For those who seeks help in different areas of Software and Hardware platform

Data backup types and explanation





http://techsupportpk.blogspot.com/2000/03/data-backup-types-and-explanation.html
Share:

How To Run Your Own Web SMS Portal With PointSMS

http://techsupportpk.blogspot.com/2013/05/how-to-run-your-own-web-sms-portal-with.html
Share:

How to Secure Your Internet Connection

http://techsupportpk.blogspot.com/2012/12/how-to-secure-your-internet-connection.html
Share:

How to Improve Your Computer’s Performance

http://techsupportpk.blogspot.com/2012/12/how-to-improve-your-computers.html
Share:

How to extend your iPhone 5 battery life

http://techsupportpk.blogspot.com/2012/12/how-to-extend-your-iphone-5-battery-life.html
Share:

iPhone, iPod touch And iPad (iOS Firmwares & Jailbreak Tools)

What is Jailbreaking?
Jailbreaking is a process that modifies iOS to allow traditionally unauthorized code to run. The process essentially allows programs to gain access to files and processes that Apple normally does not allow access to, unlocking greater potential in your iDevice.

After jailbreaking your device you’ll find a new application store alongside the traditional app store. The new app store, called Cydia, features apps, tweaks, and extensions that are designed for jailbroken devices. The packages found in Cydia are unavailable in the app store and open up a number of possibilities for your jailbroken device.
Share:

Are You Safe Online?

http://techsupportpk.blogspot.com/2012/12/are-you-safe-online.html
Share:

How to Protect Young Kids Online

http://techsupportpk.blogspot.com/2012/12/how-to-protect-young-kids-online.html
Share:

How to Hard Reset Your iPad, iPhone, iPod

http://techsupportpk.blogspot.com/2012/12/how-to-hard-reset-your-ipad-iphone-ipod.html
Share:

Remote Control Your PC Using Your Phone

http://techsupportpk.blogspot.com/2012/12/remote-control-your-pc-using-your-phone.html
Share:

How to Setup and Configure an OpenVPN Server on CentOS 6

This article will guide you through the setup and configuration of OpenVPN server on your CentOS 6. We will also cover how to configure your Windows, OS X, or Linux client to connect to your newly installed OpenVPN server.

Before we begin, you'll need to have the Extra Packages for Enterprise Linux (EPEL) Repository enabled on your cloud server. This is a third party repository offered by the Fedora Project which will provide the OpenVPN package.

Run the following command:
Share:

Install VPN PPTP Client on CentOS release 6

This short article will just show you how to connect VPN Server from CentOS CLI through VPN client.

I will be using following variables:
Client OS: CentOS 6.3 64bit
VPN Server: 192.168.100.1
Username: client1
Password: cl!ent1$

Share:

Install and Configure PPTP VPN Client on (RHEL/CentOS/Ubuntu)

  1. Install PPTP Client
    • Ubuntu/Debian
    • sudo apt-get install pptp-linux
       
    • RHEL/CentOS/Fedora
    • sudo yum install pptp
       
  2. Modify chap-secrets /etc/ppp/chap-secrets and add the below line (replacing variables)
    $USERNAME   PPTP    $PASSWORD   *
Share:

How to use yum to download RPM packages without installing them


You need to install plugin called yum-downloadonly. This plugin adds a --downloadonly flag to yum so that yum will only download the packages and not install/update them. Following options supported by this plugin:
Share:

Benefits Of Salah (Prayer)

http://techsupportpk.blogspot.com/2012/12/benefits-of-salah-prayer.html
Share:

Conduct of Salat (Prayer)

http://techsupportpk.blogspot.com/2012/12/conduct-of-salat-prayer.html
Share:

Solaris 11 IPMP Active-Active and Active-Standby

http://techsupportpk.blogspot.com/2012/12/solaris-11-ipmp-active-active.html
Share:

Etiquette of Marriage in Islam

http://techsupportpk.blogspot.com/2012/12/etiquette-of-marriage-in-islam.html
Share:

Windows 8 Safe Mode Boot Procedure

http://techsupportpk.blogspot.com/2012/12/blog-post_19.html
Share:

How to configure Virtual Private Network on CentOS

Organizations with several satellite offices often connect to each other with dedicated lines for efficiency and protection of sensitive data in transit. For example, many businesses use frame relay or Asynchronous Transfer Mode (ATM) lines as an end-to-end networking solution to link one office with others. This can be an expensive proposition, especially for small to medium sized businesses (SMBs) that want to expand without paying the high costs associated with enterprise-level, dedicated digital circuits.
Share:

Charge Your Electronic Device Wirelessly!

http://techsupportpk.blogspot.com/2012/12/charge-your-electronic-device-wirelessly.html
Share:

How to Add iSCSI Storage Under Linux


http://techsupportpk.blogspot.com/2005/09/iscsilinux.html
Share:

Step-by-Step Guide of Oracle Solaris 11 Zones

http://techsupportpk.blogspot.com/2013/08/sol11zones.html
Share:

Oracle Solaris 10 Zones Step-by-Step Guide



Solaris 10's zone partitioning technology can be used to create local zones that behave like virtual servers. All local zones are controlled from the system's global zone. Processes running in a zone are completely isolated from the rest of the system. This isolation prevents processes that are running in one zone from monitoring or affecting processes that are running in other zones. Note that processes running in a local zone can be monitored from global zone; but the pro
Share:

VMware ESXi step-by-step Installation Guide

http://techsupportpk.blogspot.com/2013/06/vmware-esxi-step-by-step-installation.html
Share:

How to Create Virtual Machine(s) in Windows Server 2012

http://techsupportpk.blogspot.com/2013/06/how-to-create-virtual-machines-in.html
Share:

How to use Safe Mode on an Android Device

http://techsupportpk.blogspot.com/2013/06/how-to-use-safe-mode-on-android-device.html
Share:

Windows Cluster Setup with Windows 2008 R2

http://techsupportpk.blogspot.com/2013/06/windows-cluster-setup-with-windows-2008.html
Share:

Converting A VMware Image To A Physical Machine

http://techsupportpk.blogspot.com/2013/05/converting-vmware-image-to-physical.html
Share:

How To Set Up Multiple SSL Certificates on One IP with Apache on Ubuntu 12.04


You can host multiple SSL certificates on one IP Address using Server Name Indication (SNI). Although hosting several sites on a single virtual private server is not a challenge with the use of virtual hosts, providing separate SSL certificates for each site traditionally required separate IP addresses. The process has recently been simplified through the use of Server Name Indication (SNI), which sends a site visitor the certificate that matches the requested server name.
Share:

How To Set Up Multiple SSL Certificates on One IP with Nginx on Ubuntu 12.04

You can host multiple SSL certificates on one IP Address using Server Name Identification (SNI). Although hosting several sites on a single virtual private server is not a challenge with the use of virtual hosts, providing separate SSL certificates for each site traditionally required separate IP addresses. The process has recently been simplified through the use of Server Name Indication (SNI), which sends a site visitor the certificate that matches the requested server name.
Share:

Web Filtering On Squid Proxy

http://techsupportpk.blogspot.com/2013/05/web-filtering-on-squid-proxy.html
Share:

Set Up Squid Siblings On CentOS 6.3 With WCCP

http://techsupportpk.blogspot.com/2013/05/set-up-squid-siblings-on-centos-63-with.html
Share:

How to Block Streaming Media From Squid Proxy

http://techsupportpk.blogspot.com/2013/05/how-to-block-streaming-media-from-squid.html
Share:

BIND DNS Installation On CentOS

http://techsupportpk.blogspot.com/2013/05/bind-installation-on-centos.html

Share:

Step-By-Step Configuration of NAT with iptables

http://techsupportpk.blogspot.com/2013/05/step-by-step-configuration-of-nat-with.html
Share:

Windows 8 Step-by-Step Installation Guide

http://techsupportpk.blogspot.com/2013/09/win8install.html
Share:

What is google two-step verifcation and how to set up for your gmail account


Google's two-step verification is an optional but important level of security that not only requires your password, but also a passcode that gets sent to your phone via text or voice. Any computers you mark as "secure" will only require you to enter the code once every 30 days, but all other computers will require you to enter it every time.
Share:

Enabling 2 GB Large Pages on Solaris 10

Few facts:
  • - 8 KB is the default page size on Solaris 10 and 11 as of this writing
  • - both hardware and software must have support for 2 GB large pages
  • - SPARC T4 hardware is capable of supporting 2 GB pages
  • - Solaris 11 kernel has in-built support for 2 GB pages
  • - Solaris 10 has no default support for 2 GB pages
  • - Memory intensive 64-bit applications may benefit the most from using 2 GB pages
Prerequisites:
OS: Solaris 10 8/11 (Update 10) or later
Hardware: SPARC T4. eg., SPARC T4-1, T4-2 or T4-4

Steps to enable 2 GB large pages on Solaris 10:
  1. Install the latest kernel patch or ensure that 147440-04 or later was installed
  2. Add the following line to /etc/system and reboot
    • set max_uheap_lpsize=0x80000000
  3. Finally check the output of the following command when the system is back online
    • pagesize -a
    eg.,
    % pagesize -a
    8192  <-- i="">8K
65536 <-- i="">64K 4194304 <-- i="">4M 268435456 <-- i="">256M 2147483648 <-- i="">2G % uname -a SunOS jar-jar 5.10 Generic_147440-21 sun4v sparc sun4v
Share:

Recommended ZFS Storage Pool Practices

Share:

How To Set Up SSH Keys

SSH keys provide a more secure way of logging into a virtual private server with SSH than using a password alone. While a password can eventually be cracked with a brute force attack, SSH keys are nearly impossible to decipher by brute force alone. Generating a key pair provides you with two long string of characters: a public and a private key. You can place the public key on any server, and then unlock it by connecting to it with a client that already has the private key. When the two match up, the system unlocks without the need for a password. You can increase security even more by protecting the private key with a passphrase.
Share:

How to install Oracle 12c Multitenant Pluggable Databases

Imagine a situation where you have to create two different schemas in the same databases; but both with the same name. A typical example is in the case of Peoplesoft applications which have a specific schema name - SYSADM, that can't be changed. So if you want to install two Peoplesoft applications in the same database, you will soon discover that it's not possible since you can't have two schemas named SYSADM in the same database. So, what are your choices?
Share:

Video Tutorials