Category: How To

Virtualization Tutorials, Operating System Tutorials, Software Tutorials And Other IT Tutorials

NFS (Network File System)) 0

NFS Client Configuration For My Dummy Colleagues

NFS (Network File System) is the most popular file sharing for Linux systems to access files from remote client. NFS can be very troublesome because of misconfiguration. The most challenges with NFS is network interruption and connection problem between client and server.

VMware Horizon Connection (Session) Duration 2

VMware Horizon View Connection (Session) Duration Report

VMware Horizon View provides solutions for remote working and access to business from anywhere. Users be able to use virtual desktop or applications via secure and fast display protocols such as PCoIP or VMware Blast. VMware did support monitoring VMware Horizon View via vRealize Operations (vROps) for Horizon but recent versions are not supported. You have to use third-party software or services such as ControlUp or develop your solutions.

Linux Distribution 1

How To Disable HBA Port on Linux

Sometimes you need to do troubleshooting about storage connectivity but you don’t have access to datacenter or SAN switches and you need to shutdown one of HBA ports to check server side problem. If the port was a network adapter port, disabling was to easy but what about HBA port on operating system?

Linux Distribution 0

Create Your Own Time Zone in Linux

I don’t know why do you need to create your own time zone in Linux? But I had to customized TZ file and create my own time zone because of what does our application needs? . First lets see that what is TZ and TZ Database. Time Zone Database (TZ Database) The Time Zone Database (often called tz or zoneinfo) contains code and data that represent the history of local time for many representative locations around the globe. It is updated periodically to reflect changes made by political bodies to time zone boundaries, UTC offsets, and daylight-saving rules. Its management procedure is documented...

HPE 0

Change Administrator’s Password for All HPE C7000 Device Bays

HPE C7000 Blade System using Onboard Administrator (OA) KVM module to manage devices and interconnects in chassis. To manage devices directly, OA will redirect to iLO of each device. OA use single sign-on to logon to iLO administration web page. But each server has own administrator user and the user has default password, so if iLO addresses are reachable via network, it’s better to change default password. Think about two or more C7000 chassis with half high blade servers, changing password on 64 servers would be difficult! Onboard Administrator has builtin tool to configure device bays iLO. HPONCFG can change...

vCSA Network Configurations 3

Deploy vCenter Server Appliance without DNS Server

If you have plan to deploy vCenter Server Appliance (vCSA) without DNS server, installation will be failed, if you have add standard information for deploying virtual appliance. Because installer ask you to add FQDN of server before start to deploy. By adding FQDN, installer will be try to resolve it.

Linux Distribution 0

How to Secure SSH Connection on Linux

Why We Should Mitigate SSH Based Attack SSH (Secure Shell) is a most popular remote protocol. SSH allows remote login and execute commands. That providing secure way to login and run commands on remote systems in unsecured networks. Telnet replace with SSH cause of offering more security. But SSH has some weaknesses, in order to reducing SSH based attack, those weaknesses can be mitigated. There is some hardening tips, the tips turn your SSH server into a rock solid communication daemon. Best SSH Hardening Tips In the next minutes, we’ll review 15 solutions from best SSH hardening tips. Each hardening tip...