Dec 29, 2012





http://techsupportpk.blogspot.com/2000/03/data-backup-types-and-explanation.html

Data backup types and explanation

http://techsupportpk.blogspot.com/2013/05/how-to-run-your-own-web-sms-portal-with.html

How To Run Your Own Web SMS Portal With PointSMS

Dec 28, 2012

http://techsupportpk.blogspot.com/2012/12/windows-8-how-to-add-applications-to.html

How to Add Applications to the Startup folder under Windows 8

http://techsupportpk.blogspot.com/2012/12/how-to-secure-your-internet-connection.html

How to Secure Your Internet Connection

http://techsupportpk.blogspot.com/2012/12/how-to-improve-your-computers.html

How to Improve Your Computer’s Performance

Dec 27, 2012

http://techsupportpk.blogspot.com/2012/12/how-to-extend-your-iphone-5-battery-life.html

How to extend your iPhone 5 battery life

What is Jailbreaking?
Jailbreaking is a process that modifies iOS to allow traditionally unauthorized code to run. The process essentially allows programs to gain access to files and processes that Apple normally does not allow access to, unlocking greater potential in your iDevice.

After jailbreaking your device you’ll find a new application store alongside the traditional app store. The new app store, called Cydia, features apps, tweaks, and extensions that are designed for jailbroken devices. The packages found in Cydia are unavailable in the app store and open up a number of possibilities for your jailbroken device.

iPhone, iPod touch And iPad (iOS Firmwares & Jailbreak Tools)

Dec 26, 2012

http://techsupportpk.blogspot.com/2012/12/are-you-safe-online.html

Are You Safe Online?

http://techsupportpk.blogspot.com/2012/12/how-to-protect-young-kids-online.html

How to Protect Young Kids Online

http://techsupportpk.blogspot.com/2012/12/how-to-hard-reset-your-ipad-iphone-ipod.html

How to Hard Reset Your iPad, iPhone, iPod

http://techsupportpk.blogspot.com/2012/12/remote-control-your-pc-using-your-phone.html

Remote Control Your PC Using Your Phone

Dec 25, 2012

This article will guide you through the setup and configuration of OpenVPN server on your CentOS 6. We will also cover how to configure your Windows, OS X, or Linux client to connect to your newly installed OpenVPN server.

Before we begin, you'll need to have the Extra Packages for Enterprise Linux (EPEL) Repository enabled on your cloud server. This is a third party repository offered by the Fedora Project which will provide the OpenVPN package.

Run the following command:

How to Setup and Configure an OpenVPN Server on CentOS 6

This short article will just show you how to connect VPN Server from CentOS CLI through VPN client.

I will be using following variables:
Client OS: CentOS 6.3 64bit
VPN Server: 192.168.100.1
Username: client1
Password: cl!ent1$

Install VPN PPTP Client on CentOS release 6

  1. Install PPTP Client
    • Ubuntu/Debian
    • sudo apt-get install pptp-linux
       
    • RHEL/CentOS/Fedora
    • sudo yum install pptp
       
  2. Modify chap-secrets /etc/ppp/chap-secrets and add the below line (replacing variables)
    $USERNAME   PPTP    $PASSWORD   *

Install and Configure PPTP VPN Client on (RHEL/CentOS/Ubuntu)


You need to install plugin called yum-downloadonly. This plugin adds a --downloadonly flag to yum so that yum will only download the packages and not install/update them. Following options supported by this plugin:

How to use yum to download RPM packages without installing them

http://techsupportpk.blogspot.com/2012/12/benefits-of-salah-prayer.html

Benefits Of Salah (Prayer)

http://techsupportpk.blogspot.com/2012/12/conduct-of-salat-prayer.html

Conduct of Salat (Prayer)

Dec 24, 2012

http://techsupportpk.blogspot.com/2012/12/solaris-11-ipmp-active-active.html

Solaris 11 IPMP Active-Active and Active-Standby

Dec 23, 2012

http://techsupportpk.blogspot.com/2012/12/etiquette-of-marriage-in-islam.html

Etiquette of Marriage in Islam

Dec 20, 2012

Install Linux Through Windows Deployment Server (WDS) - Good Bye Kickstart

Dec 19, 2012

http://techsupportpk.blogspot.com/2012/12/blog-post_19.html

Windows 8 Safe Mode Boot Procedure

Dec 17, 2012

Organizations with several satellite offices often connect to each other with dedicated lines for efficiency and protection of sensitive data in transit. For example, many businesses use frame relay or Asynchronous Transfer Mode (ATM) lines as an end-to-end networking solution to link one office with others. This can be an expensive proposition, especially for small to medium sized businesses (SMBs) that want to expand without paying the high costs associated with enterprise-level, dedicated digital circuits.

How to configure Virtual Private Network on CentOS

Dec 10, 2012

http://techsupportpk.blogspot.com/2012/12/charge-your-electronic-device-wirelessly.html

Charge Your Electronic Device Wirelessly!


http://techsupportpk.blogspot.com/2005/09/iscsilinux.html

How to Add iSCSI Storage Under Linux

http://techsupportpk.blogspot.com/2013/08/sol11zones.html

Step-by-Step Guide of Oracle Solaris 11 Zones



Solaris 10's zone partitioning technology can be used to create local zones that behave like virtual servers. All local zones are controlled from the system's global zone. Processes running in a zone are completely isolated from the rest of the system. This isolation prevents processes that are running in one zone from monitoring or affecting processes that are running in other zones. Note that processes running in a local zone can be monitored from global zone; but the pro

Oracle Solaris 10 Zones Step-by-Step Guide

Dec 9, 2012


This guide covered most of the content on the internal Flex System V7000 and the Brocade FC5022 SAN Switch.

Configuring IBM v7000 Storage

Nov 27, 2012

http://techsupportpk.blogspot.com/2013/06/how-to-install-vios-from-network.html

How to Install VIOS from network through Linux Server

http://techsupportpk.blogspot.com/2013/06/how-to-install-rhel-6-on-ibm-power.html

How to install RHEL 6 on IBM Power Blades p601/701 through kickstart:

http://techsupportpk.blogspot.com/2013/08/resetpass.html

How to Reset Your Forgotten Windows Password

Nov 25, 2012

http://techsupportpk.blogspot.com/2013/06/vmware-esxi-step-by-step-installation.html

VMware ESXi step-by-step Installation Guide

http://techsupportpk.blogspot.com/2013/06/how-to-create-virtual-machines-in.html

How to Create Virtual Machine(s) in Windows Server 2012

http://techsupportpk.blogspot.com/2013/06/how-to-use-safe-mode-on-android-device.html

How to use Safe Mode on an Android Device

http://techsupportpk.blogspot.com/2013/06/windows-cluster-setup-with-windows-2008.html

Windows Cluster Setup with Windows 2008 R2

http://techsupportpk.blogspot.com/2013/05/converting-vmware-image-to-physical.html

Converting A VMware Image To A Physical Machine

http://techsupportpk.blogspot.com/2007/09/rootdisk.html

How To Replace Failed Root Disk Under Solaris Volume Manager

Oct 18, 2012


You can host multiple SSL certificates on one IP Address using Server Name Indication (SNI). Although hosting several sites on a single virtual private server is not a challenge with the use of virtual hosts, providing separate SSL certificates for each site traditionally required separate IP addresses. The process has recently been simplified through the use of Server Name Indication (SNI), which sends a site visitor the certificate that matches the requested server name.

How To Set Up Multiple SSL Certificates on One IP with Apache on Ubuntu 12.04

Oct 16, 2012

You can host multiple SSL certificates on one IP Address using Server Name Identification (SNI). Although hosting several sites on a single virtual private server is not a challenge with the use of virtual hosts, providing separate SSL certificates for each site traditionally required separate IP addresses. The process has recently been simplified through the use of Server Name Indication (SNI), which sends a site visitor the certificate that matches the requested server name.

How To Set Up Multiple SSL Certificates on One IP with Nginx on Ubuntu 12.04

Oct 14, 2012

http://techsupportpk.blogspot.com/2013/05/web-filtering-on-squid-proxy.html

Web Filtering On Squid Proxy

http://techsupportpk.blogspot.com/2013/05/set-up-squid-siblings-on-centos-63-with.html

Set Up Squid Siblings On CentOS 6.3 With WCCP

Aug 11, 2012

http://techsupportpk.blogspot.com/2013/05/how-to-block-streaming-media-from-squid.html

How to Block Streaming Media From Squid Proxy

http://techsupportpk.blogspot.com/2013/05/bind-installation-on-centos.html

BIND DNS Installation On CentOS

http://techsupportpk.blogspot.com/2013/05/step-by-step-configuration-of-nat-with.html

Step-By-Step Configuration of NAT with iptables

Aug 10, 2012

http://techsupportpk.blogspot.com/2013/09/win8install.html

Windows 8 Step-by-Step Installation Guide

Aug 6, 2012


Google's two-step verification is an optional but important level of security that not only requires your password, but also a passcode that gets sent to your phone via text or voice. Any computers you mark as "secure" will only require you to enter the code once every 30 days, but all other computers will require you to enter it every time.

What is google two-step verifcation and how to set up for your gmail account

Aug 3, 2012

Few facts:
  • - 8 KB is the default page size on Solaris 10 and 11 as of this writing
  • - both hardware and software must have support for 2 GB large pages
  • - SPARC T4 hardware is capable of supporting 2 GB pages
  • - Solaris 11 kernel has in-built support for 2 GB pages
  • - Solaris 10 has no default support for 2 GB pages
  • - Memory intensive 64-bit applications may benefit the most from using 2 GB pages
Prerequisites:
OS: Solaris 10 8/11 (Update 10) or later
Hardware: SPARC T4. eg., SPARC T4-1, T4-2 or T4-4

Steps to enable 2 GB large pages on Solaris 10:
  1. Install the latest kernel patch or ensure that 147440-04 or later was installed
  2. Add the following line to /etc/system and reboot
    • set max_uheap_lpsize=0x80000000
  3. Finally check the output of the following command when the system is back online
    • pagesize -a
    eg.,
    % pagesize -a
    8192  <-- i="">8K
65536 <-- i="">64K 4194304 <-- i="">4M 268435456 <-- i="">256M 2147483648 <-- i="">2G % uname -a SunOS jar-jar 5.10 Generic_147440-21 sun4v sparc sun4v

Enabling 2 GB Large Pages on Solaris 10

Jul 12, 2012

Recommended ZFS Storage Pool Practices

Jun 22, 2012

SSH keys provide a more secure way of logging into a virtual private server with SSH than using a password alone. While a password can eventually be cracked with a brute force attack, SSH keys are nearly impossible to decipher by brute force alone. Generating a key pair provides you with two long string of characters: a public and a private key. You can place the public key on any server, and then unlock it by connecting to it with a client that already has the private key. When the two match up, the system unlocks without the need for a password. You can increase security even more by protecting the private key with a passphrase.

How To Set Up SSH Keys

Feb 24, 2012

Imagine a situation where you have to create two different schemas in the same databases; but both with the same name. A typical example is in the case of Peoplesoft applications which have a specific schema name - SYSADM, that can't be changed. So if you want to install two Peoplesoft applications in the same database, you will soon discover that it's not possible since you can't have two schemas named SYSADM in the same database. So, what are your choices?

How to install Oracle 12c Multitenant Pluggable Databases

 
TECH SUPPORT © 2012-2017