public marks

PUBLIC MARKS with tags server & network

2011

2010

How can I check the password of the IUSR and IWAM local accounts on a machine?

by brianwaustin (via)
Windows IT Pro For Admins SuperSite For Tech Enthusiasts SQL Server Mag For DBAs DevProConnections For Developers SharePointPro Connections For IT & Dev Windows IT Pro, we're in IT with you About Advertise Subscribe Follow Us RSS Why Join My Account Register Sign In Search InstantDoc ID GO Browse By: Author | Issue * Home * news o Paul Thurrott's WinInfo News * blogs o Active Directory GPO and Identity o Active Directory Troubleshooting Tips and Tricks o Business Technology Perspectives o exchange and outlook o fearless security o hyperbole embellishment sys admin o IT Research Perspectives o Michael Otey o networking and hardware o Office and SharePoint o PowerShell with a Purpose o scripting o security o security matters o virtualization o Virtualization Pro Tips o Windows Automation o Windows OS and Deployment * FAQs o Exchange and Outlook Tips &Techniques o John Savill's FAQs o PowerShell FAQs o Virtualization FAQs o Windows Gatekeeper FAQs o FAQ Submittal Form * products & reviews o awards central o buyers guides o reviews * newsletters * Events o Conferences & Workshops o eLearning Seminars o Virtual Events o web seminars * community o Follow Us o Forums o User Group Central * resources o ebooks o essential guides o podcasts o tip guides o trials & downloads o videos & more o web seminars o white papers * international o europe * more o network monitoring management o hp virtualization o google apps cloud based infrastructure o MVP-system o Windows 7 o HP Intel Microsoft Unified Communications o VMware Desktop Virtualization with VMware View o Business services made simple + IT as a service made simple + IT as a Service Blog o doing windows 7 right o VMware Virtualizing Business-Critical Applications o VMware Virtualizing Exchange Polland Article o VMware Virtualizing Oracle Polland Article o VMware Virtualizing SAP Polland Article o Cloud Twitterview Paul Thurrott Sean Deuby Nov19 o Essentials Series Downloads * Subscribe Home » Passwords » How can I check the password of the IUSR and IWAM local accounts on a machine?

Robocopy - Wikipedia, the free encyclopedia

by brianwaustin (via)
Robocopy, or "Robust File Copy", is a command-line directory replication command. It was available as part of the Windows Resource Kit, and introduced as a standard feature of Windows Vista, Windows 7 and Windows Server 2008. Robocopy is designed for reliable mirroring of directories or directory trees. It has features to ensure all NTFS attributes and properties are copied, and includes additional restart code for network connections subject to disruption.

2009

Shindig - Welcome To Shindig!

by holyver & 4 others (via)
What is Shindig? Shindig is a container for hosting social application consisting of four parts: * Gadget Container JavaScript: core JavaScript foundation for general gadget functionality (read more about gadget functionality). This JavaScript manages security, communication, UI layout, and feature extensions, such as the OpenSocial API. * Gadget Rendering Server: used to render the gadget XML into JavaScript and HTML for the container to expose via the container JavaScript. * OpenSocial Container JavaScript: JavaScript environment that sits on top of the Gadget Container JavaScript and provides OpenSocial specific functionality (profiles, friends, activities, datastore). * OpenSocial Data Server: an implementation of the server interface to container-specific information, including the OpenSocial REST APIs, with clear extension points so others can connect it to their own backends. Shindig is the reference implementation of OpenSocial API specifications, a standard set of Social Network APIs which includes: * Profiles * Relationships * Activities * Shared applications * Authentication * Authorization

Dare Obasanjo aka Carnage4Life - ASP.NET Caching vs. memcached: Seeking Efficient Data Partitioning, Lookup, and Retrieval

by brianwaustin (via)
I recently discovered memcached which is a distributed, object caching system originally developed by Brad Fitzpatrick of LiveJournal fame. You can think of memcached as a giant hash table that can run on multiple servers which automatically handles maintaining the balance of objects hashed to each server and transparently fetches/removes objects from over the network if they aren't on the same machine that is accessing an object in the hash table. Although this sounds fairly simple, there is a lot of grunt work in building a distributed object cache which handles data partitioning across multiple servers and hides the distributed nature of the application from the developer. memcached is a well integrated into the typical LAMP stack and is used by a surprising number of high traffic websites including Slashdot, Facebook, Digg, Flickr and Wikipedia. Below is what C# code that utilizes memcached would look like sans exception handling code

Configuring the Windows Time Service

by brianwaustin (via)
This article walks you through the process of setting up an authoritative time server for a Windows Server 2003-based network running Active Directory. The article outlines procedures for syncing to both an internal and external time source, and also lists additional resources for configuring the Windows Time service and troubleshooting time synchronization problems.

2008

Install and Configure Cacti Monitoring tool in Ubuntu 8.10 (Intrepid Ibex) Server -- Ubuntu Geek

by camel (via)
Cacti is a complete network graphing solution designed to harness the power of RRDTool’s data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use interface that makes sense for LAN-sized installations up to complex networks with hundreds of devices.

Box Backup - Trac

by camel
Box Backup is an open source, completely automatic, on-line backup system. It has the following key features: * All backed up data is stored on the server in files on a filesystem - no tape, archive or other special devices are required. * The server is trusted only to make files available when they are required - all data is encrypted and can be decoded only by the original client. This makes it ideal for backing up over an untrusted network (such as the Internet), or where the server is in an uncontrolled environment. * A backup daemon runs on systems to be backed up, and copies encrypted data to the server when it notices changes - so backups are continuous and up-to-date (although traditional snapshot backups are possible too). * Only changes within files are sent to the server, just like rsync, minimising the bandwidth used between clients and server. This makes it particularly suitable for backing up between distant locations, or over the Internet. * It behaves like tape - old file versions and deleted files are available. * Old versions of files on the server are stored as changes from the current version, minimising the storage space required on the server. Files are the server are also compressed to minimise their size. * Choice of backup behaviour - it can be optimised for document or server backup. * It is designed to be easy and cheap to run a server. It has a portable implementation, and optional RAID implemented in userland for reliability without complex server setup or expensive hardware.

Mail Avenger

by camel
Mail Avenger is a highly-configurable, MTA-independent SMTP server daemon. It lets users run messages through filters like ClamAV and SpamAssassin during SMTP transactions, so the server can reject mail before assuming responsibility for its delivery. Other unique features include TCP SYN fingerprint and network route recording, verification of sender addresses through SMTP callbacks, SPF (sender policy framework) as a general policy language, qmail-style control over both SMTP-level behavior and local delivery of extension addresses, mail-bomb protection, integration with kernel firewalls, and more.

9 Tips to diagnose remote GNU/Linux server network connectivity issues

by brianwaustin (via)
Many new admin or Linux users get frustrated when their remote Linux box is not accessible dues to network connectivity. In this article I will try to provide tools and information about how to diagnose network configurations. You can try these tips/tools to diagnose an issue of Linux network connectivity to remote or local servers.

Logmonster FAQ - The Network People, Inc.

by camel
Typical Scenario: You have a web server that serves your domain. You write a simple script to restart apache each night and pipe the logs off to your analyzer. It works. ISP/Hosting Scenario: Each server hosts many domains. You may also have load balanced servers (multiple machines) serving each domain. A tool like this is necessary to: 1. collect all the log files from each server 2. split the logs based on the virtual host(s) 3. discard invalid entries (phishing, referrer spam, etc) 4. sort them into chronological order 5. feed logs into analyzer 6. do something with the raw logs (compress, save to vhost dir, etc) [edit]

Openfiler — Openfiler Community

by camel
Openfiler is a powerful, intuitive browser-based network storage software distribution. Openfiler ScreenshotsOpenfiler delivers file-based Network Attached Storage and block-based Storage Area Networking in a single framework. Openfiler is built on the rPath Linux metadistribution and is distributed as a stand-alone Linux distribution. The entire software stack interfaces with third-party software that is all open source. File-based networking protocols supported by Openfiler include: NFS, SMB/CIFS, HTTP/WebDAV and FTP. Network directories supported by Openfiler include NIS, LDAP (with support for SMB/CIFS encrypted passwords), Active Directory (in native and mixed modes) and Hesiod. Authentication protocols include Kerberos 5. Openfiler includes support for volume-based partitioning, iSCSI (target and initiator), scheduled snapshots, resource quota, and a single unified interface for share management which makes allocating shares for various network file-system protocols a breeze.

GFI Network Server Monitor: The Right Tool for the Job? | The Right Tool for the Job? | TechRepublic.com

by brianwaustin
If you have ever been a system administrator or network manager, you can appreciate a tool that allows you to efficiently check the health of various components of your network. Receiving alerts to problems the moment they happen lets you solve them as quickly as possible and prioritize your time effectively.

Globule: the Open-Source Content Distribution Network

by camel & 1 other
Globule is a third-party module for the Apache Web server that allows a given server to replicate its documents to other Globule servers. It takes care of maintaining consistency between the replicas, of monitoring the servers, and of automatically redirecting clients to one of the available replicas. Globule also supports the replication of PHP documents. It runs on Unix and Windows systems.

Using multiple network cards in XEN 3.0

by camel
Xen is great. But installing more than one network card became a pain when I tried it the first time. There are some documents describing the principle but I was unable to find a real life example somewhere else. So this is a summary about how it works here now. Using a bridge for a Dom is generally a good idea but then all packets traversing the bridge can be intercepted by any Dom that is using the same bridge. Having a single network card in a Xen landscape also means that theoretically each Dom would be able to sniff all packets traversing this single network card including packets to and from other Doms. A solution is to have more than one network card attached to Xen using a single network card for a single dom. The scenario described here has a server with 3 network cards installed. The first card should be used to access Dom0 and some other DomNs while the second and third network card should be used to purely access Dom1 rsp. Dom2. The Dom configuration file just needs to select the appropriate bridge for each dom.

2007

eBox Platform » EBOX PLATFORM

by camel
The eBox platform will effectively and easily help you managing the advanced services for your corporate network. Designed with extensibility in mind it offers, among others, these modules: Firewall, Transparent proxy, Traffic shaping, VPN’s, Content filter, NTP Server, Users and groups, Mail server… more modules!

Network Performance Effects of HTTP/1.1, CSS1, and PNG

by benoit & 1 other

We describe our investigation of the effect of persistent connections, pipelining and link level document compression on our client and server HTTP implementations.

PUBLIC TAGS related to tag server

administration +   apache +   bastille +   business +   debian +   detection +   distro +   free +   howto +   htaccess +   http +   httpd.conf +   iis +   internet +   knockd +   linux +   log +   maintenance +   manual +   microsoft +   network +   networking +   opensource +   openssh +   ponsfrilus +   programming +   proxy +   reference +   rsa +   security +   service +   sftp +   software +   spam +   ssh +   storage +   sysadmin +   system +   tech +   technology +   tips +   tools +   toread +   tutorial +   ubuntu +   web +   webserver +   windows +   安全 +   管理 +  

Active users

marco
last mark : 21/05/2011 17:33

brianwaustin
last mark : 14/12/2010 17:32

kemar
last mark : 10/07/2009 08:27

holyver
last mark : 19/06/2009 20:41

piouPiouM
last mark : 07/02/2009 17:02

camel
last mark : 21/11/2008 13:16

gardenclogs
last mark : 14/11/2007 02:37

benoit
last mark : 30/05/2007 14:21