Symantec Endpoint Protection – How to cleanup excessive disk usage

This document describes the necessary steps required to clean up the content of the folder C:\Program Files\Symantec\Symantec Endpoint Protection Manager\Inetpub\content\ 1. Stop the Service Endpoint Protection services Symantec Embedded Database Symantec Endpoint Protection Symantec Endpoint Protection Manager Symantec Event Manager Symantec Management Client Symantec Settings Manager 2. Navigate to the folder C:\Program Files\Symantec\Symantec Endpoint Protection … Continue reading Symantec Endpoint Protection – How to cleanup excessive disk usage

How to install a PPTP server on debian squeeze

This document describes the required steps to make a fully functional PPTP server on debian squeeze and how to configure Arno iptables firewall to accept incoming connections to PPTP server (in case you use this great firewall script). If you don’t use Arno iptables firewall but you still want to share internet connection with PPTP … Continue reading How to install a PPTP server on debian squeeze

How to migrate a single disk Linux System to software RAID1

This guide explains how to set up software RAID1 on an already running Linux (Ubuntu 12.10) system. The GRUB2 bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one). Preliminary Note In this tutorial I am using … Continue reading How to migrate a single disk Linux System to software RAID1

Common commands for Foundry switches and load balancers

General Commands show run – shows the current (running) configuration show config – shows the saved (startup) configuration show int bri – quick status of all interfaces show int eth 18 – detailed information on interface ethernet 18 show vlan – shows VLAN information and port association show log – shows the log show mac-address … Continue reading Common commands for Foundry switches and load balancers

How to log bash history with syslog

There are two methods to get this thing done. 1. Trap method – drop the following snippet into either the per-user or system-wide bash profile (~/.bash_profile or /etc/profile, respectively) unset HISTSIZE HISTFILESIZE export HISTTIMEFORMAT=’%F %T’ function log2syslog{    declare COMMAND    COMMAND=$(fc -ln -0)    logger -p local1.notice -t bash -i — “${USER}:${COMMAND}”}trap log2syslog DEBUG … Continue reading How to log bash history with syslog

How to authenticate on a machine with ssh (protocol 1) without password

This document describes the necessary steps to be carried out in order to authenticate with ssh protocol 1 without password. 1. Generate private/public pair of keys on client computer (let’s say desktop) 2. Copy the public key to the server 3. Try to authenticate on server Note: If authenticate on step 3 fails with the … Continue reading How to authenticate on a machine with ssh (protocol 1) without password