Posted by: blogeeks08 | July 24, 2008

Simple NFS setting

NFS setting

Server IP address : 192.168.0.70

Client IP address: 192.168.0.140

Folder to be shared in server’s machine /misc

1. Check services needed for NFS (both client and server):

a. portmap:

service portmap status if it is not running then restart the service

service portmap start enable portmap

b. nfs:

service portmap status if it is not running then restart the service

service portmap start enable nfs

2. In server machine do as below:

a. Write in /etc/exports:

/misc *(rw,sync)

Symbol * and (rw,sync) means that everyone in network can access the folder with read and write permission. Further explanation about denial and permission will be explained later.

b. Exit from /etc/exports and then type:

exportfs –a

3. In client machine do as below:

mount 192.168.0.70:/misc /tmp

/tmp is optional, you can choose any directory to store the shared directory.

Posted by: blogeeks08 | July 21, 2008

Web based proxy

Have u ever suffered when u wanna download some file in ur local network but the admin restrict ur access?

Let’s make some backdoor activity to solve this problem. Use web based proxy! Admin currently still feel careless about this activity since there are not many people know it.

Just type the address below in ur browser and then type ur desired address in their address box

Below are some web based proxies u may use:

Posted by: blogeeks08 | July 13, 2008

Linux learning – Introduction

Just wanna try to reexplain about what i’ve learned so far about this stuff. Let’s start with the introduction:

Open Source

Linux is all about open source. The basic concept of open source are:

  • The freedom to distribute software and source code
  • The ability to modify and create derived works
  • Integrity of author’s code

These make Linux become widely spread, people can easily get, modify and then redistribute to the society regardless about license or copyright problems.

Linux Principles

  • Everything is a file (including hardware)
  • Small, single-purpose programs
  • Ability to chain programs together to perform complex tasks
  • Avoid captive user interfaces
  • Configuration data stored in text

Linux is all about file. Every part related to it, configuration, device, application, etc are initialized by file. Each file as programs has a purpose that furthermore being joint to perform advanced tasks. All is stored in text format, editable based on permission (discussed later).

Usage Basics

In this discussion, we will take a tour in how use Linux at the first time: logging in to the system. There will be 2 ways in logging in to Linux system:\

  1. Console
  2. Graphical interface

There are several ways to verify and troubleshoot in routing configuration.

It is always best to begin with the basics:

1. Make sure all of the links (interfaces) are up and operational.

2. Check the cabling.

3. Check to make sure you have the correct IP address and subnet mask on each interface.

4. Remove any unnecessary configuration commands that are no longer necessary or have been replaced by other commands.

show ip route command

This is the first command to use to check for network convergence. As you examine the routing table, it is important to look for the routes that you expect to be in the routing table as well as for those that should not be in the routing table.

show ip interface brief

If a network is missing from the routing table, often it is because an interface is down or incorrectly configured. The show ip interface brief command quickly verifies the status of all interfaces.

show ip protocols command

The show ip protocols command verifies several critical items, including verifying that RIP is enabled, the version of RIP, the status of automatic summarization, and the networks that were included in the network statements. The Routing Information Sources listed at the bottom of the output are the RIP neighbors from which this router is currently receiving updates.

debug ip rip command

debug ip rip is an excellent command to use to examine the contents of the routing updates that are sent and received by a router. There may be times when a route is being received by a router but is not being added to the routing table. One reason for this could be that a static route is also configured for the same network being advertised. By default, a static route has a lower administrative distance than any dynamic routing protocol and will take precedence in being added to the routing table.

ping command

An easy way to verify round-trip connectivity is with the ping command. If end-to-end connectivity is not successful, begin by pinging the local interfaces. If successful, ping the router interfaces on the directly connected networks. If that is also successful, continue pinging interfaces on each successive router. Once a ping is unsuccessful, examine both routers and all the routers in-between to determine where and why the ping is failing.

show running-config command

The show running-config can be used to verify all the commands currently configured. Usually, other commands are more efficient and provide more information than a simple listing of the current configuration. However, the show running-config command is useful in determining if anything obvious was forgotten or misconfigured.

*Taken from Cisco Exploration 4.0: Routing Protocols

Posted by: blogeeks08 | June 2, 2008

Sample Configuration Linux DHCP Server

  1. Check first whether the daemon is already installed
  2. If the daemon has not been installed, find the matched daemon with your Linux version and kernel
  3. If it is already installed, configure the /etc/dhcpd.conf file. Below is the sample configuration
    ddns-update-style interim
    ignore client-updates
     
    subnet 192.168.1.0 netmask 255.255.255.0 {
     
       # The range of IP addresses the server
       # will issue to DHCP enabled PC clients
       # booting up on the network
     
       range 192.168.1.201 192.168.1.220;
     
       # Set the amount of time in seconds that
       # a client may keep the IP address
    
      default-lease-time 86400;
      max-lease-time 86400;
     
       # Set the default gateway to be used by
       # the PC clients
     
       option routers 192.168.1.1;
       # Don't forward DHCP requests from this
       # NIC interface to any other NIC
       # interfaces
     
       option ip-forwarding off;
     
       # Set the broadcast address and subnet mask
       # to be used by the DHCP clients
     
      option broadcast-address 192.168.1.255;
      option subnet-mask 255.255.255.0;
      
       # Set the NTP server to be used by the
       # DHCP clients
    
      option ntp-servers 192.168.1.100;
    
       # Set the DNS server to be used by the
       # DHCP clients
    
      option domain-name-servers 192.168.1.100;
     
       # If you specify a WINS server for your Windows clients,
       # you need to include the following option in the dhcpd.conf file:
    
      option netbios-name-servers 192.168.1.100;
     
       # You can also assign specific IP addresses based on the clients'
       # ethernet MAC address as follows (Host's name is "laser-printer":
    
      host laser-printer {
          hardware ethernet 08:00:2b:4c:59:23;
         fixed-address 192.168.1.222;
       }
    }
    #
    # List an unused interface here
    #
    subnet 192.168.2.0 netmask 255.255.255.0 {
    }
  4. You can also find resource by type “man dhcp-options”
  5. Sample above is objected to Fedora/RedHat distro.
  6. After it is already configured then just type service dhcpd start to activate the dhcp service

*Taken from linuxhomenetworking.com

Posted by: blogeeks08 | May 23, 2008

Tongue Twister (the next..)



Which witch wished which wicked wish?



Old oily Ollie oils old oily autos.



The two-twenty-two train tore through the tunnel.



Silly Sally swiftly shooed seven silly sheep.
The seven silly sheep Silly Sally shooed
shilly-shallied south.
These sheep shouldn’t sleep in a shack;
sheep should sleep in a shed.



Twelve twins twirled twelve twigs.



Three gray geese in the green grass grazing.
Gray were the geese and green was the grass.



Many an anemone sees an enemy anemone.



Nine nice night nurses nursing nicely.



Peggy Babcock.



You’ve no need to light a night-light
On a light night like tonight,
For a night-light’s light’s a slight light,
And tonight’s a night that’s light.
When a night’s light, like tonight’s light,
It is really not quite right
To light night-lights with their slight lights
On a light night like tonight.



Black bug’s blood.



Flash message!



Say this sharply, say this sweetly,
Say this shortly, say this softly.
Say this sixteen times in succession.



Six sticky sucker sticks.



If Stu chews shoes, should Stu
choose the shoes he chews?



Crisp crusts crackle crunchily.



Give papa a cup of proper coffee in a copper coffee cup.



Six sharp smart sharks.



What a shame such a shapely sash
should such shabby stitches show.



Sure the ship’s shipshape, sir.



Betty better butter Brad’s bread.



Of all the felt I ever felt,
I never felt a piece of felt
which felt as fine as that felt felt,
when first I felt that felt hat’s felt.



Sixish.



Don’t pamper damp scamp tramps that camp under ramp lamps.



Swan swam over the sea,
Swim, swan, swim!
Swan swam back again
Well swum, swan!



Six shimmering sharks sharply striking shins.



I thought a thought.
But the thought I thought wasn’t the thought
I thought I thought.



Posted by: blogeeks08 | May 23, 2008

Another Tongue Twister

Six sick slick slim sycamore saplings.



A box of biscuits, a batch of mixed biscuits



A skunk sat on a stump and thunk the stump stunk,
but the stump thunk the skunk stunk.



Peter Piper picked a peck of pickled peppers.
Did Peter Piper pick a peck of pickled peppers?
If Peter Piper picked a peck of pickled peppers,
where’s the peck of pickled peppers Peter Piper picked?



Red lorry, yellow lorry, red lorry, yellow lorry.



Unique New York.



Betty Botter had some butter,
“But,” she said, “this butter’s bitter.
If I bake this bitter butter,
it would make my batter bitter.
But a bit of better butter–
that would make my batter better.”

So she bought a bit of butter,
better than her bitter butter,
and she baked it in her batter,
and the batter was not bitter.
So ’twas better Betty Botter
bought a bit of better butter.



Six thick thistle sticks. Six thick thistles stick.



Is this your sister’s sixth zither, sir?



A big black bug bit a big black bear,
made the big black bear bleed blood.



The sixth sick sheik’s sixth sheep’s sick.



Toy boat. Toy boat. Toy boat.



One smart fellow, he felt smart.
Two smart fellows, they felt smart.
Three smart fellows, they all felt smart.



Pope Sixtus VI’s six texts.



I slit the sheet, the sheet I slit, and on the slitted sheet I sit.



She sells sea shells by the sea shore.
The shells she sells are surely seashells.
So if she sells shells on the seashore,
I’m sure she sells seashore shells.



Mrs. Smith’s Fish Sauce Shop.



“Surely Sylvia swims!” shrieked Sammy, surprised.
“Someone should show Sylvia some strokes so she shall not sink.”



A Tudor who tooted a flute
tried to tutor two tooters to toot.
Said the two to their tutor,
“Is it harder to toot
or to tutor two tooters to toot?”



Shy Shelly says she shall sew sheets.



Three free throws.



I am not the pheasant plucker,
I’m the pheasant plucker’s mate.
I am only plucking pheasants
’cause the pheasant plucker’s running late.



Sam’s shop stocks short spotted socks.



A flea and a fly flew up in a flue.
Said the flea, “Let us fly!”
Said the fly, “Let us flee!”
So they flew through a flaw in the flue.



Knapsack straps.



Which wristwatches are Swiss wristwatches?



Lesser leather never weathered wetter weather better.



Posted by: blogeeks08 | May 16, 2008

Nokia Hidden Shortcut

Just for my reminder aja sih sebenarnya. Gw dapet dari forum di gilaupload. Thanks for the TS!!

Kode Tombol Rahasia Ponsel Nokia
Kode Tombol Rahasia Ponsel Nokia – Kunci Trik Cara Buka Secret Code Akses HP/Handphone/Telepon Selular/Seluler Nokia Anda

Berikut ini adalah kunci kode tombol rahasia yang dapat anda jalankan sendiri dengan mengetiknya di keypad hp ponsel anda yang bermerek Nokia baik yang cdma maupun yang gsm.

1. Melihat IMEI (International Mobile Equipment Identity)
Caranya tekan * # 0 6 #

2. Melihat versi software, tanggal pembuatan softwre dan jenis kompresi software
Caranya tekan * # 0 0 0 0 #
Jika tidak berhasil coba pencet * # 9 9 9 9 #

3. Melihat status call waiting
Caranya tekan * # 4 3 #

4. Melihat nomor / nomer private number yang menghubungi ponsel anda
Caranya tekan * # 3 0 #

5. Menampilkan nomer pengalihan telepon all calls
Caranya tekan * # 2 1 #

6. Melihat nomor penelepon pada pengalihan telepon karena tidak anda jawab (call divert on)
Caranya tekan * # 6 1 #

7. Melihat nomor penelepon pada pengalihan telepon karena di luar jangkauan (call divert on)
Caranya tekan * # 6 2 #

8. Melihat nomor penelepon pada pengalihan telepon karena sibuk (call divert on)
Caranya tekan * # 6 7 #

9. Merubah logo operator pada nokia type 3310 dan 3330
Caranya tekan * # 6 7 7 0 5 6 4 6 #

10. Menampilkan status sim clock
Caranya tekan * # 7 4 6 0 2 5 6 2 5 #

11. Berpindah ke profil profile ponsel anda
Caranya tekan tombol power off tanpa ditahan

12. Merubah seting hp nokia ke default atau pabrikan
Caranya tekan * # 7 7 8 0 #

13. Melakukan reset timer ponsel dan skor game ponsel nokia
Caranya tekan * # 7 3 #

14. Melihat status call waiting
Caranya tekan * # 4 3 #

15. Melihat kode pabrik atau factory code
Caranya tekan * # 7 7 6 0 #

16. Menampilkan serial number atau nomer seri hp, tanggal pembuatan, tanggal pembelian, tanggal servis terakhir, transfer user data. Untuk keluar ponsel harus direset kembali.
Caranya tekan * # 92702689 #

17. Melihat kode pengamanan ponsel anda
Caranya tekan * # 2 6 4 0 #

18. Melihat alamat ip perangkat keras bluetooth anda
Caranya tekan * # 2 8 2 0 #

19. Mengaktifkan EFR dengan kualitas suara terbaik namun boros energi batere. Untuk mematikan menggunakan kode yang sama.
Caranya tekan * # 3 3 7 0 #

20. Mengaktifkan EFR dengan kualitas suara terendah namun hemat energi batere. Untuk mematikan menggunakan kode yang sama.
Caranya tekan * # 4 7 2 0 #

21. Menuju isi phone book dengan cepat di handphone nokia
Caranya tekan nomer urut lalu # contoh : 150#

22. Mengalihkan panggilan ke nomor yang dituju untuk semua panggilan
Caranya tekan * * 2 1 * Nomor Tujuan #

23. Mengalihkan panggilan ke nomor yang dituju untuk panggilan yang tidak terjawab
Caranya tekan * * 6 1 * Nomor Tujuan #

24. Mengalihkan panggilan ke nomor yang dituju untuk panggilan ketika telepon hp anda sedang sibuk
Caranya tekan * * 6 7 * Nomor Tujuan #

Keterangan Tambahan :
– Kode diinput tanpa spasi
– Ada kode-kode nokia yang berlaku pada tipe tertentu saja

Posted by: blogeeks08 | May 16, 2008

STPDN, STIP, Mana Lagi Yang Ikutan Neh?

Dunia pendidikan Indonesia lagi-lagi tercoreng dengan tewasnya mahasiswa STIP setelah diberitakan dikeroyok oleh seniornya. Kok gak kapok-kapok ya sekolah di Indonesia ini? Zaman seperti sekarang kok masih pake kekerasan?

Seperti tidak putus tragedi seperti itu. Diawali oleh STPDN (setau saya), sekarang tambah lagi berita itu. Dan kasus yang hampir mirip, kekerasan dalam dunia pendidikan. Apa sih yang sebenarnya dimaksudkan lewat aksi seperti itu?

Senioritas memang perlu untuk ada dalam sebuah institusi demi menjaga sebuah hirarki penghormatan terhadap yang lebih “senior”. Senior bukan hanya sebagai umur saja, tapi bisa banyak hal seperti pangkat, jabatan, technical skill, dsb. Tapi apa dengan adanya senioritas bisa semena-mena?

Hare geneh“, mungkin itu yang pantas untuk diucapkan untuk pelaku-pelaku kekerasan di lingkungan sekolah. Sudah tidak jamannya lagi pendekatan represif kayak gitu, emang sekolah mau nyetak tukang pukul apa? Mau menghasilkan preman? Tentu tidak kan?

Pemerintah tampak perlu untuk memberikan ultimatum atau pemberitahuan secara intensuf menegnai hal ini. Jangan sampai terulang lagi kejadian yang memilukan seperti itu.

Posted by: blogeeks08 | May 15, 2008

Picture of How Gain Success

Older Posts »

Categories