8/02/2018

How to take backup/convert production Linux system without downtime P2V, Image to VHD,VMDK & VDI


How to take backup/convert production Linux system P2V
without downtime




    Today, we are going to learn How to take backup/convert production Linux system without downtime. Most of all thinking that some tools are requires to converting physical system to any Virtual system.
Actually the requirement is same disk size of source disk (Production system). Either same size of hard disk or higher/external disk is better to copy any ware



Then check hard disk



# fdisk –l



Here I am using external hard disk for conversion


# dd if=/dev/sda of=/mnt/run/media/filename.img bs=4M

If wont to zip the file

# dd if=/dev/sda |gzip > /mnt/run/media/filename.img bs=4M






This procedure will take several time to complete.

Oracle Virtual box should be installed for this activity to convert DD image to any Virtual system




For Virtual Box, Do this command

I:\>VBoxManage convertfromraw --format VDI sourcefile.dd    filename.VDI

For Vmware EXi , Do this command

I:\>VBoxManage convertfromraw --format VMDK sourcefile.dd     filename.VMDK

For Hyper-V, Do this command


I:\>VBoxManage convertfromraw --format VHD sourcefile.dd       filename.VHD




Press Enter to start the conversion. Wait about serveral minute or so while the conversion takes place, and then create the new virtual machine with the VDI file.

Then Open VirtualBox.

New->Create New Virtual Machine


Change require configuration for the virtual machine as per your image backup,then choose the converted VDI file



Select VID file

Here you can see the screen of converted production system booting..










8/01/2018

How to convert Linux dd .img to .VDI,VMDK,VHD, with VIrtualBox Command

How to convert Linux dd .img to .VDI,VMDK,VHD


       We will Learn useful one, about how to convert IMG Files to VDI,VMDK,VHD format for Oracle VirtualBox,Vmware and XenCenter


First We have to take Image from Linux System and It will take several time.




Step By Step procedure


Click Run -> cmd -> Enter

Notice that Windows open a DOS window. Then go to dd image drive








Oracle Virtual box should be installed for this activity




For Virtual Box, Do this command

I:\>VBoxManage convertfromraw --format VDI sourcefile.dd    filename.VDI

For Vmware EXi , Do this command


I:\>VBoxManage convertfromraw --format VMDK sourcefile.dd     filename.VMDK

For Hyper-V, Do this command


I:\>VBoxManage convertfromraw --format VHD sourcefile.dd       filename.VHD





Press Enter to start the conversion. Wait about serveral minute or so while the conversion takes place, and then create the new virtual machine with the VDI file.



7/31/2018

HOW TO USE GIT COMMANDS,learn basic git

We are going learn how to import a new project into Git, make changes to it, and share changes with other developers.

1. Need create git account from git hub



2. Login git hub and create one remote branch

3. Now create one project folder

4. first initialize git -with command
#git init  

Now its created empty local repository

5. # git status 

Then create program files in this directory.
6. assume that create any sample program to commit here

7. # git status to check recent created file -not added to local repo


8. # git add filename
Exm:- git add test.htm

9. # git commit -m "first commit"filename

changes to commit --- -m for message to commit


One file committed to local git repo

Then create one user and mail id

# git config --global user.name "Name Here"
# git config --global user.email domain.example.com

Then push the files to remote repository

# git push filename

It will appeared in remote repository





12/07/2009

Difference between UTP and STP Cables

Network Cable Types

Overview:

A network is defined as two or more computers linked together for the purpose of communicating and sharing information and other resources. Most networks are constructed around a cable connection that links the computers. This connection permits the computers to talk (and listen) through a wire.

Types of Networking Cables:

The three main types of networking cables are coaxial cable, twisted-pair cable and fiber optic cable.
Coaxial Cable:
Coaxial cable is made of two conductors that share the same axis; the center is a copper wire that is insulated by a plastic coating and then wrapped with an outer conductor (usually a wire braid). This outer conductor around the insulation serves as electrical shielding for the signal being carried by the inner conductor. A tough insulating plastic tube outside the outer conductor provides physical and electrical protection. At one time, coaxial cable was the most widely used network cabling. However, with improvements and the lower cost of twisted-pair cables, it has lost its popularity.
There are two types of coaxial cable.
  1. ThickNet
  2. ThinNet
ThickNet:
Thick Net is about .38 inches in diameter. This makes it a better conductor, and it can carry a signal about 1640 feet (500 meters) before signal strength begins to suffer. The disadvantage of ThickNet over ThinNet is that it is more difficult to work with. The ThickNet version is also known as standard Ethernet cable.
Thin Net:
Thin Net is the easiest to use. It is about .25 inches in diameter, making it flexible and easy to work with (it is similar to the material commonly used for cable TV). ThinNet can carry a signal about 605 feet (185 meters) before signal strength begins to suffer.
Name Description Type Segment Speed
10Base2 ThinNet Coaxial 185 meters 10 Mbps
10Base5 ThickNet Coaxial 500 meters 10 Mbps



Coaxial cable can only be used with a BNC (bayonet-Neill-Concelman) connector. The following image will show you a BNC connector.


Twisted-Pair Cable:

Twisted-pair cable consists of two insulated strands of copper wire twisted around each other to form a pair. One or more twisted pairs are used in a twisted-pair cable. The purpose of twisting the wires is to eliminate electrical interference from other wires and outside sources such as motors. Twisting the wires cancels any electrical noise from the adjacent pair. The more twists per linear foot, the greater the effect.
There are two types of twisted pair cable.
  1. Shielded Twisted Pair (STP)
  2. Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP):
The only difference between STP and UTP is that STP has a foil or wire braid wrapped around the individual wires of the pairs. The shielding is designed to minimize EMI radiation and susceptibility to crosstalk. The STP cable uses a woven-copper braided jacket, which is a higher-quality, more protective jacket than UTP.
Unshielded Twisted Pair (UTP):
As the name implies, "unshielded twisted pair" (UTP) cabling is twisted pair cabling that contains no shielding. UTP cables can be divided further into following categories:
Category1 Traditional telephone cable. Carries voice but not data
Category2 Certified UTP for data transmission of up to 4 megabits per second (Mbps). It has four twisted pairs
Category3 Certified UTP for data transmission of up to 10 Mbps. It has four twisted pairs
Category4 Certified UTP for data transmission of up to 16 Mbps. It has four twisted pairs
Category5 Certified for data transmission of up to 100 Mbps. It has four twisted pairs of copper wire
Category6 Offers transmission speeds up to 155 Mbps
Category7 Category 7 is a proposed standard that aims to support transmission at frequencies up to 600 MHz
Twisted-pair cable has several advantages over other types of cable (coaxial and fiberoptic): It is readily available, easy to install, and inexpensive. Among its disadvantages are its sensitivity to electromagnetic interference (EMI), its susceptibility to eavesdropping, its lack of support for communication at distances of greater than 100 feet, and its requirement of a hub (multiple network connection point) if it is to be used with more than two computers. Twisted pair cables use RJ45 connector.

NETWORK CABLE TYPES

Name Description Type Segment Speed
10BaseT Common; being phased out for 100BaseT UTP .5 to 100 meters 10 Mbps
100BaseT Common Twisted-pair .5 to 100 meters 100 Mbps

Fiberoptic Cable:

Fiberoptic cable is made of light-conducting glass or plastic fibers. It can carry data signals in the form of modulated pulses of light. The plastic-core cables are easier to install but do not carry signals as far as glass-core cables. Multiple fiber cores can be bundled in the center of the protective tubing.


When both material and installation costs are taken into account, fiberoptic cable can prove to be no more expensive than twisted-pair or coaxial cable. Fiber has some advantages over copper wire: It is immune to EMI and detection outside the cable and provides a reliable and secure transmission media. It also supports very high bandwidths (the amount of information the cable can carry), so it can handle thousands of times more data than twisted-pair or coaxial cable.Cable lengths can run from .25 to 2.0 kilometers depending on the fiberoptic cable and network. If you need to network multiple buildings, this should be the cable of choice. Fiberoptic cable systems require the use of fiber-compatible NICs.



Network Topologies BUS,STAR,RING,HYBRID & MESH


NETWORK TOPOLOGY


Topology : It is a physical arrangement of the computer systems in a network or physical establishment of networks.

TYPES OF TOPOLOGY

  1. BUS TOPOLOGY: Past.
  1. STAR TOPOLOGY: Presently.
  1. RING TOPOLOGY: Used For IBM.
  1. HYBRID TOPOLOGY: It Is The Combination Of Any Two Topologies.
  1. MESH TOPOLOGY: It Is The Combination Of All Types Of Topology.



BUS TOPOLOGY

1. BUS TOPOLOGY CABLES: -

      In this topology we are using co – axial cable.

Ex: - star television cable.

Co – axial cables are of 2 types : -

Thin co–axial cable: - 0.25 inches thin, data transfer rate is (10 MBPS / 200 MBPS ).
Thick co–axial cable: - 0.50 inches thick, data transfer rate is (10 MBPS / 500 MBPS ).

CONNECTION IN BUS TOPOLOGY : -

NIC connector with BNC NIC: Network Interface Card. BNC: British Navigator Connector.


 Architecture Of The Bus Topology : -

4 DIS – advantages of bus topology : -

  1. Too much collusion is available due to traffic jam.
  1. No security and permissions are available.
  1. If in the network one computer is not working all computers will be collapsed.

Star Topology

Now a days in so many places we are using star topology



1. Star topology connectors : -

  1. NIC card with rj-45 (removed jack) connector.
  1. Rj-45 clip.
  1. Central interface device: - ex: repeaters, hub and switches.
2. Star topology cables : -

  1. UTP cable: It is a un-shielded twisted pair cable , which have 8 – wire
(4-pairs) cable
  1. Data transfer speed is 100 mbps / 256 mbps.
  1. The cable is twisted, to stop the cross linking and to flow the data in a straight line.

Twisted pair cables have some category:



Cat 1
cat 2
These are Tele-Phone wires, having two wires.
Cat 3
( 4 mbps)
cat 4
( 16 Mbps)
These are used in ring topology, these are called as S.T.P wires having 4 wires
Cat 5
( 100 Mbps )
cat 6
( 256 Mbps )
These are used in star topology, these are called as U.T.P wires having 8 wires.



RING TOPOLOGY



  1. Used in IBM computers.
  2. Uses S.T.P cables.
  3. S.T.P cables have 4 wires {2 pairs}.
  4. It is multi station access unit.
  5. Based on token policy, token – 6 bit data address.
  6. Data transmission speed is 4 mbps/16 mbps.

Hybrid topology

A network topology that uses two or more network Topolgy
The Physical Hybrid Topology


With the hybrid Topology, two or more topologies are combined to form a complete network. For example, a hybrid Topology could be the combination of a star and bus topology. These are also the most common in use.
Star-Bus

In a star-bus topology, several star topology networks are linked to a bus connection. In this topology, if a computer fails, it will not affect the rest of the network. However, if the central component, or hub, that attaches all computers in a star, fails, then you have big problems since no computer will be able to communicate.
Start-Ring

In the Star-Ring topology, the computers are connected to a central component as in a star network. These components, however, are wired to form a ring network.
Like the star-bus topology, if a single computer fails, it will not affect the rest of the network. By using token passing, each computer in a star-ring topology has an equal chance of communicating. This allows for greater network traffic between segments than in a star-bus topology.

The Physical Mesh Topology



In a Mesh Topology each computer is connected to every other computer by a separate cable. This configuration provides redundant paths through the new work, so if one computer blows up, you don't lose the network :) On a large scale, you can connect multiple LANs using mesh topology with leased telephone lines, Thicknet coaxial cable or fiber optic cable.
Again, the big advantage of this topology is its backup capabilities by providing multiple paths through the network.

12/06/2009

Windows run commands ,Run shortcuts 200

Windows Run Command List
  1. Accessibility Controls – access.cpl
  2. Accessibility Wizard – accwiz
  3. Add Hardware – Wizardhdwwiz.cpl
  4. Add/Remove Programs – appwiz.cpl
  5. Administrative Tools control – admintools
  6. Adobe Acrobat (if installed) – acrobat
  7. Adobe Designer (if installed)- acrodist
  8. Adobe Distiller (if installed)- acrodist
  9. Adobe ImageReady (if installed)- imageready
  10. Adobe Photoshop (if installed)- photoshop
  11. Automatic Updates – wuaucpl.cpl
  12. Bluetooth Transfer Wizard -fsquirt
  13. Calculator – calc
  14. Certificate Manager –certmgr.msc
  15. Character Map – charmap
  16. Check Disk Utility – chkdsk
  17. Clipboard Viewer – clipbrd
  18. Command Prompt – cmd
  19. Component Services – dcomcnfg
  20. Computer Management – compmgmt.msc
  21. Control Panel – control
  22. Date and Time Properties – timedate.cpl
  23. DDE Shares – ddeshare
  24. Device Manager – devmgmt.msc
  25. Direct X Control Panel (If Installed)- directx.cpl
  26. Direct X Troubleshooter- dxdiag
  27. Disk Cleanup Utility- cleanmgr
  28. Disk Defragment- dfrg.msc
  29. Disk Management- diskmgmt.msc
  30. Disk Partition Manager- diskpart
  31. Display Properties (w/Appearance Tab Preselected)- control color
  32. Display Properties- control desktop
  33. Display Properties- desk.cpl
  34. Dr. Watson System Troubleshooting Utility- drwtsn32
  35. Driver Verifier Utility- verifier
  36. Event Viewer- eventvwr.msc
  37. File Signature Verification Tool- sigverif
  38. Files and Settings Transfer Tool- migwiz
  39. Findfast- findfast.cpl
  40. Firefox (if installed)- firefox
  41. Folders Properties- control folders
  42. Fonts- control fonts
  43. Fonts Folder- fonts
  44. Free Cell Card Game- freecell
  45. Game Controllers- joy.cpl
  46. Group Policy Editor (XP Prof)- gpedit.msc
  47. Hearts Card Game- mshearts
  48. Help and Support- helpctr
  49. HyperTerminal- hypertrm
  50. Iexpress Wizard- iexpress
  51. Indexing Service- ciadv.msc
  52. Internet Connection Wizard- icwconn1
  53. Internet Explorer- iexplore
  54. Internet Properties- inetcpl.cpl
  55. Internet Setup Wizard- inetwiz
  56. IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
  57. IP Configuration (Display Connection Configuration) – ipconfi/all
  58. IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
  59. IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
  60. IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
  61. IP Configuration (Release All Connections)- ipconfig /release
  62. IP Configuration (Renew All Connections)- ipconfig /renew
  63. IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
  64. Java Control Panel (If Installed)- javaws
  65. Java Control Panel (If Installed)- jpicpl32.cpl
  66. Keyboard Properties – control keyboard
  67. Local Security Settings – secpol.msc
  68. Local Users and Groups – lusrmgr.msc
  69. Logs You Out Of Windows – logoff…..
  70. Malicious Software Removal Tool – mrt
  71. Microsoft Access (if installed) – access.cpl
  72. Microsoft Chat – winchat
  73. Microsoft Excel (if installed) – excel
  74. Microsoft Frontpage (if installed)- frontpg
  75. Microsoft Movie Maker – moviemk
  76. Microsoft Paint – mspaint
  77. Microsoft Powerpoint (if installed)- powerpnt
  78. Microsoft Syncronization Tool – mobsync
  79. Microsoft Word (if installed)- winword
  80. Minesweeper Game – winmine
  81. Mouse Properties – control mouse
  82. Mouse Properties – main.cpl
  83. Nero (if installed)- nero
  84. Netmeeting – conf
  85. Network Connections – control netconnections
  86. Network Connections – ncpa.cpl
  87. Network Setup Wizard – netsetup.cpl
  88. Notepad – notepad
  89. Nview Desktop Manager (If Installed)- nvtuicpl.cpl
  90. Object Packager – packager
  91. ODBC Data Source Administrator- odbccp32.cpl
  92. On Screen Keyboard – osk
  93. Opens AC3 Filter (If Installed) – ac3filter.cpl
  94. Outlook Express – msimn
  95. Paint – pbrush
  96. Password Properties – password.cpl
  97. Performance Monitor – perfmon.msc
  98. Phone and Modem Options – telephon.cpl
  99. Phone Dialer – dialer
  100. Pinball Game – pinball
  101. Power Configuration – powercfg.cpl
  102. Printers and Faxes – control printers
  103. Printers Folder – printers
  104. Private Character Editor – eudcedit
  105. Quicktime (If Installed)- QuickTime.cpl
  106. Real Player (if installed)- realplay
  107. Regional Settings – intl.cpl
  108. Registry Editor – regedit
  109. Registry Editor – regedit32
  110. Remote Access Phonebook – rasphone
  111. Remote Desktop – mstsc
  112. Removable Storage – ntmsmgr.msc
  113. Removable Storage Operator Requests – ntmsoprq.msc
  114. Resultant Set of Policy (XP Prof) – rsop.msc
  115. Scanners and Cameras – sticpl.cpl
  116. Scheduled Tasks – control schedtasks
  117. Security Center – wscui.cpl
  118. Services – services.msc
  119. Shared Folders – fsmgmt.msc
  120. Shuts Down Windows – shutdown
  121. Sounds and Audio – mmsys.cpl
  122. Spider Solitare Card Game – spider
  123. SQL Client Configuration – cliconfg
  124. System Configuration Editor – sysedit
  125. System Configuration Utility – msconfig
  126. System File Checker Utility (Purge File Cache)- sfc /purgecache
  127. System File Checker Utility (Return to Default Setting)- sfc /revert
  128. System File Checker Utility (Scan Immediately)- sfc /scannow
  129. System File Checker Utility (Scan On Every Boot) – sfc /scanboot
  130. System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
  131. System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
  132. System Information – msinfo32.
  133. System Properties – sysdm.cpl
  134. Task Manager – taskmgr
  135. Task Manager – taskmgr
  136. TCP Tester – tcptest
  137. Telnet Client – telnet
  138. Tweak UI (if installed) – tweakui
  139. User Account Management- nusrmgr.cpl
  140. Utility Manager – utilman
  141. Windows Address Book – wab
  142. Windows Address Book Import Utility – wabmig
  143. Windows Backup Utility (if installed)- ntbackup
  144. Windows Explorer – explorer
  145. Windows Firewall- firewall.cpl
  146. Windows Magnifier- magnify
  147. Windows Management Infrastructure – wmimgmt.msc
  148. Windows Media Player – wmplayer
  149. Windows Messenger – msmsgs
  150. Windows Picture Import Wizard (need camera connected)- wiaacmgr
  151. Windows System Security Tool – syskey
  152. Windows Update Launches – wupdmgr
  153. Windows Version (to show which version of windows)- winver
  154. Windows XP Tour Wizard – tourstart
  155. Wordpad – write

8/25/2009

How To Disable USB Removable Mass Storage Device Drive Access in Windows

It’s possible to simply disable USB ports support in PC BIOS in order to prevent and forbid computer user from using USB removable flash drive or mass storage device (portable hard disk drive) to copy and transfer data and files. However, disabling USB ports totally also shutdown the ability for system to use USB based keyboard, mouse, webcam, printer, scanner and etc, which has become a common connectivity norm in modern computer.As a workaround, use the following registry hack to stop USB Mass Storage Device drivers from starting when the system boots up.
Run Registry Editor (regedit).
Navigate to the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStorIn the right pane, double click on the Start value name.
Change the value data to 4 to disable the removable USB mass storage device drive access.

To revert and re-enable the drive access for removable USB mass storage device driver, change back the value data for Start to its original default of 3.
The change will take effect immediately to block any USB mass storage device such as USB flash drive, USB key and portable harddisk from been used in the system, while still allowing hardware components to work properly via USB connection. The hack works in most Windows operating system such as Windows Vista, XP, Windows Server 2008, 2003 and 2000.

How to take backup/convert production Linux system without downtime P2V, Image to VHD,VMDK & VDI

How to take backup/convert production Linux system P2V without downtime     Today, we are going to learn How to take backup/conv...