We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

How to Open / Extract RAR Files within Linux

To extract or open RAR files within Linux the unrar binary is used. Below provides the installation and basic operational syntax for the unrar program. 1. Installation 1.1 REDHAT yum install unrar 1.2 UBUNTU apt-get install unrar 2. Basic Syntax To extract a RAR file the following syntax is used: unrar e contents.rar 3. Example … Read more

Ubuntu Ubiquity Error: The username you entered is invalid

When Installing Ubuntu from a Live CD via the graphical installer ubiquity you may receive the following error :               The username you entered is invalid. Note that usernames               must start with a lower-case letter, which can be followed               by any combination of numbers and more lower-case letters. Solution This error can occur … Read more

Netscreen Traffic Reporting

Traffic reporting on the Juniper Netscreen can be achieved via a number of methods. Various tools and features are available such as the Netscreen Security Manager (NSM), 3rd Party applications along with numerous reporting features on the device itself. This article will look at how to create traffic reports by using just 1. a Netscreen … Read more

How do I install a Package Manager within Cygwin ?

Though Cygwin provides the ability to update and install packages via the use of the Cygwin`s setup.exe command, the command line installer apt-cyg provides apt-get like syntax whilst still using Cygwin’s native package repository.   Below details the steps required to install the apt-cyg command line installer.   1. UPDATE CYGWIN First of all you … Read more

Link State Tracking

Link State Tracking is a feature (within Cisco Switches) that binds the link state of multiple interfaces. This provides the ability to “down” interfaces based upon the link state of upstream interfaces. The diagram below shows a simple of example of an scenario where link state tracking would be required. As you can see from … Read more

DMVPN Tutorial

Introduction DMVPN (Dynamic Multipoint Virtual Private Network) is a feature within the Cisco IOS based router family which provides the ability to dynamically build IPSEC tunneling between peers based on an evolved iteration of hub and spoke tunneling. DMVPN uses a combination of the following technologies : Multipoint GRE (mGRE) Next-Hop Resolution Protocol (NHRP) Dynamic … Read more

How to enable Indexing within Windows 2008

The Windows 2008 Indexing Options can be located from with the Control Panel. In a number of instances you may find that this is not available or not installed. To install the Windows 2008 Indexing Service follow these steps: Start Server Manager via the Start Menu | Administrative Tools. Click on Roles (left navigation pane). … Read more

/bin/bash^M: bad interpreter: no such file or directory

This is caused by additional carriage returns within your script. In Windows the end of a line is denoted by CRLF (Carriage-Return, Line-Feed). In Unix-like systems, the end of a line is donated by a single LF. This means when you try to run your script, every line has an extra carriage return which in turn causes … Read more

Conditional Execution within Crontab

Conditional execution is a term used to describe the execution of processes or commands based on specfic conditions. This can also be thought of as conditional logic.  Like with most scripting or programming languages conditional logic is built upon the use of return codes. A return code (exit status)  is returned upon process completion to … Read more

Running Java Daemons within Linux

Below is a small method for running Java daemons within Linux. The syntax is as follows: nohup is used so that it doesn’t get killed when user logs off </dev/null is used so that it doesn’t require a command-promt of it’s own & is used so that the Java daemon runs as a background process. … Read more