- BannerSnack : Banner Snack is a free flash banner maker that lets you create banner ads without Flash coding. BannerSnack banner creator is an online app by SnackTools.
- GIMP – The GNU Image Manipulation Program
- My Banner Maker - Create free banners online easily for your Myspace, Youtube, or just about any other website! Make your own banner and get the html code to display it on other websites.
- BannerNow - FREE Banner Maker. FREE Banner Creator. FREE Banner Editor. SWF Export.
- BannerFans - Make banners, showcase your banners for friends to see, share your banners with friends and fans.
- Webbanner24 - Webbanner24 is a free and easy banner maker! Create banners with countless fonts, cliparts, filters and animations easily! It’s 100% free! No branding and registration! Create your banner now!
- Open the vSphere/VMware Infrastructure (VI) Client and log in with appropriate credentials.
- If connecting to vCenter Server, click on the desired host.
- Click the Configuration tab.
- Click Storage.
- Right-click on the appropriate datastore and click Browse Datastore.
- Navigate to the folder named after the virtual machine, and locate the virtual machine.vmx file.
- Right-click the .vmx file and click Add to inventory. The Add to Inventory wizard opens.
- Continue to follow the wizard to add the virtual machine.
- Log in as root to the ESX host with an SSH client.
- Run the command:
# vmware-cmd -s register full path to virtual machinevirtual machine name.vmx
To register a virtual machine from a command line on an ESXi host:
- Log in as root to the ESXi host with an SSH client. For information on using Tech Support mode, see Using Tech Support Mode in ESXi 4.1 and ESXi 5.x (1017910).
- Run the command:
# vim-cmd solo/registervm /vmfs/volumes/datastore_name/VM_directory/VM_name.vmx
The GetVersionEx function retrieves the major and minor version numbers and other information about the currently running version of the operating system. The VerifyVersionInfo function enables you to determine whether the current system satisfies a specified set of operating system version conditions. For more information, see the following topics:
The following table summarizes the most recent operating system version numbers.
Identifying the current operating system is usually not the best way to determine whether a particular operating system feature is present. This is because the operating system may have had new features added in a redistributable DLL. Rather than using GetVersionEx to determine the operating system platform or version number, test for the presence of the feature itself.
Article source: http://www.gkhan.in/operating-system-version/
netsh -c interface ipv4 add neighbors “Network Card Name” “IP Address” “MAC Address” store=persistent
For Example :-
Your Network Card Name is :- Local Area Connection
IP Address is :- 192.168.10.10
MAC Address is :- 00-1d-71-83-6c-00
netsh -c interface ipv4 add neighbors “Local Area Connection” “192.168.10.10” “00-1d-71-83-6c-00? store=persistent
It will make parmanent ARP entry.
In this example I am assuming your detals as below but it will change according to your setup.
ESX Host IP is 192.168.1.10
SNMP Server IP 192.168.1.100
Note:- on VMware support site is shows all commands as “vicfg-snmp” for SNMP you will not get this command as VCLI you will find in bin folder as vicfg-snmp.pl So change vicfg-snmp with vicfg-snmp.pl
1- Check the SNMP status
C:Program Files (x86)VMwareVMware vSphere CLIbinvicfg-snmp.pl –server 192.168.1.10 –username root –password P@ssw0rd –show
Current SNMP agent settings:
Enabled : 0
UDP port : 161
Notification targets :
2- Set the SNMP Community
C:Program Files (x86)VMwareVMware vSphere CLIbinvicfg-snmp.pl –server 192.168.1.10 –username root –password P@ssw0rd -c public, internal
3- Enable SNMP Client
C:Program Files (x86)VMwareVMware vSphere CLIbinvicfg-snmp.pl –server 192.168.1.10 –username root –password P@ssw0rd –enable
4- Set the target SNMP server
C:Program Files (x86)VMwareVMware vSphere CLIbinvicfg-snmp.pl –server 192.168.1.10 –username root –password P@ssw0rd -t 192.168.1.100@162/public
5- Test SNMP
C:Program Files (x86)VMwareVMware vSphere CLIbinvicfg-snmp.pl –server 192.168.1.10 –username root –password P@ssw0rd –test
Article source: http://www.gkhan.in/how-to-enable-snmp-client-on-esx5/
WordPress sites across the web have recently been targeted by an extensive distributed brute force attack. The attack attempts to gain access to the administrator account on WordPress sites by systematically running through a variety of password iterations. Since the attack originates from thousands of different IP addresses, it is difficult to block at the network level.
Last night the attack impacted performance for customers on several servers, regardless of whether WordPress was installed on their site. Our operations and support teams have been working throughout the night, and have taken several proactive measures to mitigate the security threat. In some cases, we temporarily disabled the ability to log in to WordPress sites that were under attack – which also protected these sites from being compromised. As of this morning, all of our servers are back to normal performance levels and login functionality has been restored.
If you have installed WordPress on your site please take a minute or two to ensure your site is protected against attacks like this one. Here are some basic security tips:
- The easiest thing you can do to increase the security of your site is to change both the admin username and password. By default, the administrator login name is set to “admin” – and most brute force scripts have this ID and some basic variations (e.g. administrator, root, test, etc…) hardcoded as the IDs they attempt to break into. Change the username for your administrator account to something obscure.
- Make sure your password is strong. You know the drill: more than 8 characters, letters and numbers, no English words, no dates, mixture of capitals and lower case. Consider using a random password generator and a secure password manager to store it so you don’t have to memorize it.
- Install a security enhancing plug-in. The core WordPress application lacks some basic security features, such as the ability to limit the number of failed login attempts. Fortunately, you can add functionality like this via some popular plug-ins:
- Bad Behavior: http://wordpress.org/extend/
- Better WP Security: http://wordpress.org/extend/
- Limit Log-in Attempts: http://wordpress.org/extend/
- Bad Behavior: http://wordpress.org/extend/
Our operations team will remain vigilant and will continue to proactively respond to any security threats as they arise. Although this attack is particularly extensive, it is unfortunately not uncommon. The single most important thing you can do to protect any aspect of your account (e-mail, FTP, other web apps, etc…) is to use very strong passwords, and insist that your clients / users do the same.
Step-1 Forward GRE protocol and TCP port 1723 through your firewall
Step-2 Add the Poptop Yum Repository
rpm -Uhv http://poptop.sourceforge.net/yum/stable/rhel5/pptp-release-current.noarch.rpm
Step-3 Configure iptables
Create iptables_set.sh, chmod +x iptables_set.sh, and run the script.
Note: The following will work but you may wish to change the source address from 10.10.9.0/24 to the network range of your choosing based on your network.
/sbin/iptables -P INPUT DROP
/sbin/iptables -P OUTPUT ACCEPT
/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
/sbin/iptables -A FORWARD -i ppp+ -o eth0 -j ACCEPT
/sbin/iptables -A FORWARD -i eth0 -o ppp+ -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p tcp –dport 1723 -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p gre -j ACCEPT
/sbin/iptables -A INPUT -p icmp -j ACCEPT
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A INPUT -m state –state ESTABLISHED,RELATED -j ACCEPT
/sbin/service iptables save
/sbin/iptables -L -v
Step-4 Configure Routing
net.ipv4.ip_forward = 1
Step-5 Make the changes active
Step-6 Install PPTP Server
yum install ppp pptpd
Step-7 Configure the service to start on boot
chkconfig –levels 345 pptpd on
Step-7 Configure Client Network Options change IP address according to your requirement
Step-8 Configure Client Access
You will need to customize the client name, secret (password), and you can either allow all IP address or limit as necessary.
# Secrets for authentication using CHAP
# client server secret IP addresses
test-user * test-password *
Step-9 Start the Server
Start the pptpd service
service pptpd start
Step-10 Configure the Client
Article source: http://www.gkhan.in/how-to-install-pptp-server-on-cent-os/
Apr. 3, 2013 ? Talk about storing data in the cloud. Scientists at the Joint Quantum Institute (JQI) of the National Institute of Standards and Technology (NIST) and the University of Maryland have taken this to a whole new level by demonstrating* that they can store visual images within quite an ethereal memory device — a thin vapor of rubidium atoms. The effort may prove helpful in creating memory for quantum computers.
Their work builds on an approach developed at the Australian National University, where scientists showed that a rubidium vapor could be manipulated in interesting ways using magnetic fields and lasers. The vapor is contained in a small tube and magnetized, and a laser pulse made up of multiple light frequencies is fired through the tube. The energy level of each rubidium atom changes depending on which frequency strikes it, and these changes within the vapor become a sort of fingerprint of the pulse’s characteristics. If the field’s orientation is flipped, a second pulse fired through the vapor takes on the exact characteristics of the first pulse — in essence, a readout of the fingerprint.
“With our paper, we’ve taken this same idea and applied it to storing an image — basically moving up from storing a single ‘pixel’ of light information to about a hundred,” says Paul Lett, a physicist with JQI and NIST’s Quantum Measurement Division. “By modifying their technique, we have been able to store a simple image in the vapor and extract pieces of it at different times.”
It’s a dramatic increase in the amount of information that can be stored and manipulated with this approach. But because atoms in a vapor are always in motion, the image can only be stored for about 10 milliseconds, and in any case the modifications the team made to the original technique introduce too much noise into the laser signal to make the improvements practically useful. So, should the term vaporware be applied here after all? Not quite, says Lett — because the whole point of the effort was not to build a device for market, but to learn more about how to create memory for next-generation quantum computers.
“What we’ve done here is store an image using classical physics. However, the ultimate goal is to store quantum information, which a quantum computer will need,” he says. “Measuring what the rubidium atoms do as we manipulate them is teaching us how we might use them as quantum bits and what problems those bits might present. This way, when someone builds a solid-state system for a finished computer, we’ll know how to handle them more effectively.”
Other social bookmarking and sharing tools:
The above story is reprinted from materials provided by National Institute of Standards and Technology (NIST).
Note: Materials may be edited for content and length. For further information, please contact the source cited above.
- Jeremy B Clark, Quentin Glorieux, Paul D Lett. Spatially addressable readout and erasure of an image in a gradient echo memory. New Journal of Physics, 2013; 15 (3): 035005 DOI: 10.1088/1367-2630/15/3/035005
Note: If no author is given, the source is cited instead.
Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.
$ cat /etc/*-release
CentOS release 5.9 (Final)
$ lsb_release -a
LSB Version: :core-4.0-ia32:core-4.0-noarch:graphics-4.0-ia32:graphics-4.0-noarch:printing-4.0-ia32:printing-4.0-noarch
Distributor ID: CentOS
Description: CentOS release 5.9 (Final)
$ uname -mrs
$ uname -a
Linux 2.6.18-194.el5 i686
Article source: http://www.gkhan.in/how-do-i-find-out-my-kernel-version/