GPUPDATE – Update Group Policy settings. (GPUPDATE.exe)
Syntax GPUpdate [/Force] [/Logoff] [/Boot] [/Sync] [/Target:{Computer | User}] [/Wait:value] Read More
Unzip files in particular directory or folder under Linux.
Syntax:
unzip {.zip-file-name} -d {/path/to/extract}
Read More
Linux only: This is an excellent tip that changes the prompt to red when using the root account from the terminal—as a reminder to be more careful. Using the tip is relatively simple—just edit the /root/.bashrc file and add in the following, preferably commenting out the existing lines that set the color, though you can simply add this line to the end of the file.
Read More
While automated backups are important, sometimes you just want to take a quick and dirty snapshot before making a change to your data.
The mysqldump command is used to create textfile “dumps” of databases managed by MySQL. These dumps are just files with all the SQL commands needed to recreate the database from scratch. The process is quick and easy.
If you want to back up a single database, you merely create the dump and send the output into a file, like so:
mysqldump database_name > database_name.sql
Multiple databases can be backed up at the same time: Read More
How do I find out whether the options have been added or not:
asadmin list-jvm-options
You have to delete the JVM option with asadmin delete-jvm-options
:
asadmin delete-jvm-options '-XX\:MaxPermSize=192m'
UUIDs (Universal Unique Identifier) for network interface card can be generated using the following command (CommandShell):
uuidgen [device]
To create a desktop shortcut point to the “Add/Remove Program”:
You can change the keyboard layout using the keyboard control panel applet (start – settings – control panel – keyboard – Input Locales) however this does not affect the layout used during logon (which is by default English (United States)). Read More
The root account is all powerful in Linux. As humans make mistakes it is very dangerous to use root on a regular basis. By using sudo you can limit the risk of human error and prevent mistakes from happening. Read More
The following command can be used to find out the number of connections per remote hosts (which is useful to identify denial-of-service attacks):
# netstat -n | grep 'tcp\|udp' | awk '{ print $5; }' | cut -d: -f1 | sort | uniq -c | sort -nr
netstat -n
is just faster than without the -n
parameter since it shows numerical addresses instead of trying to determine symbolic host, port or user names.
grep 'tcp\|udp'
only shows tcp and udp connections (thus removing unix sockets and headers). Read More