How to reset the Zeroshell password
The Zeroshell password is written in
/Database/var/register/system/ldap/rootpw
# mount /dev/sda1 /mnt
# cd /mnt/_DB.001/var/register/system/ldap
#cat rootpw
Zeroshell How to Download here
How to reset the Zeroshell password
The Zeroshell password is written in
/Database/var/register/system/ldap/rootpw
# mount /dev/sda1 /mnt
# cd /mnt/_DB.001/var/register/system/ldap
#cat rootpw
Zeroshell How to Download here
network connections window: from command prompt > ncpa.cpl
Netsh.exe is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh.exe also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer. Netsh.exe can also save a configuration script in a text file for archival purposes or to help you configure other servers.
Netsh.exe is available on Windows 2000, Windows XP and Windows Server 2003.
You can use the Netsh.exe tool to perform the following tasks:
With Netsh.exe you can easily view your TCP/IP settings. Type the following command in a Command Prompt window (CMD.EXE):
netsh interface ip show config
With Netsh.exe, you can easily configure your computer’s IP address and other TCP/IP related settings. For example:
The following command configures the interface named Local Area Connection with the static IP address 192.168.0.100, the subnet mask of 255.255.255.0, and a default gateway of 192.168.0.1:
netsh interface ip set address name="Local Area Connection" static 192.168.0.100 255.255.255.0 192.168.0.1 1
(The above line is one long line, copy paste it as one line)
Netsh.exe can be also useful in certain scenarios such as when you have a portable computer that needs to be relocated between 2 or more office locations, while still maintaining a specific and static IP address configuration. With Netsh.exe, you can easily save and restore the appropriate network configuration.
First, connect your portable computer to location #1, and then manually configure the required settings (such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses).
Now, you need to export your current IP settings to a text file. Use the following command:
netsh -c interface dump > c:\location1.txt
When you reach location #2, do the same thing, only keep the new settings to a different file:
netsh -c interface dump > c:\location2.txt
You can go on with any other location you may need, but we’ll keep it simple and only use 2 examples.
Now, whenever you need to quickly import your IP settings and change them between location #1 and location #2, just enter the following command in a Command Prompt window (CMD.EXE):
netsh -f c:\location1.txt
or
netsh -f c:\location2.txt
and so on.
You can also use the global EXEC switch instead of -F:
netsh exec c:\location2.txt
Netsh.exe can also be used to configure your NIC to automatically obtain an IP address from a DHCP server:
netsh interface ip set address "Local Area Connection" dhcp
Would you like to configure DNS and WINS addresses from the Command Prompt? You can. See this example for DNS:
netsh interface ip set dns "Local Area Connection" static 192.168.0.200
and this one for WINS:
netsh interface ip set wins "Local Area Connection" static 192.168.0.200
Or, if you want, you can configure your NIC to dynamically obtain it’s DNS settings:
netsh interface ip set dns "Local Area Connection" dhcp
BTW, if you want to set a primary and secondary DNS address, add index=1 and index=2 respectively to the lines of Netsh command.
As you now see, Netsh.exe has many features you might find useful, and that goes beyond saying even without looking into the other valuable options that exist in the command.
Source link
Checks the file system and file system metadata for errors and displays a status report of its findings. Used without parameters, chkdsk displays only the status of the disk in the current drive. It does not fix errors. To fix errors, you must include the /f parameter.
Important
While repairing volumes (or inspecting volumes on computers without Windows Server 2003 SP1), chkdsk locks the volume making any data stored on the volume unavailable until chkdsk is finished. As a rule, run chkdsk only on volumes that are known to be corrupt. On volumes marked as “dirty”, Windows automatically runs chkdsk when you restart the computer.
On servers that are infrequently restarted, use the chkntfs or the fsutil dirty query commands to determine whether the volume’s dirty bit is set before running chkdsk.
chkdsk [Volume:][[Path] FileName] [/f] [/v] [/r] [/x] [/i] [/c] [/l[:Size]]
Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the next time the system restarts? (Y/N)
If you choose to check the drive the next time you restart the computer, chkdsk checks the drive and corrects errors automatically when you restart the computer. If the drive partition is a boot partition, chkdsk automatically restarts the computer after it checks the drive.
You can also use the chkntfs /c command to schedule the volume to be checked the next time the computer is restarted. Use the fsutil dirty set command to set the volume’s dirty bit (indicating corruption), so that Windows runs chkdsk when the computer is restarted.
Because repairs on FAT file systems usually change a disk’s file allocation table and sometimes cause a loss of data, chkdsk might display a confirmation message similar to the following:
10 lost allocation units found in 3 chains.
Convert lost chains to files?
If you press Y, Windows saves each lost chain in the root directory as a file with a name in the format Filennnn.chk. When chkdsk finishes, you can check these files to see if they contain any data you need. If you press N, Windows fixes the disk, but it does not save the contents of the lost allocation units.
If you do not use the /f command-line option, chkdsk displays a message that the file needs to be fixed, but it does not fix any errors.
If you use chkdsk /f on a very large disk (for example, 70 gigabytes) or a disk with a very large number of files (for example, millions of files), chkdsk /fmight take a long time to complete. The computer is not available during this time because chkdsk /f retains control of the disk until it is finished making repairs.
Volume Serial Number is B1AF-AFBF
72214528 bytes total disk space
73728 bytes in 3 hidden files
30720 bytes in 12 directories
11493376 bytes in 386 user files
61440 bytes in bad sectors
60555264 bytes available on disk2048 bytes in each allocation unit
35261 total allocation units on disk
29568 available allocation units on disk
The type of the file system is NTFS.
CHKDSK is verifying files...File verification completed.CHKDSK is verifying indexes...
Index verification completed.
CHKDSK is verifying security descriptors...
Security descriptor verification completed.
12372 kilobytes total disk space.
3 kilobytes in 1 user files.
2 kilobytes in 1 indexes.
4217 kilobytes in use by the system.
8150 kilobytes available on disk.
512 bytes in each allocation unit.
24745 total allocation units on disk.
16301 allocation units available on disk.
| Exit code | Description |
|---|---|
| 0 | No errors were found. |
| 1 | Errors were found and fixed. |
| 2 | Disk cleanup, such as garbage collection, was performed, or cleanup was not performed because /f was not specified. |
| 3 | Could not check the disk, errors could not be fixed, or errors were not fixed because /f was not specified. |
If you want to check the disk in drive D and have Windows fix errors, type:
chkdsk d: /f
If it encounters errors, chkdsk pauses and displays messages. Chkdsk finishes by displaying a report that lists the status of the disk. You cannot open any files on the specified drive until chkdsk finishes.
To check all of files on a FAT disk in the current directory for noncontiguous blocks, type:
chkdsk *.*
Chkdsk displays a status report, and then lists the files matching the file specification that have noncontiguous blocks.
VMWare P2V migration
Setup for Failover Clustering and Microsoft Cluster Service describes the types of clusters you can implement using virtual machines with Microsoft Cluster Service for Windows Server 2003 and Failover Clustering for Windows Server 2008. You get step-by-step instructions for each type of cluster and a checklist of clustering requirements and recommendations
Setup for Failover Clustering and Microsoft Cluster Service
Microsoft Clustering on VMware vSphere: Guidelines for Supported Configurations
How to install product key after evaluation expired SCOM
How to add a product key to an eval version of System Center 2012 Operations Manager
To set the product key, use the Set-SCOMLicense cmdlet in PowerShell. To use the Set-SCOMLicense cmdlet you need to use elevated permissions. (Run as Administrator).
1. Open PowerShell as an Administrator
2. Load the OperationsManager Module
import-module operationsmanager
3. Connect to your ManagementGroup
SCOMManagementGroupConnection
4. Use Set-SCOMLicense -ProductId “yourlicensekey“
Set-SCOMLicense -ProductId ‘C97A1C5E-6429-4F71-8B2D-3525E237BF62’
5. To check if changes were executed run Get-SCOMManagementGroup | ft skuforlicense, version, timeofexpiration –a
Note: This may require a reboot after running in order to register correctly.
For more information on the Set-SCOMLicense cmdlet see http://technet.microsoft.com/en-us/library/hh920237.aspx
Source link :- http://support.microsoft.com/kb/2699998
windows xp auto logon
This article describes how to configure Windows XP to automate the logon process by storing your password and other pertinent information in the registry database. This feature allows other users to start your computer and to use the account that you establish to automatically log on.
Important If you turn on autologon, using Windows XP becomes more convenient. However, using this feature can pose a security risk.
Turn on automatic logon in Windows XP
Microsoft fix it for me click here download
Turn off automatic logon in Windows XP
Microsoft fix it for me click here download
Microsoft URL Link
Recover MySQL root Password
You can recover MySQL database server password with following five easy steps. Step # 1: Stop the MySQL server process.
Step # 2: Start the MySQL (mysqld) server/daemon process with the –skip-grant-tables option so that it will not prompt for password.
Step # 3: Connect to mysql server as the root user.
Step # 4: Setup new mysql root account password i.e. reset mysql password.
Step # 5: Exit and restart the MySQL server.
Here are commands you need to type for each step (login as the root user):
Step # 1 : Stop mysql service
# /etc/init.d/mysql stop
Output: Stopping MySQL database server: mysqld.
Step # 2: Start to MySQL server w/o password:
# mysqld_safe –skip-grant-tables &
Output:
[1] 5988 Starting mysqld daemon with databases from /var/lib/mysql mysqld_safe[6025]: started
Step # 3: Connect to mysql server using mysql client:
# mysql -u root
Output:
Welcome to the MySQL monitor. Commands end with ; or \g. Your MySQL connection id is 1 to server version: 4.1.15-Debian_1-log Type ‘help;’ or ‘\h’ for help. Type ‘\c’ to clear the buffer. mysql>
Step # 4: Setup new MySQL root user password
mysql> use mysql; mysql> update user set password=PASSWORD(“NEW-ROOT-PASSWORD”) where User=’root’; mysql> flush privileges; mysql> quit
Step # 5: Stop MySQL Server:
# /etc/init.d/mysql stop
Output:
Stopping MySQL database server: mysqld STOPPING server from pid file /var/run/mysqld/mysqld.pid mysqld_safe[6186]: ended [1]+ Done mysqld_safe –skip-grant-tables
Step # 6: Start MySQL server and test it
# /etc/init.d/mysql start # mysql -u root -p
Source link http://www.cyberciti.biz/tips/recover-mysql-root-password.html
vSphere 5 Documentation Center
Installation Guide click here
Systems Compatibility Guide click here
Storage/SAN Compatibility Guide click here
I/O Compatibility Guide click here
Guest/Host OS Compatibility Guide click here
VMware View Client Compatibility Guide click here
VMware knowledge base search Click here
VMware Product compatibility Interoperability Matrixes.
Before installation and migration or update the vmware infrastructure we have to check the compatibility of the products with hardware and software .
Below are the link to check the Interoperability of vmware products
http://www.vmware.com/resources/compatibility/sim/interop_matrix.php
Cisco UCS Networking fundamental
Below are the videos on Cisco UCS Networking fundamental.
Cisco UCS Networking, Physical network architecture Click here
Cisco UCS Networking, Infrasctructure Virtualization Click here
Cisco UCS Networking, Switching modes of the Fabric Interconnect Click here
Cisco UCS Networking, Upstream connectivity for SAN Click here
Cisco UCS Networking, Appliance Ports and NAS direct attach Click here
Cisco UCS Networking, Fabric Failover with Hyper-V and bare metal OS Click here
Cisco UCS Networking, Fabric Failover with VMware Click here
Cisco UCS Networking, End Host mode pinning Click here
Cisco UCS Networking, Upstream LAN Connectiviry Click here
Cisco UCS Networking, Inter-Fabric Traffic and Recommemded LAN Topologies Click here
Cisco UCS Networking, Disjointed L2 Domains Click here
Cisco UCS Networking, Gen2 Adapters Click here
Cisco UCS Networking, Cisco VIC (Palo) QoS Click here
Cisco UCS Networking, SPAN, IPv6 Click here
Cisco UCS Switching modes Click here