How to reset the Zeroshell password

How to reset the Zeroshell password

The Zeroshell password is written in

/Database/var/register/system/ldap/rootpw

# mount /dev/sda1 /mnt

# cd  /mnt/_DB.001/var/register/system/ldap

#cat rootpw

Zeroshell How to Download here

 

Posted in Linux | Tagged | Leave a comment

Configure TCP/IP from the Command Prompt

Configure TCP/IP from the Command Prompt

In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. and ncpa.cpl

 network connections window: from command prompt   >  ncpa.cpl

Netsh.exe is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh.exe also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer. Netsh.exe can also save a configuration script in a text file for archival purposes or to help you configure other servers.

Netsh.exe is available on Windows 2000, Windows XP and Windows Server 2003.

You can use the Netsh.exe tool to perform the following tasks:

  • Configure interfaces
  • Configure routing protocols
  • Configure filters
  • Configure routes
  • Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
  • Display the configuration of a currently running router on any computer
  • Use the scripting feature to run a collection of commands in batch mode against a specified router.

What can we do with Netsh.exe?

With Netsh.exe you can easily view your TCP/IP settings. Type the following command in a Command Prompt window (CMD.EXE):

netsh interface ip show config

With Netsh.exe, you can easily configure your computer’s IP address and other TCP/IP related settings. For example:

The following command configures the interface named Local Area Connection with the static IP address 192.168.0.100, the subnet mask of 255.255.255.0, and a default gateway of 192.168.0.1:

netsh interface ip set address name="Local Area Connection" static 192.168.0.100 255.255.255.0 192.168.0.1 1

(The above line is one long line, copy paste it as one line)

Netsh.exe can be also useful in certain scenarios such as when you have a portable computer that needs to be relocated between 2 or more office locations, while still maintaining a specific and static IP address configuration. With Netsh.exe, you can easily save and restore the appropriate network configuration.

  

First, connect your portable computer to location #1, and then manually configure the required settings (such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses). 

Now, you need to export your current IP settings to a text file. Use the following command:

netsh -c interface dump > c:\location1.txt

When you reach location #2, do the same thing, only keep the new settings to a different file:

netsh -c interface dump > c:\location2.txt

You can go on with any other location you may need, but we’ll keep it simple and only use 2 examples.

Now, whenever you need to quickly import your IP settings and change them between location #1 and location #2, just enter the following command in a Command Prompt window (CMD.EXE):

netsh -f c:\location1.txt

or

netsh -f c:\location2.txt

and so on.

You can also use the global EXEC switch instead of -F:

netsh exec c:\location2.txt

Netsh.exe can also be used to configure your NIC to automatically obtain an IP address from a DHCP server:

netsh interface ip set address "Local Area Connection" dhcp

Would you like to configure DNS and WINS addresses from the Command Prompt? You can. See this example for DNS:

netsh interface ip set dns "Local Area Connection" static 192.168.0.200

and this one for WINS:

netsh interface ip set wins "Local Area Connection" static 192.168.0.200

Or, if you want, you can configure your NIC to dynamically obtain it’s DNS settings:

netsh interface ip set dns "Local Area Connection" dhcp

BTW, if you want to set a primary and secondary DNS address, add index=1 and index=2 respectively to the lines of Netsh command.

As you now see, Netsh.exe has many features you might find useful, and that goes beyond saying even without looking into the other valuable options that exist in the command.

Source link

Posted in Uncategorized | Tagged | Leave a comment

CHKDSK on Windows

CHKDSK on Windows

Chkdsk

Checks the file system and file system metadata for errors and displays a status report of its findings. Used without parameters, chkdsk displays only the status of the disk in the current drive. It does not fix errors. To fix errors, you must include the /f parameter.

Important

  • On computers running Windows Server 2003 with Service Pack 1 (SP1), chkdsk automatically creates a shadow copy before checking a volume so that you can check volumes that are in use by another program or process. Using the shadow copy, chkdsk accurately reports errors on volumes that are in use.However, on computers without Windows Server 2003 SP1, running chkdsk without parameters on an active system or boot volume, or on a data volume that is in use, might incorrectly report errors when none are present. To avoid this, close all programs or processes that have open handles to the volume.

    While repairing volumes (or inspecting volumes on computers without Windows Server 2003 SP1), chkdsk locks the volume making any data stored on the volume unavailable until chkdsk is finished. As a rule, run chkdsk only on volumes that are known to be corrupt. On volumes marked as “dirty”, Windows automatically runs chkdsk when you restart the computer.

    On servers that are infrequently restarted, use the chkntfs or the fsutil dirty query commands to determine whether the volume’s dirty bit is set before running chkdsk.

  • Interrupting chkdsk is not recommended. However, canceling or interrupting chkdsk should not leave the volume any more corrupt than it was beforechkdsk was run. Rerunning chkdsk repairs any remaining corruption on the volume.
Syntax

chkdsk [Volume:][[PathFileName] [/f] [/v] [/r] [/x] [/i] [/c] [/l[:Size]]

Parameters
Volume :
Specifies the drive letter (followed by a colon), mount point, or volume name. 

[PathFileName
Use with file allocation table (FAT) and FAT32 only. Specifies the location and name of a file or set of files that you want chkdsk to check for fragmentation. You can use wildcard characters (that is, * and ?) to specify multiple files. 

/f
Fixes errors on the disk. The disk must be locked. If chkdsk cannot lock the drive, a message appears that asks you if you want to check the drive the next time you restart the computer. 

/v
Displays the name of each file in every directory as the disk is checked. 

/r
Locates bad sectors and recovers readable information. The disk must be locked. 

/x
Forces the volume to dismount first, if necessary. All open handles to the drive are invalidated. /x also includes the functionality of /f. 

/i
Use with NTFS only. Performs a less vigorous check of index entries, reducing the amount of time needed to run chkdsk. 

/c
Use with NTFS only. Skips the checking of cycles within the folder structure, reducing the amount of time needed to run chkdsk. 

/l[:Size]
Use with NTFS only. Changes the log file size to the size you type. If you omit the size parameter, /l displays the current size. 

/?
Displays help at the command prompt. 

Remarks
  • Running chkdskTo run chkdsk on a fixed disk, you must be a member of the Administrators group.
  • Checking a locked drive at restart If you want chkdsk to correct disk errors, you cannot have open files on the drive. If files are open, the following error message appears:

    Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the next time the system restarts? (Y/N)

    If you choose to check the drive the next time you restart the computer, chkdsk checks the drive and corrects errors automatically when you restart the computer. If the drive partition is a boot partition, chkdsk automatically restarts the computer after it checks the drive.

    You can also use the chkntfs /c command to schedule the volume to be checked the next time the computer is restarted. Use the fsutil dirty set command to set the volume’s dirty bit (indicating corruption), so that Windows runs chkdsk when the computer is restarted.

  • Reporting disk errors Chkdsk examines disk space and disk use for the FAT and NTFS file systems. Chkdsk provides information specific to each file system in a status report. The status report shows errors found in the file system. If you run chkdsk without the /f command-line option on an active partition, it might report spurious errors because it cannot lock the drive. You should use chkdsk occasionally on each disk to check for errors.
  • Fixing disk errorsChkdsk corrects disk errors only if you specify the /f command-line option. Chkdsk must be able to lock the drive to correct errors.

    Because repairs on FAT file systems usually change a disk’s file allocation table and sometimes cause a loss of data, chkdsk might display a confirmation message similar to the following:

    10 lost allocation units found in 3 chains.

    Convert lost chains to files?

    If you press Y, Windows saves each lost chain in the root directory as a file with a name in the format Filennnn.chk. When chkdsk finishes, you can check these files to see if they contain any data you need. If you press N, Windows fixes the disk, but it does not save the contents of the lost allocation units.

    If you do not use the /f command-line option, chkdsk displays a message that the file needs to be fixed, but it does not fix any errors.

    If you use chkdsk /f on a very large disk (for example, 70 gigabytes) or a disk with a very large number of files (for example, millions of files), chkdsk /fmight take a long time to complete. The computer is not available during this time because chkdsk /f retains control of the disk until it is finished making repairs.

  • Checking a FAT disk Windows displays chkdsk status reports for a FAT disk in the following format:

    Volume Serial Number is B1AF-AFBF

    72214528 bytes total disk space

    73728 bytes in 3 hidden files

    30720 bytes in 12 directories

    11493376 bytes in 386 user files

    61440 bytes in bad sectors

    60555264 bytes available on disk2048 bytes in each allocation unit

    35261 total allocation units on disk

    29568 available allocation units on disk 

  • Checking an NTFS disk Windows displays chkdsk status reports for an NTFS disk in the following format:

    The type of the file system is NTFS.

    CHKDSK is verifying files...File verification completed.CHKDSK is verifying indexes...

    Index verification completed.

    CHKDSK is verifying security descriptors...

    Security descriptor verification completed.

    12372 kilobytes total disk space.

    3 kilobytes in 1 user files.

    2 kilobytes in 1 indexes.

    4217 kilobytes in use by the system.

    8150 kilobytes available on disk.

    512 bytes in each allocation unit.

    24745 total allocation units on disk.

    16301 allocation units available on disk.

  • Using chkdsk with open files If you specify the /f command-line option, chkdsk displays an error message if there are open files on the disk. If you do not specify the /f command-line option and open files exist, chkdsk might report lost allocation units on the disk. This could happen if open files have not yet been recorded in the file allocation table. If chkdsk reports the loss of a large number of allocation units, consider repairing the disk.
  • Using chkdsk with Shadow Copies for Shared Folders on computers without Windows Server 2003 SP1Because the Shadow Copies for Shared Folders source volume cannot be locked while Shadow Copies for Shared Folders is enabled, running chkdsk against the source volume might report false errors or cause chkdsk to unexpectedly quit. You can, however, check shadow copies for errors by running chkdsk in read-only mode (without parameters) to check the Shadow Copies for Shared Folders storage volume.
  • Finding physical disk errors Use the /r command-line option to find physical disk errors in the file system. For information about recovering physically damaged files with recover, see Related Topics.
  • Reporting bad disk sectors Bad sectors reported by chkdsk were marked as bad when your disk was first prepared for operation. They pose no danger.
  • Understanding exit codes The following table lists the exit codes that chkdsk reports after it has finished.

     

    Exit code Description
    0 No errors were found.
    1 Errors were found and fixed.
    2 Disk cleanup, such as garbage collection, was performed, or cleanup was not performed because /f was not specified.
    3 Could not check the disk, errors could not be fixed, or errors were not fixed because /f was not specified.
  • The chkdsk command, with different parameters, is available from the Recovery Console.
Examples

If you want to check the disk in drive D and have Windows fix errors, type:

chkdsk d: /f

If it encounters errors, chkdsk pauses and displays messages. Chkdsk finishes by displaying a report that lists the status of the disk. You cannot open any files on the specified drive until chkdsk finishes.

To check all of files on a FAT disk in the current directory for noncontiguous blocks, type:

chkdsk *.*

Chkdsk displays a status report, and then lists the files matching the file specification that have noncontiguous blocks.

Posted in Uncategorized | Tagged | Leave a comment

VMWare P2V migration

VMWare P2V migration

Setup for Failover Clustering and Microsoft Cluster Service describes the types of clusters you can implement using virtual machines with Microsoft Cluster Service for Windows Server 2003 and Failover Clustering for Windows Server 2008. You get step-by-step instructions for each type of cluster and a checklist of clustering requirements and recommendations

Setup for Failover Clustering and Microsoft Cluster Service

Microsoft Clustering on VMware vSphere: Guidelines for Supported Configurations

Performing P2V Conversions using VMWare Converter

DBA Guide to Databases on VMware

Posted in VMware | Tagged | Leave a comment

How to install product key after evaluation expired SCOM

How to install product key after evaluation expired SCOM

How to add a product key to an eval version of System Center 2012 Operations Manager

To set the product key, use the Set-SCOMLicense cmdlet in PowerShell. To use the Set-SCOMLicense cmdlet you need to use elevated permissions. (Run as Administrator).

1. Open PowerShell as an Administrator

2. Load the OperationsManager Module

import-module operationsmanager

3. Connect to your ManagementGroup

SCOMManagementGroupConnection

4. Use Set-SCOMLicense -ProductId “yourlicensekey“
Set-SCOMLicense -ProductId ‘C97A1C5E-6429-4F71-8B2D-3525E237BF62’

5. To check if changes were executed run Get-SCOMManagementGroup | ft skuforlicense, version, timeofexpiration –a

Note: This may require a reboot after running in order to register correctly.

For more information on the Set-SCOMLicense cmdlet see http://technet.microsoft.com/en-us/library/hh920237.aspx

Source link :- http://support.microsoft.com/kb/2699998

Posted in Uncategorized | Tagged | 1 Comment

windows xp auto logon

windows xp auto logon

This article describes how to configure Windows XP to automate the logon process by storing your password and other pertinent information in the registry database. This feature allows other users to start your computer and to use the account that you establish to automatically log on.
Important If you turn on autologon, using Windows XP becomes more   convenient. However, using this feature can pose a security risk.

Turn on automatic logon in Windows XP

Microsoft fix it for me click here download

Turn off automatic logon in Windows XP

Microsoft fix it for me click here download

Microsoft URL Link

Posted in Uncategorized | Tagged | Leave a comment

Recover MySQL root Password

Recover MySQL root Password

You can recover MySQL database server password with following five easy steps.   Step # 1: Stop the MySQL server process.

Step # 2: Start the MySQL (mysqld) server/daemon process with the –skip-grant-tables option so that it will not prompt for password.

Step # 3: Connect to mysql server as the root user.

Step # 4: Setup new mysql root account password i.e. reset mysql password.

Step # 5: Exit and restart the MySQL server.

Here are commands you need to type for each step (login as the root user):

Step # 1 : Stop mysql service

# /etc/init.d/mysql stop

Output: Stopping MySQL database server: mysqld.

Step # 2: Start to MySQL server w/o password:

# mysqld_safe –skip-grant-tables &

Output:

[1] 5988 Starting mysqld daemon with databases from /var/lib/mysql mysqld_safe[6025]: started

Step # 3: Connect to mysql server using mysql client:

# mysql -u root

Output:

Welcome to the MySQL monitor.  Commands end with ; or \g. Your MySQL connection id is 1 to server version: 4.1.15-Debian_1-log Type ‘help;’ or ‘\h’ for help. Type ‘\c’ to clear the buffer. mysql>

Step # 4: Setup new MySQL root user password

mysql> use mysql; mysql> update user set password=PASSWORD(“NEW-ROOT-PASSWORD”) where User=’root’; mysql> flush privileges; mysql> quit

Step # 5: Stop MySQL Server:

# /etc/init.d/mysql stop

Output:

Stopping MySQL database server: mysqld STOPPING server from pid file /var/run/mysqld/mysqld.pid mysqld_safe[6186]: ended [1]+  Done                    mysqld_safe –skip-grant-tables

Step # 6: Start MySQL server and test it

# /etc/init.d/mysql start # mysql -u root -p

Source link http://www.cyberciti.biz/tips/recover-mysql-root-password.html

text file

Posted in Uncategorized | Tagged | 1 Comment

vSphere 5 Documentation Center

vSphere 5 Documentation Center

Installation Guide click here

Systems Compatibility Guide click here

Storage/SAN Compatibility Guide click here

I/O Compatibility Guide click here

Guest/Host OS Compatibility Guide click here

VMware View Client Compatibility Guide click here

VMware knowledge base search Click here

 

 

Posted in VMware | Tagged | Leave a comment

VMware Product compatibility Interoperability Matrixes

VMware Product compatibility  Interoperability Matrixes.

Before installation and migration or update the vmware infrastructure we have to check the compatibility of the products with hardware and software .

Below are the link to check the Interoperability of vmware products

http://www.vmware.com/resources/compatibility/sim/interop_matrix.php

 

Posted in VMware | Tagged | Leave a comment

Cisco UCS Networking fundamental

Cisco UCS Networking fundamental

Below are the videos on Cisco UCS Networking fundamental.

Cisco UCS Networking, Physical network architecture  Click here
Cisco UCS Networking, Infrasctructure Virtualization Click here 
Cisco UCS Networking, Switching modes of the Fabric Interconnect Click here
Cisco UCS Networking, Upstream connectivity for SAN Click here
Cisco UCS Networking, Appliance Ports and NAS direct attach Click here
Cisco UCS Networking, Fabric Failover with Hyper-V and bare metal OS Click here
Cisco UCS Networking, Fabric Failover with VMware Click here
Cisco UCS Networking, End Host mode pinning Click here
Cisco UCS Networking, Upstream LAN Connectiviry Click here
Cisco UCS Networking, Inter-Fabric Traffic and Recommemded LAN Topologies Click here
Cisco UCS Networking, Disjointed L2 Domains Click here
Cisco UCS Networking, Gen2 Adapters Click here
Cisco UCS Networking, Cisco VIC (Palo) QoS Click here
Cisco UCS Networking, SPAN, IPv6 Click here

Cisco UCS Switching modes Click here

Posted in Uncategorized | Tagged , | Leave a comment