Posts

Showing posts from November, 2009

Ubuntu Komutları

Ubuntu Komutları Dosyaların yetkilerini öğrenmek için : Ls -al Dosyanın yetkisini değiştirmek için : sudo chmod 777 . Dosyanın ownershipliğini değiştirme : sudo chown -R tomcat6:root * Dökümantasyon için : man komutu : man ls Edit için sudo vim Log okuma tail -f localhost.2009-10-28.log /var/log/tomcat6/ Ethernet disable ve enable komutu : sudo ifdowneth0 / sudo ifup eth0 Memory Kullanımı : vmstat Free cat /proc/meminfo Çalışan Processleri listeler : Ps -aux Ownership değiştirme : sudo chown tomcat6:tomcat6 crowd.cfg.xml Task manager : sudo apt-get install htop

How to get your iPhone on WiFi when your proxy uses NTLM (thanks to NTLMAPS)

I have been struggling to get my iPhone working against my corporate ISA proxy server . Once I had connected to WiFi, Safari would continually prompt me for my domain user name and password, and none of the apps would work (maybe because they didn't know how to prompt me for credentials). After a bit of poking around with fiddler, telnet, and all sorts of settings, I was certain that the problem was our ISA Proxy server's NTLM authentication. NTLM is an authentication mechanism from Microsoft. Microsoft's ISA Proxy Server uses NTLM to be able to tell which active directory user is attempting to access the internet. If you're surfing with Internet Explorer, it picks up your username directly from your login, and you might not even realise that IE is authenticating you. If you're using firefox, you might get prompted the first time you go on the internet. As far as I can tell, Google Chrome prompts you each time you launch it. If you're trying to get online with

INSTALLING PERL

INSTALLING PERL Download the latest version of Perl from ActiveState to your desktop. After the download process has completed, double click on the program to begin the installation process. Choose Next to continue. Accept the End-User License Agreement and choose Next to continue. Change the installation path to match your computer. (This set up uses F:\Perl\ .) Choose Next to continue. Verify the following choices are selected and choose Next to continue. Choose Install to begin the installation process. The installation will take a few minutes. After a few minutes, choose Finish to complete the installation. To verify the Perl path is set correctly, Right Click on My Computer and select Properties . Select the Environment Variables from the Advanced tab. See the path listed under System Variables. Choose OK to close the current windows. You have successfully installed Perl. Now you can install MRTG . Pasted from < http://

INSTALLING MRTG

Before you can install MRTG, you need to download and install Perl first. Download MRTG to your desktop. You also need WinZip (or another unzip utility). Double Click the MRTG icon to unzip the file. Navigate to the location you extracted MRTG to and notice the odd name on the folder. Right Click on the folder and select Rename . Change the name to mrtg . Create a new folder called on the same drive called mrtghtml . You are now finished with the installation of MRTG. The next step is to create a config file for the MRTG data you will collect. You can create this file with CFGMAKER . Begin by opening a DOS Window by typing command in the Run box. Choose OK. Navigate to the mrtg\bin directory. This is the fun part! At this point, you must know the community string and IP address for the equipment you want to monitor. If you don't know, you most likely don't have any business monitoring it! In this document, I will use a Windows NT Server. I

How to Record URL and User Information in ISA 2004 Firewall Logs and Reports

One of the most common questions I see on the ISAServer.org Web boards and mailing list is how to get user and URL information in the ISA firewall's logs and reports. The ISA firewall creates reports using ISA log summaries. The log summaries are derived from the ISA firewall's Web Proxy filter and Firewall service logs. If you want to see user information and URLs (instead of IP addresses) in the reports, you've got to get that information into the logs first. You need to address the following issues to get the user information into the logs: Configure the Web Proxy log to record user and URL information Configure all machines on the internal network as Web Proxy and Firewall clients Remove anonymous access rules that would apply before authenticated access rules Install LogHostname to get URLs for SecureNAT clients NOTE : This article is not a comprehensive review of the ISA firewall's logging and reporting features. Check out the last chapter in our book Config

Understanding the ISA Server Reporting Feature

ISA Server includes a reporting feature that you can use for a number of purposes: Use reports to obtain and view information on usage statistics of the server for both computers and client users. Create your own reports. Each report here consists of a number of sub-reports, taking the form of charts and graphs. This concept is illustrated on the 2nd page of the Article: The predefined ISA Server reports are listed here: Summary reports : These reports combine data from the Firewall service log and Web proxy service log, to show network traffic usage. Summary reports are sorted by application and are especially useful when you need to manage Internet connectivity, or determine trends traffic patterns. Web Usage reports : These reports show information on how the Web is being used, and detail information on: Top Web users Common responses Browsers in use Web Usage reports use information in the Web Proxy service logs. Application usage reports : These reports show Internet a

Cloud Computing

Orhan Alkan / Sun Microsystems Türkiye Bilişim yeni bir şekil alıyor; birçok işlev veri merkezlerine kayarak daha merkezi hale geliyor ve "Cloud" dediğimiz yapılar oluşuyor. Bilgiişlem kapasitesinin ağ (network) üzerine kayması, her zaman ve her heryerden erişilebilmesine olanak sağlıyor. "Cloud Computing" (CC), teknik kişileri heyecanlandıran bir başka platform değişikliğinin çok ötesine geçmektedir. O yalnızca tüm bilişim teknolojileri (BT) endüstrisini dönüştürmekle kalmayıp aynı zamanda insaların çalışma, firmaların operasyon yapış tarzlarınida ciddi değişik yapacaktır. Birçok kişinin düşündüğünün aksine "Cloud Computing" gerçektir, dönüşüm başlamıştır, hızlanarak devam edecektir. Bu nedenle yalnızca sıcak bir konu olmanın ötesinde, özel bir ilgi ve çalışmayı hak etmektedir. Bu makale ve devamında amacım "Cloud Computing" hareketinin durumunu, nereye gittiğini, yapısını, sunduğu fırsatları ve yarattığı sorunları incelemektir. Bu ilk bölüm

DOS / Windows IP Commands

Display Connection Configuration: ipconfig /all Display DNS Cache Info: ipconfig /displaydns Clear DNS Cache: ipconfig /flushdns Release All IP Address Connections: ipconfig /release Renew All IP Address Connections: ipconfig /renew Re-Register the DNS connections: ipconfig /registerdns Change/Modify DHCP Class ID: ipconfig /setclassid Network Connections: control netconnections Network Setup Wizard: netsetup.cpl Test Connectivity: ping www.whatismyip.com Trace IP address Route: tracert Displays the TCP/IP protocol sessions: netstat Display Local Route: route Display Resolved MAC Addresses: arp Display Name of Computer Currently on: hostname Display DHCP Class Information: ipconfig /showclassid Pasted from < http://www.whatismyip.com/faq/dos-windows-ip-commands.asp >

Linux IP Commands

Display Current Config for all NIC's: ifconfig Display Current Config for eth0: ifconfig eth0 Assign IP: ifconfig eth0 192.168.1.2 Ping: ping -c 3 192.168.1.1 Assign multiple IP's: ifconfig eth0:0 192.168.1.2 Assign second IP: ifconfig eth0:1 192.168.1.3 Disable network card: ifconfig eth0 down Enable network card: ifconfig eth0 up View current routing table: route "or" route -n View arp cache: arp "or" arp -n Assign IP/Subnet: ifconfig eth0 192.168.1.2 netmask 255.255.255.0 Assign Default Gateway: route add default gw 192.168.1.1 Trace Route: traceroute www.whatismyip.com Trace Path: tracepath www.whatismyip.com DNS Test: host www.whatismyip.com Advanced DNS Test: dig www.whatismyip.com Reverse Lookup: host 66.11.119.69 Advanced Reverse Lookup: dig -x 66.11.119.69