt;br&gt;&lt;br&gt;To run a shell scripts in current shell environment instead of spawning into subshell, use one of these two syntax&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;source testscripts.sh&lt;/strong&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;or&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;. testscripts.sh&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/270795054/&quot; title=&quot;Explicitly running a shell scripts in current shell&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/111/270795054_d4d90a7ba5_o.jpg&quot; width=&quot;300&quot; height=&quot;150&quot; border=&quot;0&quot; alt=&quot;How to run shell scripts in subshell. How to run shell scripts in the current shell?&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;li&gt;In Linux system, there is a file named &lt;strong&gt;.bashrc&lt;/strong&gt; in each home directory. Use this file to define aliases, which will make the defined aliases effective on each login.&lt;/li&gt;&lt;li&gt;The login profile &lt;strong&gt;.bash_profile&lt;/strong&gt; could also be used to define aliases. In fact, it is the .bash_profile which execute the .bashrc while a user login.&lt;/li&gt;&lt;li&gt;To remove an alias, simply use the shell built-in command &lt;strong&gt;unalias&lt;/strong&gt;, such as &lt;strong id=&#39;kchl&#39;&gt;unalias chkbkp&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;To list all the aliases defined in the current login session, just type the command &lt;strong id=&#39;kchl&#39;&gt;alias&lt;/strong&gt; at the command prompt will do.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/10/which-command-is-linux-refer.html#AC&quot;&gt;Which command&lt;/a&gt; is the Linux shell refers to&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/2891091204293272563/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/2891091204293272563?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/2891091204293272563'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/2891091204293272563'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/alias-shorten-long-linux-command.html' title='alias Shorten Long Linux Command'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-4463498852581806148</id><published>2006-10-14T23:29:00.001+08:00</published><updated>2009-11-16T01:03:23.223+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Booting Thin Client Diskless Workstation</title><content type='html'>Bootp, shorts for Bootstrap Protocol, is an UDP network protocol which is originally defined in RFC 951 to assign IP address for network clients. Bootp is well suitable to apply in diskless workstation, workstation without operating system installed, or simply called thin client.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;Bootp is not DHCP! Although both of these two protocols sound similar at first thought, but they are technically different and could be co-exists in the same server or network segment.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;blockquote&gt;Hospitality management system giant, Micros System Inc, makes good use of bootp in its high rank Point-Of-Sale system called Micros 8700 HMS.&lt;br&gt;&lt;br&gt;When the diskless Micros PC Workstation power on, the bootp enabled network interface card will broadcast its MAC address to the network. When the bootp daemon running on the Micros host receives the broadcast packets, it will assign a valid IP address follow by transferring a DOS operating system image to the PC Workstation according to the MAC-IP-Image mapping maintained in the bootpd configuration file.&lt;br&gt;&lt;br&gt;Once the image transferring (via tftp protocol) completed, the diskless PC Workstation starts to boot up with the OS image parking in memory segment that act as RAM-DISK. When the boot up completed, the Micros diskless PC workstation functions as if it is a normal desktop PC pre-installed with DOS OS.&lt;/blockquote&gt;Bootpd server and clients could be reside on different network segment by deploying bootp relay agent. To make thing simple or get it up and running right during initial roll out, put both bootpd server and client on the same network segment.&lt;br&gt;&lt;br&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Checklist when thin client unable getting IP address:&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Replace a known good unit of thin client to rule out possibilities of&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Faulty boot ROM embedded in NIC that is bootp enabled&lt;/li&gt;&lt;li&gt;Faulty Ethernet patch cable&lt;/li&gt;&lt;li&gt;faulty network access point or LAN point&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Bootp daemon is not running. In Linux/Unix, execute&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ps -ef | grep bootpd&lt;/strong&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;or&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;lsof -i | grep 67&lt;/strong&gt;&lt;br&gt;&lt;br&gt;to confirm bootp daemon is running and listening to legacy port number (as shown in &lt;strong&gt;/etc/services&lt;/strong&gt; file)&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Incorrect MAC address to IP address mapping maintained in &lt;strong&gt;/etc/bootptab&lt;/strong&gt; bootpd configuration file&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;ARP cache conflict at bootpd server. Executing the command&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;arp -a&lt;/strong&gt;&lt;br&gt;&lt;br&gt; to list the bootpd server arp cache. Confirm that there is no ARP cache conflict. To delete the conflict, for example conflict on IP address 192.168.1.3, execute command&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;arp -d 192.168.1.3&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Use cross-over patch cable or straight Ethernet cable and a hub to directly link up the bootpd server and client to form an simple isolate network. If it works in this simple network infrastructure, then get network experts sit in for assistant. There might be firewalls or routers that have blocked the UDP packets from reaching to bootpd server.&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;Tftp protocol in brief&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Host A sends an read request (RRQ) or write request (WRQ) packet to host B. The packet containing the filename and transfer mode.&lt;/li&gt;&lt;li&gt;Host B replies with an acknowledgement packet (ACK) to WRQ or directly with a DATA packet in case of RRQ. The reply also serves to inform host A of which port on host B the remaining packets should be sent to.&lt;/li&gt;&lt;li&gt;The source host sends numbered DATA packets to the destination host, all but the last containing a full-sized block of data. The destination host replies with numbered ACK packets for all DATA packets.&lt;/li&gt;&lt;li&gt;The final DATA packet must contain less than a full-sized block of data to signal that it is the last. If the size of the transferred file is an exact multiple of the block-size, the source sends a final DATA packet containing 0 bytes of data.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/4463498852581806148/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/4463498852581806148?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/4463498852581806148'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/4463498852581806148'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/booting-thin-client-diskless.html' title='Booting Thin Client Diskless Workstation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-2393363897313236204</id><published>2006-10-12T08:47:00.001+08:00</published><updated>2009-11-16T01:01:00.365+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email"/><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Repair Corrupted Outlook PST OST File</title><content type='html'>PST, known as Microsoft Outlook personal folder file or email archive file, used to archive emails out from the mail box at server side to a local storage or network drive.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;OST, known as Microsoft Outlook offline folder file, allows user to work with Microsoft Exchange mail box in an offline mode. For example, emails composed, Contacts or Calendar changes, etc, will be storing in the offline folder. These changes made in offline folder will be automatically synchronize with Microsoft Exchange Server once hook up to the network - emails composed will be sending out immediately and Contacts or Calendar changes are updated to server side objects.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;blockquote&gt;Both the Microsoft Outlook PST and OST files are believed using MSDE database engine.&lt;br&gt;&lt;br&gt;MSDE is a light-weight freeware version of Microsoft SQL Server database engine that Microsoft offers to attract database users (especially MS Access users, developers, students, educators, etc) to develop database projects using Microsoft SQL Server. The latest release of MSDE is called SQL Server Express edition.&lt;br&gt;&lt;br&gt;MSDE built with limitation of accessing up to 2GB worth of data only. The same limitation occurs in MS Outlook PST and OST file as well!&lt;/blockquote&gt;&lt;strong&gt;Watch the size of PST and OST file!&lt;/strong&gt; If they getting fatty, trim them down quickly to save archives of email from hitting the 2GB limitation or a file corruption will happened soon! &lt;strong&gt;The best practice&lt;/strong&gt; is to create multiple PST or OST files to categorize email archives. For those email with attachment, it is easily reaching the 2GB limitation. So, more PST or OST files are needed to archive such emails with attachment!&lt;br&gt;&lt;br&gt;Office 2000 and higher with latest patches installed is nice enough to alert users with an error message and disallow users from adding or receiving new email item, so to safeguard PST or OST file to become oversize and corrupted. Earlier versions of MS Outlook does not display any error or warning messages and allow users to oversize the PST or OST file until corruption!&lt;br&gt;&lt;br&gt;Microsoft offers a tool called &lt;strong&gt;PST2GB&lt;/strong&gt; to recover a MS Outlook PST file that is corrupted after storing over 2GB worth of data. Microsoft alleged that PST2GB is not a tool that is 100% work at all time! If PST2GB does work, it does not recover all of the data (the truncated data is missing).&lt;blockquote&gt;PST2GB merely create a truncated copy of the PST file to under 2GB. The copy that is left after the PST2GB completes does not have all the original data because the PST2GB forcibly cuts a user defined amount of data (below 2GB) from the PST file.&lt;br&gt;&lt;br&gt;In brief,&lt;ol&gt;&lt;li&gt;Data or the emails archive after the truncation boundary will gone missing.&lt;/li&gt;&lt;li&gt;There must be enough disk space, 2GB free disk space if as maximum as possible of recovery desired.&lt;/li&gt;&lt;/ol&gt;&lt;/blockquote&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Steps to recover corrupted PST file as per Microsoft KB296088 (applied to MS Outlook 97 to MS Outlook 2002)&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Download the &lt;a href=&quot;#DW&quot;&gt;PST2GB&lt;/a&gt; from Microsoft Download Center&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Extract the downloaded file &lt;strong&gt;2gb152.exe&lt;/strong&gt; to an empty folder for these five files - Msstdfmt.dll, Msvbvm60.dll, Pst2gb.exe, Readme.rtf, Readme.txt&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Start the Pst2gb.exe program.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click Browse to select the oversize PST file and then click Open.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click Create, select the name and location of the truncated data file to be created, and then click Save.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Enter the amount of the data that intended to truncate in the PST file. There is no absolute ideal figure for this but for the best results is using 20 to 25MB, more or less. If that works, repeat the process and truncate the original oversize PST file by only 15MB. If that works, then try the process with 5MB. If 25MB does not work, repeat the process and truncate the original PST by 35MB. If the process does not work, increase the amount until the process is successful.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Run the Inbox Repair Tool &lt;a href=&quot;#IR&quot;&gt;scanpst.exe&lt;/a&gt; on the smaller PST file.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Open the repaired PST file in Microsoft Outlook.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;(Recommended but optional) If the file opens, right-click the root folder of the PST, click Properties, and then click Compact Now to start the compression. For a file of this size, the compression may take approximately 4-8 hours.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;If the file does not open, discard the truncated PST file, and repeat the process with the original PST file. Truncate more data than in the first attempt, and try the process again.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ol&gt;If the following error message arise when trying to run the PST2GB Utility&lt;br&gt;&lt;br&gt;&lt;strong&gt;Run-time Error &#39;713&#39;: Class not Registered. You need the following file to be installed on your machine. MSSTDFMT.DLL&lt;/strong&gt;&lt;br&gt;&lt;br&gt;To resolve this error, follow these steps:&lt;ol&gt;&lt;li&gt;Microsoft Windows 98, Microsoft Windows 98 SE, Microsoft Windows ME&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Copy the &lt;strong&gt;MSstdfmt.dll&lt;/strong&gt; file to the &lt;strong&gt;C:\Windows\System&lt;/strong&gt; folder.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Open a command prompt, and then type the following command&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;REGSVR32 C:\Windows\System\MSSTDFMT.DLL&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;Microsoft Windows NT, Microsoft Windows 2000, and Microsoft Windows XP&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Copy the &lt;strong&gt;MSstdfmt.dll&lt;/strong&gt; to the &lt;strong&gt;C:\&amp;lt;windir&amp;gt;\System32&lt;/strong&gt; folder.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Open a command prompt and type the following command&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;REGSVR32 C:\&amp;lt;windir&amp;gt;\System32\MSSTDFMT.DLL&lt;/strong&gt;&lt;br&gt;&lt;br&gt;where &amp;lt;windir&amp;gt; is either the &lt;strong&gt;WINNT&lt;/strong&gt; or the &lt;strong&gt;Windows&lt;/strong&gt; directory.&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=B33B1DFF-6F50-411D-BBDF-82019DDA602E&amp;displaylang=en&quot; id=&#39;DW&#39; target=&quot;_blank&quot;&gt;PST2GB&lt;/a&gt; from Microsoft official download site&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://support.microsoft.com/kb/272227/&quot; target=&quot;_blank&quot; id=&#39;IR&#39;&gt;Inbox Repair Tool&lt;/a&gt; for MS Outlook 2000 to MS Outlook 2003&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://support.microsoft.com/kb/168648/&quot; target=&quot;_blank&quot;&gt;Inbox Repair Tool&lt;/a&gt; for MS Outlook 97&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://support.microsoft.com/kb/181167/&quot; target=&quot;_blank&quot;&gt;Inbox Repair Tool&lt;/a&gt; for MS Outlook 98&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?familyid=1A08D221-CDAF-45DD-8339-9B6C3B345FFA&amp;displaylang=en&quot; target=&quot;_blank&quot;&gt;OST Integrity Check Tool&lt;/a&gt; for Outlook 2000&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?familyid=9E52BAFC-5C33-46B9-AF14-04E4D989EF6B&amp;displaylang=en&quot; target=&quot;_blank&quot;&gt;Mailbox Recovery&lt;/a&gt; for Microsoft Exchange 2000 Server&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/2393363897313236204/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/2393363897313236204?isPopup=true' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/2393363897313236204'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/2393363897313236204'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/repair-corrupted-outlook-pst-ost-file.html' title='Repair Corrupted Outlook PST OST File'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-4362846375432570095</id><published>2006-10-11T23:44:00.001+08:00</published><updated>2009-11-16T01:00:40.844+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="GPL GNU"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>lsof Identify Resource Locked Process</title><content type='html'>Samba server comes with a handy utility called &lt;strong&gt;smbstatus&lt;/strong&gt; to report users who are holding the shared resources.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;Utilities used to find out processes that are locking system resources are among the most wanted system utilities for experienced users and system administrators. The &lt;strong&gt;lsof&lt;/strong&gt; being one of such excellent utility that used to identify process or user that is locking system resource such as file or network socket.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;For example, a system administrator could use the &lt;strong id=&#39;kchl&#39;&gt;lsof -i&lt;/strong&gt; to easily understand how the IBM MQ server communicate over the TCP/IP network with IBM Informix server. The lsof output, as in the diagram below, shows that the Informix &lt;strong&gt;oninit&lt;/strong&gt; is listening to a user defined mnemonic port name &lt;strong&gt;stp&lt;/strong&gt; which the IBM MQ server communicate with. The &lt;strong&gt;/etc/services&lt;/strong&gt; system files is usually used to map a numeric port number to a descriptive port name defined by user.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/266979434/&quot; title=&quot;The Linux lsof utility used to find out process or user that locks a system resource such as file or network socket&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/104/266979434_1dfd28a2a7_o.jpg&quot; width=&quot;396&quot; height=&quot;68&quot; border=&quot;0&quot; alt=&quot;The Linux lsof utility used to find out process or user that locks a system resource such as file or network socket&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Execute &lt;strong id=&#39;kchl&#39;&gt;lsof -i TCP&lt;/strong&gt; to report all processes that are accessing the TCP sockets found on the system&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Execute &lt;strong id=&#39;kchl&#39;&gt;lsof -i tcp:8080&lt;/strong&gt; to find out what process is holding TCP port 8080.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Execute &lt;strong id=&#39;kchl&#39;&gt;lsof&lt;/strong&gt; without any command options to list system wide resources that are using by processes running in the system.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Execute &lt;strong id=&#39;kchl&#39;&gt;lsof -p 456&lt;/strong&gt; to show all resources that are being held by process id 456&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Some programs might running on the Linux system by more than one instance. In this case, type &lt;strong&gt;lsof -c ProgramName&lt;/strong&gt; instead of &lt;strong&gt;lsof -p PID&lt;/strong&gt; to get a broader scope of view. For example, &lt;strong id=&#39;kchl&#39;&gt;lsof -c squid&lt;/strong&gt; to find out what are the resources held by all &lt;strong&gt;squid&lt;/strong&gt; processes running on the system.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Execute &lt;strong id=&#39;kchl&#39;&gt;lsof -u keith&lt;/strong&gt; to confirm resources that are  being held by user id keith&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Execute &lt;strong id=&#39;kchl&#39;&gt;lsof /home/keith/secretfile&lt;/strong&gt; to find out what are the processes that are locking the specify file /home/keith/secretfile&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;Another utility called &lt;strong&gt;fuser&lt;/strong&gt; has similar features as of lsof utility. Executing &lt;strong id=&#39;kchl&#39;&gt;fuser -m /media/cdrom&lt;/strong&gt; will report all process id that are holding the specify resource.&lt;br&gt;&lt;br&gt;Each of the process id suffix with an ASCII character code which represent the resource access type. These resource access type codes are not standardize among various Linux distributions. To be safe and accurate, always consult the fuser man page to confirm the code definitions.&lt;br&gt;&lt;br&gt;To check out what process ID is using TCP port 8080, execute the fuser as &lt;strong id=&#39;kchl&#39;&gt;fuser -n tcp 8080&lt;/strong&gt; or &lt;strong id=&#39;kchl&#39;&gt;fuser 8080/tcp&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;The native network related Linux command &lt;strong&gt;netstat&lt;/strong&gt; is a good tool to find out what program or command is binding to a TCP and UDP port. For example, there are Bind, Djbdns, etc, used to bind with port 53 for DNS protocol. By executing netstat command as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;netstat -tulap&lt;/strong&gt;&lt;br&gt;&lt;br&gt; will shows both the program and process id that bind to the network port. The diagram below shows the commands output of &lt;strong&gt;lsof vs netstat&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/274349791/&quot; title=&quot;netstat vs lsof&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/92/274349791_1650c7b784_o.jpg&quot; width=&quot;350&quot; height=&quot;68&quot; border=&quot;0&quot; alt=&quot;netstat vs lsof&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;Both of the commands displaying pseudo port name instead of numeric port number, where the mapping of pseudo port name and numeric port number is defined in &lt;strong&gt;/etc/services&lt;/strong&gt; file.&lt;br&gt;&lt;br&gt;The netstat command, however, able to display numeric port and IP address with -n option switch. For example, rewrite the command as &lt;strong id=&#39;kchl&#39;&gt;netstat -tulapn&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;strong&gt;Note!&lt;/strong&gt; Both &lt;strong id=&#39;kchl&#39;&gt;netstat -tulap&lt;/strong&gt; and &lt;strong id=&#39;kchl&#39;&gt;lsof -i&lt;/strong&gt; MUST be executed with root user account privileges, else nothing as those in the diagram above will be seen.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/4362846375432570095/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/4362846375432570095?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/4362846375432570095'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/4362846375432570095'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/lsof-identify-resource-locked-process.html' title='lsof Identify Resource Locked Process'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-5213670043958746965</id><published>2006-10-10T23:27:00.001+08:00</published><updated>2009-11-16T01:00:24.020+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Repair Corrupted Windows Boot.ini</title><content type='html'>Boot up to Windows Recovery Console and execute command &lt;strong&gt;bootcfg&lt;/strong&gt; to repair corrupted or recreate missing Windows boot.ini file.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;The bootcfg command able to scan hard disks for installation of Windows NT 4.0 and above and then add them to existing boot.ini file. The command also able to rebuild a new boot.ini file if one does not exist.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;A brief of bootcfg command usage and syntax&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;bootcfg /add&lt;/strong&gt; scans the computer for Windows systems installed (for example Windows 2000 and Windows XP in a dual boot setup), displays the results to choose and add it to the Boot menu.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;bootcfg /rebuild&lt;/strong&gt; iterates through all Windows installations found in the PC, allows user to specify which installations to rebuild the boot.ini file.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;bootcfg /list&lt;/strong&gt; reads the boot.ini file and displays the operating system identifier, the operating system load options, and the operating system location (path).&lt;/li&gt;&lt;/ul&gt;Related information:&lt;ul&gt;&lt;li&gt;The &lt;a href=&quot;http://support.microsoft.com/?kbid=291980&quot; target=&quot;_blank&quot;&gt;bootcfg&lt;/a&gt; command syntax and usages&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/5213670043958746965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/5213670043958746965?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5213670043958746965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5213670043958746965'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/repair-corrupted-windows-bootini.html' title='Repair Corrupted Windows Boot.ini'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-3798754905117179573</id><published>2006-10-10T22:43:00.001+08:00</published><updated>2009-11-16T01:00:07.292+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Sending Windows Console Message</title><content type='html'>Windows Me or 9x comes with one handy network chatting program called Winpopup. Simple GUI allows user at one computer to chat over the network with counterparts sitting at another networked Windows.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;However, there is not similar Winpopup replacement for Windows 2000 and above. There are two ways to send a message, better known as console message or Windows Alerts, to networked system running Windows 2000 and above.&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Via the Computer Management window&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Right-click on the My Computer icon on Desktop&lt;/li&gt;&lt;li&gt;Click on the Manage option from the pop up context menu&lt;/li&gt;&lt;li&gt;Click on the Action menu of Computer Management window&lt;/li&gt;&lt;li&gt;Goto All Tasks option&lt;/li&gt;&lt;li&gt;Click on the &lt;strong&gt;Send Console Message...&lt;/strong&gt; option to call up Send Console Message window.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/266078598/&quot; title=&quot;Photo Sharing&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/87/266078598_041cd627fb_m.jpg&quot; width=&quot;240&quot; height=&quot;183&quot; border=&quot;0&quot; alt=&quot;Sending console message or Windows Alerts via the Send Console Message GUI.&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;Via Command Prompt&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Click on the Start button&lt;/li&gt;&lt;li&gt;Click on the Program menu&lt;/li&gt;&lt;li&gt;Click on the Accessories menu&lt;/li&gt;&lt;li&gt;Click on the Command Prompt application&lt;/li&gt;&lt;li&gt;At the Command Prompt window, type&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;net send 192.168.1.2 &quot;testing messages&quot;&lt;/strong&gt;&lt;br&gt;&lt;br&gt; to send a messages &quot;testing messages&quot; to PC with 192.168.1.2 IP address.&lt;br&gt;&lt;br&gt;It is possible to replace IP address with DNS name or domain name to send console message to all workstations of the said domain.&lt;/li&gt;&lt;li&gt;Type &lt;strong id=&#39;kchl&#39;&gt;net help send&lt;/strong&gt; for more syntax and usage information.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/3798754905117179573/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/3798754905117179573?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/3798754905117179573'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/3798754905117179573'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/sending-windows-console-message.html' title='Sending Windows Console Message'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-8406083521807367732</id><published>2006-10-10T20:26:00.001+08:00</published><updated>2009-11-16T00:59:51.394+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="GPL GNU"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Restart VNC Remotely</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;Opsss! Can&#39;t VNC over to remote hosts!&lt;br&gt;&lt;br&gt;Might need to restart the VNC server, but how?&lt;span id=&quot;fullpost&quot;&gt;&lt;ul&gt;&lt;li&gt;Restart Windows-based (Windows 2000 and above) VNC server&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Right-click the My Computer icon on Desktop&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click the Manage option from the pop up context menu&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click the Action menu of the Computer Management windows&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click the &lt;strong&gt;Connect to another computer...&lt;/strong&gt; option&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Type the IP address or DNS name of the target PC running the VNC server&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Enter the login authentication info when prompt&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;After connect successfully, click the &lt;strong&gt;Services and Applications&lt;/strong&gt; on the left panel.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click the Services option&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Search for &lt;strong&gt;VNC Server&lt;/strong&gt; service on the right panel, right-click on it, and click Restart option to restart the VNC server.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;Restart Linux-base VNC daemon&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Telnet or ssh over to target host that running the VNC daemon&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Type the command &lt;strong id=&#39;kchl&#39;&gt;vncserver -kill:1&lt;/strong&gt; to kill the VNC daemon running on DISPLAY:1, for example.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Type &lt;strong id=&#39;kchl&#39;&gt;vncserver :1&lt;/strong&gt; to bring up the VNC daemon running on DISPLAY:1 again.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;To ensure VNC daemon startup listening for connection, type&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;netstat -ant | grep 5901&lt;/strong&gt; &lt;br&gt;&lt;br&gt;where 5901 is the legacy VNC daemon listening port of DISPLAY:1 in the previous step. If the port is open and listening means that VNC daemon is up and running successfully.&lt;/li&gt;&lt;/ol&gt;&lt;/ul&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/09/using-vnc-and-redhat-linux.html&quot;&gt;Running&lt;/a&gt; VNC daemon on Linux&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/8406083521807367732/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/8406083521807367732?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8406083521807367732'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8406083521807367732'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/restart-vnc-remotely.html' title='Restart VNC Remotely'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-1308901885297914199</id><published>2006-10-10T13:34:00.001+08:00</published><updated>2009-11-16T00:59:04.968+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>MD5 Shell Scripts Find Duplicate Files</title><content type='html'>The &lt;a href=&quot;#SH&quot;&gt;shell scripts&lt;/a&gt; wrap the default md5sum program found on most Linux system to prepare a report of unique and duplicate files in a given directory.&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;br&gt;&lt;br&gt;The lengthy source code could be shorten if removing the &lt;strong&gt;DupUniRpt&lt;/strong&gt; function which merely used to prepare an easy to read report that showing both the filename and number of duplicate and unique files.&lt;br&gt;&lt;br&gt;By removing the DupUniRpt function call and function coding, do remember to add the line &lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;cat $FM5L&lt;/strong&gt;&lt;br&gt;&lt;br&gt;right after the DupUniRpt function call in the if-else statement. The &lt;strong&gt;$FM5L&lt;/strong&gt; is a semi-raw report file that groups duplicate and unique files together.&lt;br&gt;&lt;br&gt;The &lt;a href=&quot;#SH2&quot;&gt;wDupUniRpt.sh&lt;/a&gt; contain the same source code of DupUniRpt function source code, which could be used to prepare that easy to read report based on the semi-raw report file. This shell scripts created merely for easy debugging purpose.&lt;br&gt;&lt;br&gt;Both these shell scripts have been tested successfully with as much as possible scenarios. The source code might be able to further enhanced for efficiency or bugs fixing if any. Any suggestive comments are greatly appreciated.&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://nooneown.googlepages.com/wmd5.sh&quot; target=&quot;_blank&quot; id=&quot;SH&quot;&gt;wmd5.sh&lt;/a&gt; to report both filename and number of duplicate and unique files in a given directory&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://nooneown.googlepages.com/wDupUniRpt.sh&quot; target=&quot;_blank&quot; id=&quot;SH2&quot;&gt;wDupUniRpt.sh&lt;/a&gt; used to report redundant and unique records in an ASCII file of sorted records.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/09/find-and-remove-duplicate-file.html&quot;&gt;MD5 checksum&lt;/a&gt; used to find redundant files&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/1308901885297914199/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/1308901885297914199?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/1308901885297914199'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/1308901885297914199'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/md5-shell-scripts-find-duplicate-files.html' title='MD5 Shell Scripts Find Duplicate Files'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-1423141530266770843</id><published>2006-10-09T23:06:00.001+08:00</published><updated>2009-11-16T00:58:44.752+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Install Recover Console To Boot Menu</title><content type='html'>Recover Console is not install to local hard disk by default during Windows installation.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;In order to access to Recovery Console, normally practice is to boot up the system from the appropriate Windows setup CD. If the system is running on Windows XP, use the Windows XP setup CD. Note that Recover Console only available in Windows 2000 and above.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;Other than access the Windows Recovery Console from bootable Windows setup CD, it is possible to install the Windows Recovery Console to local hard disk and configure it to appear as one of the Windows boot up option.&lt;br&gt;&lt;br&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Install Recovery Console to local hard disk and enable Recovery Console as part of the Windows boot up menu option:&lt;/span&gt;&lt;ol&gt;&lt;li&gt;Click on the Start button&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click on the Run menu&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Type &lt;strong id=&#39;kchl&#39;&gt;D:\i386\winnt32.exe /cmdcons&lt;/strong&gt; by assuming D: drive is CD-ROM drive letter in which the Windows XP Setup CD is loaded.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Click OK button and then follow the instructions on the screen to complete the straight forward setup and restart the computer at the end of setup process.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;After the Windows reboot, edit the file &lt;strong&gt;C:\boot.ini&lt;/strong&gt; with &lt;strong&gt;notepad&lt;/strong&gt; editor. Note that this file is hidden system file which is not &quot;appear&quot; in Windows Explorer by default, unless turning on the view hidden file options.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;If view hidden file option is not turn on, turn it on by&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Open My Computer&lt;/li&gt;&lt;li&gt;Click on the Tools menu&lt;/li&gt;&lt;li&gt;Click on the Folder Options&lt;/li&gt;&lt;li&gt;Click on the View tab&lt;/li&gt;&lt;li&gt;Click on the &lt;strong&gt;Hidden files and folders&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Click to select &lt;strong&gt;Show hidden files and folders&lt;/strong&gt; option button.&lt;/li&gt;&lt;li&gt;Click to clear &lt;strong&gt;Hide protected operating system files&lt;/strong&gt; check box&lt;/li&gt;&lt;li&gt;click OK to complete the turning on view hidden file procedures.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;At the bottom of the file, append this line&lt;br&gt;&lt;br&gt;&lt;strong&gt;C:\cmdcons\bootsect.dat=&quot;Recovery Console&quot; /cmdcons&lt;/strong&gt;&lt;br&gt;&lt;br&gt;Note that changing the description &quot;Recovery Console&quot; to whatever meaningful name is possible.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Save and exit the edited file. On the next system boot up, notice that there is one new boot option called Recovery Console in the Windows boot up menu.&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href =&quot;http://bloggerdigest.blogspot.com/2006/09/tweaking-windows-recovery-console.html&quot;&gt;Tweaking&lt;/a&gt; Windows Recovery Console&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/1423141530266770843/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/1423141530266770843?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/1423141530266770843'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/1423141530266770843'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/install-recover-console-to-boot-menu.html' title='Install Recover Console To Boot Menu'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-5965375790753266432</id><published>2006-10-09T22:01:00.001+08:00</published><updated>2009-11-16T00:58:26.651+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Using ls Command By Examples</title><content type='html'>The &lt;strong&gt;ls&lt;/strong&gt; command is a Linux command that is used to list directory contents. In fact, it is a standard shell command that exists in all Unix/Linux variants.&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Using ls command by examples&lt;/span&gt;&lt;ul&gt;&lt;li&gt;To list all files in ascending order of file name detailed with file &lt;strong&gt;modification time&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -la&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;To list all files in descending order of file &lt;strong&gt;creation time&lt;/strong&gt; in full or customized date-time format&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -lact --full-time&lt;/strong&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -lact --time-style=&quot;+%d %m %Y&quot;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;To list all files in descending order of file &lt;strong&gt;creation time&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -lact&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;To list all files in descending order of file size in kilobytes&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -laSh&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;To list only directories&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -ap | grep /&lt;/strong&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;or&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -al | grep ^d&lt;/strong&gt;&lt;br&gt;&lt;br&gt;Alternatively, use the &lt;strong&gt;find&lt;/strong&gt; command as&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;find . -type d -print&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;To list only directories initial with &lt;strong&gt;rpt&lt;/strong&gt; filename&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls -al rpt* | grep :$&lt;/strong&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;or&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;find . -type d -name &quot;rpt*&quot; -print&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Definition of &lt;strong&gt;ls&lt;/strong&gt; file listing command option switch&lt;/span&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;ul&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;l&lt;/strong&gt; used to list files in long listing detailed format.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;a&lt;/strong&gt; used to list all files including hidden files which filename prefix with a dot.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;lct&lt;/strong&gt; used together to list file in descending order of file &lt;strong&gt;creation time&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;lc&lt;/strong&gt; list file &lt;strong&gt;creation time&lt;/strong&gt; and &lt;strong&gt;sorted by filename&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;lt&lt;/strong&gt; list file in descending order of file &lt;strong&gt;modification time&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;h&lt;/strong&gt; used to list files size information in kilobytes (KB).&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;S&lt;/strong&gt; used to list files in descending order of file size in byte.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;r&lt;/strong&gt; used to reverse the default of descending listing order to ascending listing order.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;option switch &lt;strong id=&#39;kchl&#39;&gt;--full-time&lt;/strong&gt; or &lt;strong id=&#39;kchl&#39;&gt;--time-style&lt;/strong&gt; used to display time-related info in full or customized format.&lt;/li&gt;&lt;br&gt;&lt;br&gt;&lt;/ul&gt;&lt;strong&gt;Notes!&lt;/strong&gt; If the &lt;strong&gt;ls&lt;/strong&gt; command colour scheme is not easy to read, turn it off by either:&lt;ul&gt;&lt;li&gt;On ad-hoc basis by adding option switch. For example&lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;ls /etc --color=none&lt;/strong&gt;&lt;br&gt;&lt;br&gt; to list &lt;strong&gt;/etc&lt;/strong&gt; directory contents without color scheme turning on. OR&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;On selective login session only. Use the &lt;strong&gt;alias&lt;/strong&gt; command to save typing efforts. For example, execute the command &lt;br&gt;&lt;br&gt;&lt;strong id=&#39;kchl&#39;&gt;alias ls=&quot;ls --color=none&quot;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;will cause subsequent &lt;strong&gt;ls&lt;/strong&gt; command executing as if it is supplied with &lt;strong&gt;--color=none&lt;/strong&gt; option switch and automatically turn off the color scheme.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;On each login session of individual login acount only. Copy the file &lt;strong&gt;/etc/DIR_COLORS&lt;/strong&gt; to the user home directory as &lt;strong&gt;$HOME/.dir_colors&lt;/strong&gt; and edit the variable &lt;strong&gt;COLOR&lt;/strong&gt; to become &lt;strong&gt;COLOR=none&lt;/strong&gt; to do the job.&lt;br&gt;&lt;br&gt;From the next user login onwards, type the command &lt;strong id=&#39;kchl&#39;&gt;set | grep COLOR&lt;/strong&gt; will notice that the COLORS variable changed as specified in the &lt;strong&gt;$HOME/.dir_colors&lt;/strong&gt; setting file. Typing the &lt;strong&gt;ls&lt;/strong&gt; command as usual which will disable the file listing color scheme automatically.&lt;br&gt;&lt;Br&gt;To turn on the color scheme again, simply rewrite the line &lt;strong&gt;COLOR=none&lt;/strong&gt; to &lt;strong&gt;COLOR=tty&lt;/strong&gt; or &lt;strong&gt;COLOR=auto&lt;/strong&gt; will do.&lt;br&gt;&lt;br&gt;The file &lt;strong&gt;/etc/DIR_COLORS&lt;/strong&gt; is used to control file listing color scheme globally, meaning that all users account will be affected.&lt;/li&gt;&lt;/ul&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/10/using-find-command-by-examples.html&quot;&gt;Creation time vs modification time&lt;/a&gt; at Linux file creation time vs Linux file modification time section of &lt;strong&gt;Using find command by examples&lt;/strong&gt; article.&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/5965375790753266432/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/5965375790753266432?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5965375790753266432'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5965375790753266432'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/using-ls-command-by-examples.html' title='Using ls Command By Examples'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-6301116242003472477</id><published>2006-10-06T06:27:00.001+08:00</published><updated>2009-11-16T00:56:53.970+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".Net"/><category scheme="http://www.blogger.com/atom/ns#" term="C#"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Microsoft Freeware Visual Studio Express</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;
Yes! Effective 19 April 2006, all Visual Studio 2005 Express Editions are free permanently!&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://www.flickr.com/photos/nooneown/261806002/&quot; title=&quot;Photo Sharing&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/117/261806002_75f8173950_o.jpg&quot; width=&quot;318&quot; height=&quot;97&quot; border=&quot;0&quot; alt=&quot;Microsoft given away its flagship development product at zero cost. Not only to learn, test and feel the new features of .Net Framework 2.0, but also able to compile and commerce the development project with Visual Studio Expression edition.&quot; /&gt;&lt;/a&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;strong&gt;Microsoft Express Edition&lt;/strong&gt; includes a wide range of Microsoft flagship development tools such as MS SQL Server 2005, Visual Basic 2005, Visual C# 2005, Visual C++ 2005, Visual J# 2005, Visual Web Developer 2005. As long as &lt;strong&gt;Express&lt;/strong&gt; keyword attached, such as Visual Studio 2005 Express Editions, it is a genuine Microsoft freeware edition.&lt;br&gt;&lt;br&gt;For those who familiar with MSDE, SQL Server Express is the replacement. Microsoft alleged that the name MSDE was confusing to customers and partners because many did not realize that it was associated with SQL Server. By changing the name from MSDE to SQL Server Express there will be less confusion among customers and partners.&lt;br&gt;&lt;br&gt;Everyone could use the Expression edition at no cost for the purpose of testing, learning, and even compile and sell the development project. Before this, Microsoft freeware such as Visual Basic Learning edition couldn&#39;t compile development into executable.&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://msdn.microsoft.com/vstudio/products/compare/&quot; target=&quot;_blank&quot;&gt;Product comparison&lt;/a&gt; of Visual Studio 2005&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://msdn.microsoft.com/vstudio/express/support/faq/&quot; target=&quot;_blank&quot;&gt;Visual Studio Express&lt;/a&gt; frequently asked questions&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://msdn.microsoft.com/vstudio/howtobuy/&quot; target=&quot;_blank&quot;&gt;Price comparison&lt;/a&gt; of Visual Studio 2005 products&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/6301116242003472477/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/6301116242003472477?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/6301116242003472477'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/6301116242003472477'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/microsoft-freeware-visual-studio.html' title='Microsoft Freeware Visual Studio Express'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-5483971738640663210</id><published>2006-10-03T21:09:00.001+08:00</published><updated>2009-11-16T00:55:50.193+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>File Command Guess Linux File Type</title><content type='html'>By convention, Windows system using 3 alphanumeric characters to serve as file extension. File extension telling Windows OS how to deal with the file, what program to manipulate the file, and to Windows users easily recognize a common file type.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;There is no such strong concept of file extension in Linux as well as UNIX world. Linux folks, however, do practice to use file extension for some file formats such as compression or archive file format. Windows users might easily get cheated by file extension trap in Linux.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;For example, it is perfectly fine to rename a PKZIP compatible zip file called backup.zip to backup.tgz or whatever filename. Later, if the user simply executing &lt;strong id=&#39;kchl&#39;&gt;tar -zxvf backup.tgz&lt;/strong&gt; might either get errors or see nothing and thought the file is corrupted.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://static.flickr.com/90/259762987_4345815ac4_o.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/90/259762987_4345815ac4_m.jpg&quot; border=&quot;0&quot; alt=&quot;Purposely rename a PKZIP compatible zip file as it is a gzip compressed tarball archive file. Use the file command to test the file if it is a valid Linux file format.&quot; /&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;Wait! Before deleting the file which thought to be corrupted, use the &lt;strong&gt;file&lt;/strong&gt; command to inspect the file type first.&lt;br&gt;&lt;br&gt;Type &lt;strong id=&#39;kchl&#39;&gt;file backup.tgz&lt;/strong&gt; at the command prompt, it shows that backup.tgz is actually a PKZIP compatible zip file. So, user should executing &lt;strong id=&#39;kchl&#39;&gt;unzip backup.tgz&lt;/strong&gt; to extract the zip file or rename backup.tgz to backup.zip before executing the unzip command.&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/5483971738640663210/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/5483971738640663210?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5483971738640663210'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5483971738640663210'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/10/file-command-guess-linux-file-type.html' title='File Command Guess Linux File Type'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-1518503636070769909</id><published>2006-09-26T14:53:00.001+08:00</published><updated>2009-11-16T00:54:59.070+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="GPL GNU"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Understand And Configure Linux Printer System</title><content type='html'>Starting Redhat 7.3, Redhat Linux support two type of printing system known. These two subsystem are known as &lt;strong&gt;LPRng&lt;/strong&gt; and &lt;strong&gt;CUPS&lt;/strong&gt; respectively.&lt;span id=&quot;fullpost&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;ol&gt;&lt;li&gt;LPRng printing system, Redhat default printer subsystem, provides &lt;strong&gt;printconf&lt;/strong&gt; as printer manager utility to configure &lt;strong&gt;/etc/printcap&lt;/strong&gt; configuration file, printer spooler, etc.&lt;br&gt;&lt;br&gt;While at command prompt, executing &lt;strong id=&#39;kchl&#39;&gt;printconf-tui&lt;/strong&gt; (Redhat 7.3) or &lt;strong id=&#39;kchl&#39;&gt;redhat-config-printer-tui&lt;/strong&gt; (Redhat 8.0) to bring up command line version of LPRng printing manager.&lt;br&gt;&lt;br&gt;For the graphical version, click on the &lt;strong id=&#39;kchl&#39;&gt;Main Menu =&gt; System Settings =&gt; Printing&lt;/strong&gt; or type &lt;strong id=&#39;kchl&#39;&gt;redhat-config-printer&lt;/strong&gt; or &lt;strong id=&#39;kchl&#39;&gt;printconf-gui&lt;/strong&gt; at a XTerm or Gnome terminal shell prompt to bring up the same GUI program.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;CUPS, shorts for Common UNIX Printing System, is an Internet Printing Protocol-compliant system for UNIX and Linux. CUPS printer subsystem uses the printer manager utility called &lt;strong&gt;lpadmin&lt;/strong&gt; to configure &lt;strong&gt;/etc/printcap&lt;/strong&gt; configuration file, printer spooler, etc. If CUPS is not the default printer subsystem, launch the &lt;strong&gt;Printer System Switcher&lt;/strong&gt; application by executing the command &lt;strong id=&#39;kchl&#39;&gt;redhat-switch-printer&lt;/strong&gt; and set CUPS as the new default printer subsystem.&lt;br&gt;&lt;br&gt;To allow only a few selected users to use a printer called inkjet-graphic, execute the command &lt;strong id=&#39;kchl&#39;&gt;lpadmin -p inkjet-graphic -u allow:keith,jazz,alice&lt;/strong&gt; and these setting will be updated to &lt;strong&gt;/etc/cups/printers.conf&lt;/strong&gt; configuration file.&lt;/li&gt;&lt;/ol&gt;&lt;blockquote&gt;
&lt;strong&gt;Note!&lt;/strong&gt; The printer manager utility, printconf or lpadmin, saves any printer configurations made to the &lt;strong&gt;/etc/printcap&lt;/strong&gt; setting file. If there is a need to make any printer configurations outside the printer manager utility, add them to the &lt;strong&gt;/etc/printcap.local&lt;/strong&gt; file. The &lt;strong&gt;/etc/printcap&lt;/strong&gt; file will be deleted whenever the printer manager executing or a server reboot.&lt;/blockquote&gt;Steps to add new printer is almost the same among printer manager utilities. In brief, these are the key points to get it works:&lt;ol&gt;&lt;li&gt;Give a descriptive &lt;strong&gt;queue name&lt;/strong&gt; to distinguish the new printer with other printers or network resources, such as keith_laser, boss_laser, tenfloor_inkjet, etc.&lt;/li&gt;&lt;li&gt;Choose the appropriate printer &lt;strong&gt;queue type&lt;/strong&gt;, such as &lt;strong&gt;LOCAL&lt;/strong&gt; queue type for local physical attached printer, &lt;strong&gt;JETDIRECT&lt;/strong&gt; for jetdirect printer, etc.&lt;/li&gt;&lt;li&gt;If there is option to select the &lt;strong&gt;Printer Device&lt;/strong&gt;, rescan the devices for the correct device, or create a custom device. This will be the /dev entry that represents the interface between the device driver and the printer itself. In most instances, the device will be named /dev/lp0.&lt;/li&gt;&lt;li&gt;Choose a &lt;strong&gt;Printer Driver&lt;/strong&gt; by selecting one from the extensive list. Drivers marked with an asterisk (*) are recommended drivers. If to configure remote printer or printer that does not have a corresponding driver in the list, the safest choice would be &lt;strong&gt;Postscript Printer&lt;/strong&gt;. For JetDirect printers, &lt;strong&gt;Raw Print Queue&lt;/strong&gt; is recommended.&lt;/li&gt;&lt;/ol&gt;To enable local printer sharing for remote host:&lt;ol&gt;&lt;li&gt;In local host which the printer attached, edit the &lt;strong&gt;/etc/lpd.perms&lt;/strong&gt; configuration file to add in one line that will read &lt;strong&gt;ACCEPT SERVICE=X REMOTEHOST=&amp;lt/etc/host.lpd&lt;/strong&gt; and make sure it should added before the line containing &lt;strong&gt;REJECT SERVICE=X NOT SERVER&lt;/strong&gt;.&lt;/li&gt;&lt;li&gt;In the local host as well, edit the &lt;strong&gt;/etc/host.lpd&lt;/strong&gt; printer access control file add in the full qualify DNS host name or IP address, one record per line, of hosts that are allowed to share the printer attached.&lt;/li&gt;&lt;li&gt;At the remote host, add the network printer as adding local printer except one has to choose a &lt;strong&gt;Unix Printer&lt;/strong&gt; queue type and type the print server &lt;strong&gt;hostname and port&lt;/strong&gt; (usually 631).&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ol&gt;&lt;li&gt;&lt;a href=&quot;http://www.linuxprinting.org&quot; target=&quot;_blank&quot;&gt;LinuxPrinting.org&lt;/a&gt; is a database of documents about printing, along with a database of nearly 1000 printers compatible with Linux printing facilities.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.tldp.org/HOWTO/Printing-HOWTO/index.html &quot; target=&quot;_blank&quot;&gt;Linux printing how-to&lt;/a&gt; from the Linux Documentation Project.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ol&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/1518503636070769909/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/1518503636070769909?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/1518503636070769909'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/1518503636070769909'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/understand-and-configure-linux-printer.html' title='Understand And Configure Linux Printer System'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-101646252421485197</id><published>2006-09-25T22:19:00.001+08:00</published><updated>2009-11-16T00:54:40.011+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><title type='text'>Redhat Enterprise Linux System File Permission</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;
Redhat Enterprise Linux device file permission could not be changed simply by using the chmod command. Instead, the device file permission is set by udev hotplug subsystem which is included in almost every 2.6 kernel based Linux distribution that is shipping.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;The configuration file &lt;strong&gt;/etc/udev/permissions.d/50-udev.permissions&lt;/strong&gt; defines the permission of each devices present in the Linux system. For example,&lt;ul&gt;&lt;li&gt;To change the raw devices file permission, search for the line that read as &lt;strong&gt;raw/*:root:disk:0660&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;To change tape drive file permission, search for the line that read as &lt;strong&gt;st*:root:disk:0660&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;The default permission defined is 0660. Simply change the 4 digits code as usual to an expected permission, say 0666 instead of 0660.&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/101646252421485197/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/101646252421485197?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/101646252421485197'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/101646252421485197'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/redhat-enterprise-linux-system-file.html' title='Redhat Enterprise Linux System File Permission'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-4019262782024793917</id><published>2006-09-25T11:55:00.001+08:00</published><updated>2009-11-16T00:54:25.133+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="GPL GNU"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Nagios"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>System And Network Monitoring Freeware</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;
Nagios is the answer!&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://static.flickr.com/94/247861292_39e1e56335_o.png&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/94/247861292_39e1e56335_o.png&quot; border=&quot;0&quot; alt=&quot;Nagios is the a GNU GPL software that could used to monitor diverse servers and networking devices. Although the Nagios server running only in Linux and UNIX variants there are Windows based Nagios client that could used to monitor Windows server as well.&quot; /&gt;&lt;/a&gt;&lt;br&gt;It is licensed under the terms of the GNU General Public License Version 2 as published by the Free Software Foundation.&lt;br&gt;&lt;br&gt;Nagios is a powerful system and network monitoring application. It monitors hosts and services specified, alerting administrators when threshold triggered, and when they recover to healthy state.&lt;br&gt;&lt;br&gt;&lt;span id=&quot;fullpost&quot;&gt;Nagios is only available in Linux or UNIX variants. Although, it could helps to monitor Windows servers as well via the Windows version of Nagios client.&lt;br&gt;&lt;br&gt;Nagios features:&lt;ol&gt;&lt;li&gt;Monitors network services such as SMTP, POP3, HTTP, NNTP, PING, etc.&lt;/li&gt;&lt;li&gt;Monitors server resources such as processor load, disk usage, etc.&lt;/li&gt;&lt;li&gt;Simple plugin design that allows users to easily customize own service checks.&lt;/li&gt;&lt;li&gt;Parallelized service checks.&lt;/li&gt;&lt;li&gt;Ability to define network devices hierarchy using &quot;parent&quot; hosts, allowing detection of and distinction between network devices that are down and those that are unreachable.&lt;/li&gt;&lt;li&gt;Notifications to contacts of email, pager, or user-defined method, when service or host status change.&lt;/li&gt;&lt;li&gt;Ability to define event handlers to be run during service or host events for proactive problem resolution.&lt;/li&gt;&lt;li&gt;Automatic log file rotation.&lt;/li&gt;&lt;li&gt;Support for implementing redundant monitoring hosts.&lt;/li&gt;&lt;li&gt;Optional web interface for viewing current network status, notification and problem history, log file, etc.&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href =&quot;http://nagios.org&quot; target=&quot;_blank&quot;&gt;Nagios&lt;/a&gt; official site&lt;/li&gt;&lt;li&gt;Nagios 2.0 &lt;a href=&quot;http://nagios.sourceforge.net/docs/2_0/toc.html&quot; target=&quot;_blank&quot;&gt;documentation&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://nagiosplug.sourceforge.net&quot; target=&quot;_blank&quot;&gt;Nagios Plugin&lt;/a&gt; is the open project at Source Forge to create Nagios plugin&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.nagiosexchange.org&quot; target=&quot;_blank&quot;&gt;Nagios Exchange&lt;/a&gt; is the official repository for third party Nagios plugin&lt;/li&gt;&lt;li&gt;Nagios plugin &lt;a href=&quot;http://nagiosplug.sourceforge.net/developer-guidelines.html&quot; target=&quot;_blank&quot;&gt;development guidelines&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/4019262782024793917/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/4019262782024793917?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/4019262782024793917'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/4019262782024793917'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/system-and-network-monitoring-freeware.html' title='System And Network Monitoring Freeware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-6218395924427190321</id><published>2006-09-25T00:12:00.001+08:00</published><updated>2009-11-16T00:54:01.718+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="File Utility"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="ms-dos"/><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Internet Explorer Turns FTP Browser</title><content type='html'>FTP is a legacy file transfer protocol that has been widely used since the day of networked computing.&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;Other than using the serious typing of command line FTP client, such as the standard FTP client offers by all Windows system, Internet Explorer able to serve as GUI FTP browser too!&lt;br&gt;&lt;br&gt;&lt;span id=&quot;fullpost&quot;&gt;Follow these simple steps to turn IE into a graphical FTP client:&lt;ol&gt;&lt;li&gt;Click the Tools menu from Internet Explorer,&lt;/li&gt;&lt;li&gt;Click on Internet Options,&lt;/li&gt;&lt;li&gt;Click the Advanced tab,&lt;/li&gt;&lt;li&gt;Check the check box labeled as &quot;Enable Folder View For FTP Sites&quot;,&lt;/li&gt;&lt;li&gt;Check the check box labeled as &quot;Use Passive FTP&quot;. Set this option only if the PC is behind a firewall.&lt;/li&gt;&lt;li&gt;Click OK button to complete the setting.&lt;/li&gt;&lt;li&gt;Now, IE is ready to serve as graphical FTP browser. For example, type &lt;strong id=&#39;kchl&#39;&gt;ftp://keith@188.8.1.10&lt;/strong&gt; in the IE address bar and press ENTER to instruct IE connect to FTP server 188.8.1.10 using FTP user account keith. Enter the password when prompt.&lt;/li&gt;&lt;li&gt;Click OK and wait. After successful authentication, an interface similar to Windows Explorer shown. Copy files or folders as usual!&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/6218395924427190321/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/6218395924427190321?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/6218395924427190321'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/6218395924427190321'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/internet-explorer-turns-ftp-browser.html' title='Internet Explorer Turns FTP Browser'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-60660286596676975</id><published>2006-09-23T00:04:00.001+08:00</published><updated>2009-11-16T00:53:46.679+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Tweaking Windows Recovery Console</title><content type='html'>The Windows Recovery Console is designed to help system administrators recover Windows-based computer that fails to start up properly. It is available only in command prompt. Hence the name &quot;Console&quot; attached. It looks like the Windows 9x boot disk, but Windows Recovery Console is more powerful and features rich than the old Windows boot disk.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;Basically, Windows Recovery Console allow system administrators to:&lt;ol&gt;&lt;li&gt;Copy, rename, replace, and access to operating system files and folders&lt;/li&gt;&lt;li&gt;Enable or disable Windows services for next system bootup&lt;/li&gt;&lt;li&gt;Repair the file system boot sector or the Master Boot Record (MBR)&lt;/li&gt;&lt;li&gt;Create and format partitions&lt;/li&gt;&lt;/ol&gt;By default setup, Windows Recovery Console with Administrator account logon allows access to only&lt;ol&gt;&lt;li&gt;the root folder&lt;/li&gt;&lt;li&gt;the %SystemRoot% folder and sub folders of the Windows installation&lt;/li&gt;&lt;li&gt;the Cmdcons folder&lt;/li&gt;&lt;li&gt;the removable media drives such as the CD-ROM drive or the DVD-ROM drive&lt;/li&gt;&lt;/ol&gt;Trying access to folders other than those listed above will rejected with an &quot;Access Denied&quot; error message. Besides that, Windows Recovery Console disallow copy files from local hard disk to removable storage such as floppy disk. However, Windows Recovery Console allow copy files from removable storage to local hard disk or copy files from one hard disk to another hard disk.&lt;br&gt;&lt;br&gt;Although, limitations imposed on default setup that stated above could be resolved by
&lt;ol&gt;&lt;li&gt;First, enable setting in Local Security Policy.&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Click on Start button,&lt;/li&gt;&lt;li&gt;Click on Run menu,&lt;/li&gt;&lt;li&gt;Type &lt;strong id=&#39;kchl&#39;&gt;gpedit.msc&lt;/strong&gt; and click OK button,&lt;/li&gt;&lt;li&gt;Click on Computer Configuration, Windows Setting, Security Setting, Local Policies, Security Options, &lt;/li&gt;&lt;li&gt;Look for &quot;Recovery Console: Allow floppy copy and access to all drives and all folders&quot; policy on the right pane and double-click it,&lt;/li&gt;&lt;li&gt;Select Enabled,&lt;/li&gt;&lt;li&gt;Click OK&lt;/li&gt;&lt;/ol&gt;&lt;br&gt;&lt;strong&gt;Note!&lt;/strong&gt; As a security measures, it might be wise to double-click on &quot;Recovery Console: Allow automatic administrative logon&quot; policy too and disable it.&lt;br&gt;&lt;br&gt;&lt;/li&gt;&lt;li&gt;Second and last, boot up to Windows Recovery Console, logon with Administrator login account, and execute these two commands:&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;&lt;strong id=&#39;kchl&#39;&gt;set AllowRemovableMedia = true&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong id=&#39;kchl&#39;&gt;set AllowAllPaths = true&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;/li&gt;It might be useful to turn on these two features too:&lt;br&gt;&lt;br&gt;&lt;li&gt;&lt;strong id=&#39;kchl&#39;&gt;set AllowWildCards = true&lt;/strong&gt; to allow wildcard support for some commands such as &lt;strong&gt;del&lt;/strong&gt;.&lt;/li&gt;&lt;li&gt;&lt;strong id=&#39;kchl&#39;&gt;set NoCopyPrompt = true&lt;/strong&gt; to disable prompt when overwriting an existing file.&lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;/ol&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/10/install-recover-console-to-boot-menu.html&quot;&gt;Install&lt;/a&gt; Windows Recovery Console&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/60660286596676975/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/60660286596676975?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/60660286596676975'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/60660286596676975'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/tweaking-windows-recovery-console.html' title='Tweaking Windows Recovery Console'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-2690170204002182896</id><published>2006-09-22T23:31:00.001+08:00</published><updated>2009-11-16T00:53:30.366+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="shell scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><title type='text'>Shell Scripts Monitoring Disk Space Utilization</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BFTopBan15Nov09 */
google_ad_slot = &quot;2751782326&quot;;
google_ad_width = 468;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;Nothing special. Just a simple &lt;a href=&quot;#SH&quot;&gt;shell scripts&lt;/a&gt;, could be served as an introduction of Unix Shell scripts programming, written to check disk space utilization of Linux (applicable to Unix too) filesystems or partitions.&lt;span id=&quot;fullpost&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;strong&gt;Note!&lt;/strong&gt; Ignore the left most numeric digits which are not part of the Shell scripts coding. These are line number indicators, which could be turned on in Vi editor using the &lt;strong id=&quot;kchl&quot;&gt;:set nu&lt;/strong&gt; command code.&lt;br&gt;&lt;br&gt;It might be useful to comment out line 14th and remove the hash key on line 15th, which disable echo alert to console and enable alerts emailed to mail box. Configure Linux scheduler via the &lt;strong id=&quot;kchl&quot;&gt;crontab -e&lt;/strong&gt; to run this shell scripts, perhaps once a day, and get system administrators alarmed of critical free disk space before the system comes to halt.&lt;br&gt;&lt;br&gt;Related information:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://nooneown.googlepages.com/ChkFreeSpace.sh&quot; target=&quot;_blank&quot; id=&quot;SH&quot;&gt;ChkFreeSpace.sh&lt;/a&gt; shell scripts source code&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://bloggerdigest.blogspot.com/2006/09/vi-editor-quick-reference.html&quot;&gt;Vi editor&lt;/a&gt; quick cheat sheet&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AC&quot;&gt;Search more&lt;/a&gt; related info with Google Search engine built-in&lt;/li&gt;&lt;/ul&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-9150838093899057&quot;;
/* BD336Bot15Nov09 */
google_ad_slot = &quot;8676621035&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/2690170204002182896/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/2690170204002182896?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/2690170204002182896'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/2690170204002182896'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/shell-scripts-monitoring-disk-space.html' title='Shell Scripts Monitoring Disk Space Utilization'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-5117682793499665112</id><published>2006-09-19T22:53:00.002+08:00</published><updated>2010-04-26T17:16:27.316+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Restart Disabled Windows Services</title><content type='html'>What could be done besides rebooting Windows server when a particular Windows service become unavailable to start, stop, pause, resume, or restart?&lt;br&gt;&lt;br&gt;Restarting a Windows service, particular a poorly coded third party Windows service, may turns out to become unable to start, stop, pause, resume, or restart, after the service timeout and fail to startup successfully again. All these five common actions or tasks are dimmed and become unavailable. Restart the Windows server is not the only way, and might not advisable too, to resolve the problem.&lt;br&gt;&lt;br&gt;Try this before deciding to reboot the Windows server:&lt;br&gt;&lt;br&gt;&lt;span id=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://static.flickr.com/95/247563703_eef0328c9b_o.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:center; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/95/247563703_eef0328c9b_m.jpg&quot; border=&quot;0&quot; alt=&quot;Resolve Windows service which dimmed all its associated actions, i.e. start, stop, pause, resume, restart&quot; /&gt;&lt;/a&gt;&lt;ol&gt;&lt;li&gt;Right-click on the Windows service,&lt;/li&gt;&lt;br&gt;&lt;li&gt;Select property,&lt;/li&gt;&lt;br&gt;&lt;li&gt;Set the Startup type to Disabled,&lt;/li&gt;&lt;br&gt;&lt;li&gt;Click OK,&lt;/li&gt;&lt;br&gt;&lt;li&gt;Set to Startup type again to either Manual or Automatic,&lt;/li&gt;&lt;br&gt;&lt;li&gt;Click OK again,&lt;/li&gt;&lt;br&gt;&lt;li&gt;Now, this particular Windows service might able to perform one of the five common actions again. Restart the Windows server if these do not work perfectly too.&lt;/li&gt;&lt;/ol&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/5117682793499665112/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/5117682793499665112?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5117682793499665112'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/5117682793499665112'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/restart-disabled-windows-services.html' title='Restart Disabled Windows Services'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-8872438078993012433</id><published>2006-09-19T09:31:00.002+08:00</published><updated>2010-04-26T17:16:57.495+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Freeware"/><category scheme="http://www.blogger.com/atom/ns#" term="GPL GNU"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Nagios"/><category scheme="http://www.blogger.com/atom/ns#" term="redhat"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="unix"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Fine Tuning Nagios Performance</title><content type='html'>&lt;a href=&quot;http://static.flickr.com/94/247861292_39e1e56335_t.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;&quot; src=&quot;http://static.flickr.com/94/247861292_39e1e56335_t.jpg&quot; border=&quot;0&quot; alt=&quot;Fine tuning Nagios for optimum performance&quot; /&gt;&lt;/a&gt;These optimization tips are suggested by Nagios official documentation. It might be useful to fine tune Nagios for optimum performance and effective monitoring service.&lt;span id=&quot;fullpost&quot;&gt;&lt;ol&gt;&lt;li&gt;Enabling aggregated status updates with the &lt;strong&gt;aggregate_status_updates&lt;/strong&gt; option to greatly reduce the load on the monitoring host especially when monitoring a large number of services. The downside of this approach is getting delay notification on status change.&lt;/li&gt;&lt;br&gt;&lt;li&gt;If standard status log is used instead of aggregated status updates, consider putting the directory where the status log is stored on a ramdisk. Ramdisk helps to speed thing up by saving a lot of interrupts and disk thrashing.&lt;/li&gt;&lt;br&gt;&lt;li&gt;Use &lt;strong&gt;max_concurrent_checks&lt;/strong&gt; option to restrict the number of maximum concurrently executing service checks. Nagios is overloaded if the &lt;strong&gt;extinfo CGI&lt;/strong&gt; showing high latency values, say more than 10 seconds, for the majority of service checks.&lt;/li&gt;&lt;br&gt;&lt;li&gt;The overhead needed to process the results of passive service checks is much lower than that of normal active checks. Passive service checks are only really useful if there are some external applications doing some type of monitoring.&lt;/li&gt;&lt;br&gt;&lt;li&gt;Compiled plugin (C/C++) runs more efficient and faster than interpreted script (Perl, etc) plugins. If really want to use Perl plugins, consider compiling them into true executable using &lt;strong&gt;perlcc&lt;/strong&gt; utility which is part of the standard Perl distribution or compiling Nagios with an embedded Perl interpreter.&lt;br&gt;&lt;br&gt;In order to compile in the embedded Perl interpreter, set the &lt;strong&gt;--enable-embedded-perl&lt;/strong&gt; option in the configuration script before compiling Nagios. In addition, use the &lt;strong&gt;--with-perlcache&lt;/strong&gt; option to enable embedded interpreter caching the compiled Perl scripts for later reuse.&lt;/li&gt;&lt;br&gt;&lt;li&gt;The &lt;strong&gt;check_ping&lt;/strong&gt; plugin used to check host states will performs much faster if break up the checks. This is due to the fact that Nagios judges the status of a host after executing the plugin once.&lt;br&gt;&lt;br&gt;Hence, it would be much faster to set the &lt;strong&gt;max_attempts&lt;/strong&gt; value to 10 and only send out 1 ICMP packet each time, instead of specifying a max_attempts value of 1 in the host definition and having the check_ping plugin send 10 ICMP packets to the host.&lt;br&gt;&lt;br&gt;However, the pitfalls of this arrangement will happens when the hosts are slow to respond may be assumed to be down. Another option would be to use a faster plugin &lt;strong&gt;check_fping&lt;/strong&gt; as the &lt;strong&gt;host_check_command&lt;/strong&gt; instead of check_ping.&lt;/li&gt;&lt;br&gt;&lt;li&gt;Do not schedule regular checks of hosts unless absolutely necessary. Set the value to 0 for &lt;strong&gt;check_interval&lt;/strong&gt; directive in the host definition to disable regular checks of a host. Use a longer check interval if really need to have regularly scheduled host checks.&lt;/li&gt;&lt;br&gt;&lt;li&gt;Disable the &lt;strong&gt;use_aggressive_host_checking&lt;/strong&gt; option to speed up host checks. The trade off is that host recoveries can be missed under certain circumstances.&lt;/li&gt;&lt;br&gt;&lt;li&gt;Set the &lt;strong&gt;command_check_interval&lt;/strong&gt; variable to -1 if running a lot of external commands, i.e passive checks in a distributed setup, will cause Nagios to check for external commands as often as possible. This is important because most systems have small pipe buffer sizes (4KB). If Nagios doesn&#39;t read the data from the pipe fast enough, applications that write to the external command file (the NSCA daemon) will block and wait until there is enough free space in the pipe to write their data.&lt;/li&gt;&lt;br&gt;&lt;li&gt;System configuration / hardware setup directly affecting how the operating system (and Nagios application) performs. CPU and memory speed are obviously factors that affect system performance, but disk access is biggest bottleneck. Don&#39;t store plugins, status log, etc on slow storage medium such as old IDE drives or NFS mounts. Always opt to use UltraSCSI drives or fast IDE drives whenever possible.&lt;br&gt;&lt;br&gt;Note! Many Linux installations do not attempt to optimize IDE disk access. Use &lt;strong&gt;hdparam&lt;/strong&gt; to change the IDE hard disk access parameters to gain speedy features of the new IDE drives.&lt;/li&gt;&lt;/ol&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/8872438078993012433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/8872438078993012433?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8872438078993012433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8872438078993012433'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/fine-tuning-nagios-performance.html' title='Fine Tuning Nagios Performance'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-27391057965833544.post-8303437444725725291</id><published>2006-09-17T22:16:00.002+08:00</published><updated>2010-04-26T17:17:17.343+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="networking"/><category scheme="http://www.blogger.com/atom/ns#" term="System Tuning"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2000"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Registry"/><category scheme="http://www.blogger.com/atom/ns#" term="windows xp"/><title type='text'>Tweaking Windows Server LargeSystemCache</title><content type='html'>&lt;strong&gt;LargeSystemCache&lt;/strong&gt; determines whether Windows 2000 Server should maintains a standard size or a large size file system cache, and influences how often the system writes changed pages back to hard disk.&lt;br&gt;&lt;br&gt;Increasing the size of the file system cache generally improves server performance, but it reduces physical memory space available to applications and services. In addition, writing system data less frequently minimizes use of the kernel disk subsystem, but the changed pages occupy memory that might otherwise be used by applications.&lt;br&gt;&lt;br&gt;&lt;span id=&quot;fullpost&quot;&gt;LargeSystemCache is DWORD registry data type that could be located at registry path&lt;br&gt;&lt;br&gt;&lt;strong&gt;HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Setting LargeSystemCache to 1 (system default)&lt;/span&gt;&lt;br&gt;&lt;br&gt;Establishes a large system cache working set that can expand to physical memory, minus 4 MB, if needed. The system allows changed pages to remain in physical memory until the number of available pages drops to approximately 250. This setting is recommended for most computers running Windows 2000 Server as file server on large networks.&lt;br&gt;&lt;br&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Setting LargeSystemCache to 0&lt;/span&gt;&lt;br&gt;&lt;br&gt;Establishes a standard size file system cache of approximately 8 MB. The system allows changed pages to remain in physical memory until the number of available pages drops to approximately 1,000. This setting is recommended for servers running applications that do their own memory caching, such as Microsoft SQL Server, and for applications that perform best with ample memory, such as Internet Information Services web server.&lt;br&gt;&lt;br&gt;Other than access to registry via regedit.exe and edit directly, alternative method to tweak LargeSystemCache is by
&lt;ol&gt;&lt;li&gt;accessing to the Server Optimization tab in Network And Dial-up Connections,&lt;/li&gt;&lt;li&gt;right-click My Network Places,&lt;/li&gt;&lt;li&gt;click Properties,&lt;/li&gt;&lt;li&gt;right-click Local Area Connection,&lt;/li&gt;&lt;li&gt;click Properties,&lt;/li&gt;&lt;li&gt;click File And Printer Sharing For Microsoft Networks,&lt;/li&gt;&lt;li&gt;and then click the Properties button,&lt;/li&gt;&lt;li&gt;to set the LargeSystemCache to 0, select the &lt;strong&gt;Maximize Data Throughput For Network Applications&lt;/strong&gt; option,&lt;/li&gt;&lt;li&gt;to set the LargeSystemCache to 1, select &lt;strong&gt;Maximize Data Throughput For File Sharing&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;The default setup of Windows 2000 Server initialize LargeSystemCache to 1 which is ideal when running as file server. However, setting LargeSystemCache to 1 can degrade service performance. As such, it is not appropriate when running as application servers such as Web server, SQL server, Exchange server. In this case, reset LargeSystemCache to 0 by selecting the &lt;strong&gt;Maximize Data Throughput For Network Applications&lt;/strong&gt; option in Network And Dial-up Connections.&lt;br&gt;&lt;br&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bloggerdigest.blogspot.com/feeds/8303437444725725291/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/27391057965833544/8303437444725725291?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8303437444725725291'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/27391057965833544/posts/default/8303437444725725291'/><link rel='alternate' type='text/html' href='http://bloggerdigest.blogspot.com/2006/09/tweaking-windows-server.html' title='Tweaking Windows Server LargeSystemCache'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry></feed>