Thursday, March 29, 2012

Disable Ping on Linux Server

How do you disable ping to Linux server? Here is the quick steps:

 To disable ping:

echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all
To enable ping:
echo 0 > /proc/sys/net/ipv4/icmp_echo_ignore_all
That's all..!

Wednesday, March 14, 2012

brocade zoning

hi ,
 Now i am going to  show you zoning in brocade fabric switches.

Access logix 
          access logix provides LUN masking that allows sharing of storage system.
any host that connects to the storage system will then have access to all of the
 LUNs on that storage system.in environment when multiple hosts are connected
 will cause problems.any one can access any Lun so the access logix solves the
 problems by LUN masking  - it masks certain LUNS from hosts that are not 
authorized to see them.

sample brocade zoning
 
Step by Step Procedure of Zoning via Cli.
1.Create a Zone Alias using "AliCreate"
SW0:admin> alicreate "SUNX4_HBA0"
2.Add member to Alias using "Aliadd"
SW0:admin> aliadd "SUNX4_HBA0","21:00:00:1b:32:13:a8:9f"
3.Create a Zone using "ZoneCreate"
SW0:admin> zonecreate "CX_4_SPB4_SUNX4_HBA0"
4. Add membet to Zone using "ZoneAdd"
SW0:admin> zoneadd "CX_4_SPB4_SUNX4_HBA0","CX_4_SPB4"
5.Add a Zone to Zone configuration "CfgAdd".
SW0:admin> cfgadd "SAN_U2_SW0_Config","CX_4_SPB4_SUNX4_HBA0"
6.Save the Configuration using "CfgSave".
SW0:admin> cfgsave
7.Enable the Configuration using "CfgEnable".
SW0:admin> cfgenable "SAN_U2_SW0_Config"
Note : Always use single initiator Zone which typically include one storage
 and one host wwpn.

implementing zoning  via scripting

!!NOTE: This is fabric A
!! Make all the aliases for systems
alicreate "Storage_HBA1_A", "50:01:43:81:02:45:DE:45"
alicreate "Storgae_HBA2_A", "50:01:43:81:02:45:DE:47"
alicreate "Server_HBA1_A", "50:01:23:45:FE:34:52:12"
alicreate "Server2_HBA1_A", "50:01:23:45:FE:35:52:15"
alicreate "Server2_HBA1_A", "50:01:23:45:FE:35:52:17"

!! Make the zones

zonecreate "Z_server_to_Storage_HBA1_A", "Server_HBA1_A;
 Storage_HBA1_A"

zonecreate "Z_server_to_Storage_HBA2_A", "Server_HBA1_A;
 Storage_HBA2_A"

zonecreate "Z_server2_to_Storage_HBA1_A", "Server2_HBA1_A;
 Storage_HBA1_A"

zonecreate "Z_server2_to_Storage_HBA2_A", "Server2_HBA1_A;
 Storage_HBA2_A"

!!NOTE: effective config and zone members on SWITCHA_config Fabric
cfgcreate "SWITCHA_config", "Z_server_to_Storage_HBA1_A;
 Z_server_to_Storage_HBA2_A;
 Z_server2_to_Storage_HBA1_A; Z_server2_to_Storage_HBA2_A"

cfgsave
cfgenable "SWIT
 
NOTE:
 All Brocade switches have a telnet and ssh access.These commands
can just be cut and pasted into the session to execute them. 



Saturday, March 10, 2012

unbreakable quantum encryption

Perfect secrecy has come a step closer with the launch of the world’s first computer network protected by unbreakable quantum encryption at a scientific conference in Vienna.
The network connects six locations across Vienna and in the nearby town of St Poelten, using 200 km of standard commercial fibre optic cables.
Quantum Cryptography is inherently unbreakable !
Quantum cryptography is completely different from the kinds of security schemes used on computer networks today.
These are typically based on complex mathematical procedures which are extremely hard for outsiders to crack but not impossible given sufficient computing resources or time.
But quantum systems use the laws of quantum theory, which have been shown to be inherently unbreakable.
“All quantum security schemes are based on the Heisenberg Uncertainty Principle, on the fact that you cannot measure quantum information without disturbing it,” he explained.
Real breakthroughs are not found because you want to develop some new technology, but because you are curious and want to find out how the world is
- Anton Zeilinger, Vienna University
“Because of that, one can have a communications channel between two users on which it’s impossible to eavesdrop without creating a disturbance. An eavesdropper would create a mark on it. That was the key idea.”
In practice this means using the ultimate quantum objects: photons, the “atoms of light”. Incredibly faint beams of light equating to single photons fired a million times a second raced between the nodes in the Vienna network.
Each node, housed in a different Siemens office (Siemens has provided the fibre links), contains a small rack of electronics – boxes about the size of a PC – and a handful of sensitive light detectors.
Numerical key
From the detected photons, a totally secret numerical key can be distilled, which encodes the users’ data much like the keys used in normal computer networks do.
The advantage is that no-one else can know the key without revealing themselves.
As we saw in the demonstration, when an intruder did try to listen in on the quantum exchange, photons became scrambled, and a rise in the error rate at the node detectors signalled the attack. The system automatically shut down without being compromised.
More importantly, the demonstration also showed that the network is robust.
If one quantum link breaks down, the connections can be re-routed via other nodes, much as phone calls get re-routed automatically through a telecoms network, so that any two users on the network can remain in continuous secure contact.
Dr Hannes Huebel of Vienna University, operating one of the nodes, explained how robustness was now as important as security in the development of quantum encryption systems.
“We are constantly in touch with insurance companies and banks, and they say it’s nearly better that they lose 10m euros than if the system is down for two hours, because that might be more damaging for the bank,” said Dr Huebel.
“So that’s what we have to prove, that we have a reliable system that delivers quantum keys for several weeks without interruption, and then they might be more interested.”
Polarised light
The final element of the EU-sponsored project (called SECO-QC) was the interconnection of different realisations of quantum cryptography.
There are many ways photons of light can encode a numerical key: through the direction they’re polarised (like Polaroid glasses) for example, or the precise timing of their arrival.
Different schemes have different strengths and weaknesses, and a viable network would have to handle whatever individual users choose to use, explained the project’s director, Christian Monyk – just as a mobile phone network has to handle handsets from many manufacturers.
Quantum cryptography is a surprising outgrowth of recondite arguments that bounced around for decades about the meaning of quantum mechanics.
Albert Einstein, who discovered the quantum properties of photons of light – indeed, discovered the very concept of the photon – always resisted quantum theory’s spooky behaviour, “God does not play dice”, being among his oft-quoted objections.
But experiments eventually proved that he apparently does, and also laid the technical foundations for today’s quantum information revolution – cryptography, teleportation, and computation.
One of the grandees of quantum science, Vienna University’s Anton Zeilinger, used the occasion to argue for continued funding of fundamental science in these increasingly application-focused days.
“Real breakthroughs are not found because you want to develop some new technology, but because you are curious and want to find out how the world is,” Dr Zeilinger said.
“It may not have surprised the founding fathers of quantum science that technology has advanced so that you can play with individual quantum systems, in great detail.
“Maybe this would not surprise, but what could surprise them is that people are thinking and doing practical applications.”
source : google.

Friday, March 9, 2012

how to hide hard disk partition in windows

Hi,
Want to hide your hard disk partition fully in windows operating system ? There is a command available to do this task. It is “diskpart” command which needs to be used in command prompt to get the job done. This technique works only in windows operating systems.
Using this command you can hide the hard disk volumes such as C:\ ,D:\, E:\. Here is the step by step method to carry over it.
1.Type “diskpart” in run command box without quotes. (A command window will get opened)
2.Then type “list volume“. (Your hard disk partitioned volumes will be listed)
3.Now type “select volume <volume number>” – (Volume number is the numeric variable which is shown in the volume listing)
4.Type “remove letter <volume letter> – (Volume letter is the alphabetic character of the drive such as C,D,E,F…)
Thus your hard disk partition is hidden. If you need to resume it then follow the first three steps as usual and
in the fourth step replace “remove” with “assign“. I hope this technique helps.

Wednesday, March 7, 2012

FBI’s Action on March 8 May Block Millions off the Internet

According to 'RT,' innumerable people globally may get impacted starting March 8, 2012, incase the U.S. FBI proceeds to execute its plans towards taking PC-servers offline which were deployed for countering malware. Deccan Chronicle published this on February 15, 2012. It's asserted that the FBI substituted PC-servers, which had been infected with DNSChanger a malicious Trojan virus, with fresh ones of its own, as also is presently considering taking those substituted servers, offline.
Last year (2011), officials in Estonia feared that 6 men understandably created one malevolent PC-script known as the DNSChanger. After allowed to permeate the Web, the Trojan infected PCs in over 100 countries, with a total of 500,000 computers in USA alone. The FBI after sometime entered the scene as it substituted the corrupted PCs with its own computer-servers while attempting at rectifying the destruction; however, it was only briefly that the solution lasted. Now FBI may terminate its substitute servers in early March 2012 when Internet for innumerable users might actually snap.
Reportedly, the DNSChanger struck PCs, diverting end-users from some specific websites onto certain malevolent ones. If contaminated with the Trojan, websites visited inside online browsers were compromised and linked up with malevolent servers that then diverted the Web-surfers onto a different, fake site.
Moreover 'RT' further asserts that FBI took 6 persons in custody over their alleged making of the Trojan. Quoting Internet Identity (IID), a security firm, RT stated that the tentative closure, when substitute servers would get ushered in, was well prepared towards impacting 50% of the entire Fortune 500 enterprises along with over 24 prominent government organizations within USA.
At this pace, according to President and CTO (chief technology officer) Rod Rasmussen at IID, many people, on 8th March 2012, will witness their Internet crash indefinitely. RT reported this on February 15, 2012.
Rasmussen continues that he can imagine far many people at that juncture becoming careful. As contaminated end-users are being alerted towards rectifying the problem right away, uncountable people globally are actually infected. Rasmussen adds that it surely will work as one intriguing social experiment incase the said servers simply got disconnected.
source » SPAMfighter News

Tuesday, March 6, 2012

User Creation and Remove commands in solaris 10

Hi,
Creating User Accounts

To create a user account:

# useradd -u 100 -g other -d /export/home/newuser1 -m -s /bin/ksh -c
"Regular User Account" newuser1

# passwd newuser1


# /usr/sadm/bin/smuser add -- -n newuser2 -u 500 -g other -d

/export/home/newuser2 -c "Regular User Account 2" -s /bin/ksh -x
autohome=N

# passwd newuser2


Modifying User Accounts


To change the login name and home directory for newuser1 to usera.


# usermod -m -d /export/home/usera -l usera newuser1


To change the login name and home directory for newuser2 to userb.


# /usr/sadm/bin/smuser modify -- -n newuser2 -N userb -d /export/home/userb


Deleting User Accounts

# userdel usera        ==> to remove the user account

# userdel -r usera    ==> to remove both the users account & home directory



# /usr/sadm/bin/smuser delete -- -n userb    ==> the users home directory                             should be deleted manually


Creating a Group Entry

# groupadd -g 301 class1

# /usr/sadm/bin/smgroup add -- -n workgroup -g 123 -m usera



Modifying a Group Entry

# groupmod -g 400 class1    ==> to change group ID

To change group name

# /usr/sadm/bin/smgroup modify -- -n workgroup -N schoolgroup


Deleting a Group Entry

# groupdel class1

# /usr/sadm/bin/smgroup delete -- -n schoolgroup



# vi /etc/default/passwd    ==> to control the properties for all users’

                    passwords on the system:


# ls -l /usr/sadm/defadduser    ==> to display default values for useradd

                    command

# useradd -D


# cat /usr/sadm/defadduser 

                                        Thanks for Reading. 

Sunday, March 4, 2012

CABLEING

Hi ,
 first we are going to know basics of networking concepts .

what is network ?
a network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks and contain subnetworks.
The most common topology or general configurations of networks include the bus, star, token ring, and mesh topologies. Networks can also be characterized in terms of spatial distance as local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).

topologies : 
mesh 
token ring
bus

star









what is networking ?
 communication between the devices or nodes using protocols is called as networking simply by using protocols send/receive data from one node to another node is calles as networking.

Networks may be classified according to a wide variety of characteristics such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope.
Communications protocols define the rules and data formats for exchanging information in a computer network, and provide the basis for network programming. Well-known communications protocols are Ethernet, a hardware and Link Layer standard that is ubiquitous in local area networks, and the Internet Protocol Suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-to-host data transfer, and application-specific data transmission formats.

present we are using 2 types of cables as a media
1.twisted pair cables.
2.unshieled twisted pair.UTP

cross over cable:
for similar devices we are using cross over cable.for example pc-pc,switch-switch etc.
A cross-over cable is a segment of cable that crosses over pins 1&2 and 3&6. This cable is normally used to connect two PCs without the use of a hub, or can be used to cascade two hubs without using an uplink port. Some DSL modems require a crossover calbe to the PC or hub they are connected to. 
 straight through cable :
 For dissimilar  devices straight over cable are using . pc-switch etc

The above tool is called as crimping tool.

UTP :

Cat 5: Out of the three types of cable we’ll be discussing, Category 5 is the most basic. Cat 5 cable is available in two varieties: Unshielded Twisted Pair (UTP), the type widely used in the United States, and Screened Twisted Pair (SCTP), which has shielding to provide a measure of extra protection against interference, but is rarely used outside of Europe. Cables belonging to Category 5 are either solid or stranded: Solid Cat 5 is more rigid, and the better choice if data needs to be transmitted over a long distance, while Stranded Cat 5 is very flexible and most likely to be used as patch cable. Cat 5 cable can support 10, 100, or 1000 Mbit/s Ethernet. The 1000BASE-T standard for Gigabit Ethernet over UTP was designed to work over up to 100 meters of plain old Cat 5.
Cat 5e: Cat 5e (which stands for Category 5, enhanced) cable goes along the same lines as basic Cat 5, except that it fulfills higher standards of data transmission. While Cat 5 is common in existing cabling systems, Category 5e has almost entirely replaced it in new installations. Just like Cat 5, Cat 5e can handle data transfer at 1000 Mbit/s, and is suitable for Gigabit Ethernet. Cat 5e experiences much lower levels of near-end crosstalk (NEXT) than Cat 5.
Cat 6: Of the three cable categories we’re discussing, Category 6 is the most advanced and provides the best performance. Just like Cat 5 and Cat 5e, Category 6 cable is typically made up of four twisted pairs of copper wire, but its capabilities far exceed those of other cable types because of one particular structural difference: a longitudinal separator. This separator isolates each of the four pairs of twisted wire from the others, which reduces crosstalk, allows for faster data transfer, and gives Category 6 cable twice the bandwidth of Cat 5! Cat 6 cable is ideal for supporting 10 Gigabit Ethernet. Since technology and standards are constantly evolving, Cat 6 is the wisest choice of cable when taking any possible future updates to your network into consideration. Not only is Category 6 cable future-safe, it is also backward-compatible with any previously-existing Cat 5 and Cat 5e cabling found in older installations.

What are the maximum lengths for cables?
For Solid UTP:
Fast Ethernet 100baseT 100 Meters (328 feet)
Twisted Pair Ethernet 10baseT 100 Meters (328 feet)
Recommended maximum lengths for Patch Cables made from stranded cable:
Fast Ethernet 100baseT 10 Meters (33 feet)
Twisted Pair Ethernet 10baseT 10 Meters (33 feet)

                                                     Thanks for reading


Popular Posts

Followers

Disclaimer

All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.