Followers

stuck in someone's for loop

This is a rant. More and more I'm finding myself using mobile devices, often on my iPhone, but also desktop applications in Windows and I'll push a button and find myself, as user, stuck inside your for loop.
Not Responding
Have you felt like this? The application locks up and you're stuck. Maybe it's Outlook saying Not Responding as the Curtain of Patience (tm) comes down, or perhaps it's Facebook on your iPhone updating Contact photos. Regardless, it's a for loop over a thousand or a million, or perhaps just one more data item than the developer tested, and you're stuck. Do you shut down and corrupt the data store? Do you wait? How long DO you wait?
Asynchronous programming can be hard, but the tools and languages support it, my friends.
Please don't block the UI.
Have you seen this? Why does it happen? What are you doing to avoid blocking calls? Perhaps it's a better UX pattern, or perhaps it's Reactive Programming?

Windows 10 gets a fresh command prompt and lots of hotkeys

Text selection keys

These combinations interoperate with the mouse so you can start selecting with the mouse and continue with one of these commands, or vice versa. 
Selection Key Combination Description
SHIFT + LEFT ARROW Moves the cursor to the left one character, extending the selection.
SHIFT + RIGHT ARROW Moves the cursor to the right one character, extending the selection.
SHIFT + UP ARROW Selects text up line by line starting from the location of the insertion point.
SHIFT + DOWN ARROW Extends text selection down one line, starting at the location of the insertion point.
SHIFT + END If cursor is in current line being edited
* First time extends selection to the last character in the input line.
* Second consecutive press extends selection to the right margin.
Else
Selects text from the insertion point to the right margin.
SHIFT + HOME If cursor is in current line being edited
* First time extends selection to the character immediately after the command prompt.
* Second consecutive press extends selection to the left margin.
Else
Extends selection to the left margin.
SHIFT + PAGE DOWN Extends selection down one screen.
SHIFT + PAGE UP Extends selection up one screen.
CTRL + SHIFT + RIGHT ARROW Extends the selection one word to the right.
CTRL + SHIFT + LEFT ARROW Extends the selection one word to the left.
CTRL + SHIFT + HOME Extend selection to the beginning of the screen buffer.
CTRL + SHIFT + END Extend selection to the end of the screen buffer.
CTRL + A If cursor is in current line being edited (from first typed char to last type char) and line is not empty and any selection cursor is also within the line being edited
Selects all text after the prompt.  (phase 1)
Else
Selects the entire buffer.  (phase 2)

Extra Fun with CTRL + A

CTRL + A behavior is interesting. Regardless of the state of mark mode and quick edit mode, one of two things should happen. Either the entire buffer is selected, or (only in a single case) '2-Phase select' starts.  2-Phase select is the process where the first CTRL-A selects the characters to the right of the edit line prompt, and the second press selects the entire buffer.

Editing keys

As I mentioned above you can copy and paste text with the keyboard. When copying text, you might worry that CTRL + C has always been the BREAK command. This is a nice touch, it will still send the break signal to the running application when no text is selected. The first CTRL-C copies the text and clears the selection, and the second one signals the break. Nice attention to detail, IMHO.
Editing Key Combination Description
CTRL + V Paste text into the command line.
SHIFT + INS Paste text into the command line.
CTRL + C Copy selected text to the clipboard.
CTRL + INS Copy selected text to the clipboard.

Mark mode keys

These keys function in mark mode. You can enter this mode by right-clicking anywhere in the console title bar and choosing Edit->Mark from the context menu as before, or via the new shortcut combination, CTRL-M. In the original console, mark mode resulted in block mode text selection. While in mark mode, you can hold down the ALT key at the start of a text selection command to use block mode in the new console. The selection key combinations above are all available in mark mode. CTRL + SHIFT + ARROW operations select by character and not by word while in mark mode.
Mark Mode Key Combination Description
CTRL + M Enter "Mark Mode" to move cursor within window.
ALT In conjunction with one of the selection key combinations, begins selection in block mode.
ARROW KEYS Move cursor in the direction specified.
PAGE KEYS Move cursor by one page in the direction specified.
CTRL + HOME Move cursor to beginning of buffer.
CTRL + END Move cursor to end of buffer.

History navigation keys

Navigation  Key Combination Description
CTRL + UP ARROW Moves up one line in the output history.
CTRL + DOWN ARROW Moves down one line in the output history.
CTRL + PAGE UP Moves up one page in the output history.
CTRL + PAGE DOWN Moves down one page in the output history.

Other keys

Other Key Combination Description
CTRL + F Opens "Find" in console dialog.
ALT + F4 Close the console window, of course!

Alternative Freeware Applications That Work in Windows 7

Why buy a piece of software when other developers make similar software for free? We’re living in a world where altruistic developers make software for the sake of progressing technology, and we should learn to support these people who attempt to help us save some cash while using a program that can easily cater to our needs. Instead of shelling out cash or resorting to pirating, you can download free alternatives to every application you use, some of which are even open source. Let’s look at the list!

Instead of purchasing Nero – which uses a ton of resources – or Alcohol 120%, have a look at ImgBurn, a piece of freeware that allows you to burn CDs and DVDs in a jiffy.
Unlike its name suggests, ImgBurn is a more comprehensive burning application that allows you to write any data onto a disc. You probably won’t need data writing in Windows 7, but it’s a decent feature if you’re using an older computer at any point. Windows 7 comes with native CD burning capabilities, but no image burning. Windows 8 will add native image burning capabilities to this, rendering this program useless in the new operating system. For now, until you decide to upgrade, you can use ImgBurn for all your burning necessities. Download it here.
So far, we’ve seen very poor examples of possible interaction with the music industry. Unfortunately, companies like Apple and Microsoft have a strong grasp on the music we purchase nowadays, and we’re forced to renounce to song libraries we’ve invested lots of money into whenever they have an issue on their end.
Now, enter the world of SongBird, an application that runs on Android phones, Mac computers, and PCs with Windows.
This application “scours the web” for information on songs you already have, including videos, pictures, and other content that would help you get more detail into your library. The smart engine, however, is just the tip of the iceberg. You can also purchase songs with their marketplace, allowing you to have full rights to listen to the song on your computer. Download this program here.
While Microsoft currently offers network monitoring utilities, they’re not as user-friendly as some home users would hope for. This is where Softperfect Networks comes in. Let’s have a look at the interface:
You can actually monitor your network comprehensively and diagnose it. Give it a try by clicking this link.
When your webcam conversations aren’t as light-hearted as you’d like them to be, you can always use a utility that makes the conversation more interesting. In this day and age, there’s no reason why you shouldn’t have a webcam conversation on Skype while hanging upside down from your ceiling. Of course, there are tools out there that make the process easier for you, so you don’t have to stick your chair to the light fixture.
ManyCam not only helps you edit your webcam presence by flipping your cam around. You can also add funny effects like this:
The software detects your face’s features and puts objects onto them by your preference. If you have a slow computer, this might not work so well, but with a little bit of extra processing power, you’d end up having one of the most enjoyable and funny cam conversations ever! Download the software here. There’s a free version, but you’ll have to pay 50 Euros for the version with extra features. The free version adds effects live, without letting you preview them. It’s not a big deal if you’re just having a conversation with some friends.
 
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Manage Noisy or Overheating Fans with Macs Fan Control [Mac]

Do you have issues with noisy or overheating fans on your Mac? If so, you may be looking for a tool that can help to keep these issues under control. While there are various Mac apps available, you’ll find that the Macs Fan Control app is both effective and easy-to-use.
1. You’ll need to download Macs Fan Control. It’s a free download that is available for Mac OS X and Windows (Boot Camp). In this tutorial, we’re using Macs Fan Control for Mac OS X.

2. Unzip the folder and drag Macs Fan Control.app to your Applications folder.

3. Once you run the application, the Macs Fan Control window will appear on your desktop; you’ll also see its icon on your menu bar.

4. In the Macs Fan Control window, you’ll see the min RPM, current RPM, and max RPM. You can also see see the control status for your fans; it will show “auto” by default.
Right-clicking on one of your fans will let you change the control; you can choose between automatic (controlled by system), constant RPM value (set by you), or sensor-based value (set by you).
Note: RPM = revolutions per minute and is a measure of the frequency of a rotation.

5. If you choose the “Constant RPM value” control option, you will be able to enter your desired RPM value for your fans.
If you choose the “Sensor-based value” option, you can choose a sensor and enter values for the fan speed and maximum temperature.

6. On the right side of the window, you’ll see a column for Temperature Sensors. Temperatures are measured in Celsius, but you can change them to Fahrenheit within Preferences.
To access Preferences, just click on the “Preferences” button under the Temperature Sensors column.
Note: In Preferences, you can also choose to display a specific temperature sensor value or display a fan RPM value next to the menu bar icon.

As you can see, Macs Fan Control provides real-time monitoring of your Mac’s fan speeds and temperatures. It lets you control each fan individually and helps to keep your Mac functional with cool temperatures.
How do you control your Mac’s fans?
 
Published By
 
S.G.Godwin Dinesh.MCA
Sr.System Administrator

20 Linux System Monitoring Tools Every SysAdmin Should Know


Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as:
  1. Finding out bottlenecks.
  2. Disk (storage) bottlenecks.
  3. CPU and memory bottlenecks.
  4. Network bottlenecks.

#1: top - Process Activity Command

The top program provides a dynamic real-time view of a running system i.e. actual process activity. By default, it displays the most CPU-intensive tasks running on the server and updates the list every five seconds.
Fig.01: Linux top command
Fig.01: Linux top command

Commonly Used Hot Keys

The top command provides several useful hot keys:
Hot KeyUsage
tDisplays summary information off and on.
mDisplays memory information off and on.
ASorts the display by top consumers of various system resources. Useful for quick identification of performance-hungry tasks on a system.
fEnters an interactive configuration screen for top. Helpful for setting up top for a specific task.
oEnables you to interactively select the ordering within top.
rIssues renice command.
kIssues kill command.
zTurn on or off color/mono

=> Related: How do I Find Out Linux CPU Utilization?

#2: vmstat - System Activity, Hardware and System Information

The command vmstat reports information about processes, memory, paging, block IO, traps, and cpu activity.
# vmstat 3
Sample Outputs:
procs -----------memory---------- ---swap-- -----io---- --system-- -----cpu------
 r  b   swpd   free   buff  cache   si   so    bi    bo   in   cs us sy id wa st
 0  0      0 2540988 522188 5130400    0    0     2    32    4    2  4  1 96  0  0
 1  0      0 2540988 522188 5130400    0    0     0   720 1199  665  1  0 99  0  0
 0  0      0 2540956 522188 5130400    0    0     0     0 1151 1569  4  1 95  0  0
 0  0      0 2540956 522188 5130500    0    0     0     6 1117  439  1  0 99  0  0
 0  0      0 2540940 522188 5130512    0    0     0   536 1189  932  1  0 98  0  0
 0  0      0 2538444 522188 5130588    0    0     0     0 1187 1417  4  1 96  0  0
 0  0      0 2490060 522188 5130640    0    0     0    18 1253 1123  5  1 94  0  0

Display Memory Utilization Slabinfo

# vmstat -m

Get Information About Active / Inactive Memory Pages

# vmstat -a
=> Related: How do I find out Linux Resource utilization to detect system bottlenecks?

#3: w - Find Out Who Is Logged on And What They Are Doing

w command displays information about the users currently on the machine, and their processes.
# w username
# w vivek

Sample Outputs:
 17:58:47 up 5 days, 20:28,  2 users,  load average: 0.36, 0.26, 0.24
USER     TTY      FROM              LOGIN@   IDLE   JCPU   PCPU WHAT
root     pts/0    10.1.3.145       14:55    5.00s  0.04s  0.02s vim /etc/resolv.conf
root     pts/1    10.1.3.145       17:43    0.00s  0.03s  0.00s w

#4: uptime - Tell How Long The System Has Been Running

The uptime command can be used to see how long the server has been running. The current time, how long the system has been running, how many users are currently logged on, and the system load averages for the past 1, 5, and 15 minutes.
# uptime
Output:
 18:02:41 up 41 days, 23:42,  1 user,  load average: 0.00, 0.00, 0.00
1 can be considered as optimal load value. The load can change from system to system. For a single CPU system 1 - 3 and SMP systems 6-10 load value might be acceptable.

#5: ps - Displays The Processes

ps command will report a snapshot of the current processes. To select all processes use the -A or -e option:
# ps -A
Sample Outputs:
  PID TTY          TIME CMD
    1 ?        00:00:02 init
    2 ?        00:00:02 migration/0
    3 ?        00:00:01 ksoftirqd/0
    4 ?        00:00:00 watchdog/0
    5 ?        00:00:00 migration/1
    6 ?        00:00:15 ksoftirqd/1
....
.....
 4881 ?        00:53:28 java
 4885 tty1     00:00:00 mingetty
 4886 tty2     00:00:00 mingetty
 4887 tty3     00:00:00 mingetty
 4888 tty4     00:00:00 mingetty
 4891 tty5     00:00:00 mingetty
 4892 tty6     00:00:00 mingetty
 4893 ttyS1    00:00:00 agetty
12853 ?        00:00:00 cifsoplockd
12854 ?        00:00:00 cifsdnotifyd
14231 ?        00:10:34 lighttpd
14232 ?        00:00:00 php-cgi
54981 pts/0    00:00:00 vim
55465 ?        00:00:00 php-cgi
55546 ?        00:00:00 bind9-snmp-stat
55704 pts/1    00:00:00 ps
ps is just like top but provides more information.

Show Long Format Output

# ps -Al
To turn on extra full mode (it will show command line arguments passed to process):
# ps -AlF

To See Threads ( LWP and NLWP)

# ps -AlFH

To See Threads After Processes

# ps -AlLm

Print All Process On The Server

# ps ax
# ps axu

Print A Process Tree

# ps -ejH
# ps axjf
# pstree

Print Security Information

# ps -eo euser,ruser,suser,fuser,f,comm,label
# ps axZ
# ps -eM

See Every Process Running As User Vivek

# ps -U vivek -u vivek u

Set Output In a User-Defined Format

# ps -eo pid,tid,class,rtprio,ni,pri,psr,pcpu,stat,wchan:14,comm
# ps axo stat,euid,ruid,tty,tpgid,sess,pgrp,ppid,pid,pcpu,comm
# ps -eopid,tt,user,fname,tmout,f,wchan

Display Only The Process IDs of Lighttpd

# ps -C lighttpd -o pid=
OR
# pgrep lighttpd
OR
# pgrep -u vivek php-cgi

Display The Name of PID 55977

# ps -p 55977 -o comm=

Find Out The Top 10 Memory Consuming Process

# ps -auxf | sort -nr -k 4 | head -10

Find Out top 10 CPU Consuming Process

# ps -auxf | sort -nr -k 3 | head -10

#6: free - Memory Usage

The command free displays the total amount of free and used physical and swap memory in the system, as well as the buffers used by the kernel.
# free
Sample Output:
            total       used       free     shared    buffers     cached
Mem:      12302896    9739664    2563232          0     523124    5154740
-/+ buffers/cache:    4061800    8241096
Swap:      1052248          0    1052248
=> Related: :
  1. Linux Find Out Virtual Memory PAGESIZE
  2. Linux Limit CPU Usage Per Process
  3. How much RAM does my Ubuntu / Fedora Linux desktop PC have?

#7: iostat - Average CPU Load, Disk Activity

The command iostat report Central Processing Unit (CPU) statistics and input/output statistics for devices, partitions and network filesystems (NFS).
# iostat
Sample Outputs:
Linux 2.6.18-128.1.14.el5 (www03.nixcraft.in)  06/26/2009
avg-cpu:  %user   %nice %system %iowait  %steal   %idle
           3.50    0.09    0.51    0.03    0.00   95.86
Device:            tps   Blk_read/s   Blk_wrtn/s   Blk_read   Blk_wrtn
sda              22.04        31.88       512.03   16193351  260102868
sda1              0.00         0.00         0.00       2166        180
sda2             22.04        31.87       512.03   16189010  260102688
sda3              0.00         0.00         0.00       1615          0
=> Related: : Linux Track NFS Directory / Disk I/O Stats

#8: sar - Collect and Report System Activity

The sar command is used to collect, report, and save system activity information. To see network counter, enter:
# sar -n DEV | more
To display the network counters from the 24th:
# sar -n DEV -f /var/log/sa/sa24 | more
You can also display real time usage using sar:
# sar 4 5
Sample Outputs:
Linux 2.6.18-128.1.14.el5 (www03.nixcraft.in)   06/26/2009
06:45:12 PM       CPU     %user     %nice   %system   %iowait    %steal     %idle
06:45:16 PM       all      2.00      0.00      0.22      0.00      0.00     97.78
06:45:20 PM       all      2.07      0.00      0.38      0.03      0.00     97.52
06:45:24 PM       all      0.94      0.00      0.28      0.00      0.00     98.78
06:45:28 PM       all      1.56      0.00      0.22      0.00      0.00     98.22
06:45:32 PM       all      3.53      0.00      0.25      0.03      0.00     96.19
Average:          all      2.02      0.00      0.27      0.01      0.00     97.70
=> Related: : How to collect Linux system utilization data into a file

#9: mpstat - Multiprocessor Usage

The mpstat command displays activities for each available processor, processor 0 being the first one. mpstat -P ALL to display average CPU utilization per processor:
# mpstat -P ALL
Sample Output:
Linux 2.6.18-128.1.14.el5 (www03.nixcraft.in)   06/26/2009
06:48:11 PM  CPU   %user   %nice    %sys %iowait    %irq   %soft  %steal   %idle    intr/s
06:48:11 PM  all    3.50    0.09    0.34    0.03    0.01    0.17    0.00   95.86   1218.04
06:48:11 PM    0    3.44    0.08    0.31    0.02    0.00    0.12    0.00   96.04   1000.31
06:48:11 PM    1    3.10    0.08    0.32    0.09    0.02    0.11    0.00   96.28     34.93
06:48:11 PM    2    4.16    0.11    0.36    0.02    0.00    0.11    0.00   95.25      0.00
06:48:11 PM    3    3.77    0.11    0.38    0.03    0.01    0.24    0.00   95.46     44.80
06:48:11 PM    4    2.96    0.07    0.29    0.04    0.02    0.10    0.00   96.52     25.91
06:48:11 PM    5    3.26    0.08    0.28    0.03    0.01    0.10    0.00   96.23     14.98
06:48:11 PM    6    4.00    0.10    0.34    0.01    0.00    0.13    0.00   95.42      3.75
06:48:11 PM    7    3.30    0.11    0.39    0.03    0.01    0.46    0.00   95.69     76.89
=> Related: : Linux display each multiple SMP CPU processors utilization individually.

#10: pmap - Process Memory Usage

The command pmap report memory map of a process. Use this command to find out causes of memory bottlenecks.
# pmap -d PID
To display process memory information for pid # 47394, enter:
# pmap -d 47394
Sample Outputs:
47394:   /usr/bin/php-cgi
Address           Kbytes Mode  Offset           Device    Mapping
0000000000400000    2584 r-x-- 0000000000000000 008:00002 php-cgi
0000000000886000     140 rw--- 0000000000286000 008:00002 php-cgi
00000000008a9000      52 rw--- 00000000008a9000 000:00000   [ anon ]
0000000000aa8000      76 rw--- 00000000002a8000 008:00002 php-cgi
000000000f678000    1980 rw--- 000000000f678000 000:00000   [ anon ]
000000314a600000     112 r-x-- 0000000000000000 008:00002 ld-2.5.so
000000314a81b000       4 r---- 000000000001b000 008:00002 ld-2.5.so
000000314a81c000       4 rw--- 000000000001c000 008:00002 ld-2.5.so
000000314aa00000    1328 r-x-- 0000000000000000 008:00002 libc-2.5.so
000000314ab4c000    2048 ----- 000000000014c000 008:00002 libc-2.5.so
.....
......
..
00002af8d48fd000       4 rw--- 0000000000006000 008:00002 xsl.so
00002af8d490c000      40 r-x-- 0000000000000000 008:00002 libnss_files-2.5.so
00002af8d4916000    2044 ----- 000000000000a000 008:00002 libnss_files-2.5.so
00002af8d4b15000       4 r---- 0000000000009000 008:00002 libnss_files-2.5.so
00002af8d4b16000       4 rw--- 000000000000a000 008:00002 libnss_files-2.5.so
00002af8d4b17000  768000 rw-s- 0000000000000000 000:00009 zero (deleted)
00007fffc95fe000      84 rw--- 00007ffffffea000 000:00000   [ stack ]
ffffffffff600000    8192 ----- 0000000000000000 000:00000   [ anon ]
mapped: 933712K    writeable/private: 4304K    shared: 768000K
The last line is very important:
  • mapped: 933712K total amount of memory mapped to files
  • writeable/private: 4304K the amount of private address space
  • shared: 768000K the amount of address space this process is sharing with others
=> Related: : Linux find the memory used by a program / process using pmap command

#11 and #12: netstat and ss - Network Statistics

The command netstat displays network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. ss command is used to dump socket statistics. It allows showing information similar to netstat. See the following resources about ss and netstat commands:

#13: iptraf - Real-time Network Statistics

The iptraf command is interactive colorful IP LAN monitor. It is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others. It can provide the following info in easy to read format:
  • Network traffic statistics by TCP connection
  • IP traffic statistics by network interface
  • Network traffic statistics by protocol
  • Network traffic statistics by TCP/UDP port and by packet size
  • Network traffic statistics by Layer2 address
Fig.02: General interface statistics: IP traffic statistics by network interface
Fig.02: General interface statistics: IP traffic statistics by network interface
Fig.03 Network traffic statistics by TCP connection
Fig.03 Network traffic statistics by TCP connection

#14: tcpdump - Detailed Network Traffic Analysis

The tcpdump is simple command that dump traffic on a network. However, you need good understanding of TCP/IP protocol to utilize this tool. For.e.g to display traffic info about DNS, enter:
# tcpdump -i eth1 'udp port 53'
To display all IPv4 HTTP packets to and from port 80, i.e. print only packets that contain data, not, for example, SYN and FIN packets and ACK-only packets, enter:
# tcpdump 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2 -="" amp="" tcp="" xf0="">>2)) != 0)'
To display all FTP session to 202.54.1.5, enter:
# tcpdump -i eth1 'dst 202.54.1.5 and (port 21 or 20'
To display all HTTP session to 192.168.1.5:
# tcpdump -ni eth0 'dst 192.168.1.5 and tcp and port http'
Use wireshark to view detailed information about files, enter:
# tcpdump -n -i eth1 -s 0 -w output.txt src or dst port 80

#15: strace - System Calls

Trace system calls and signals. This is useful for debugging webserver and other server problems. See how to use to trace the process and see What it is doing.

#16: /Proc file system - Various Kernel Statistics

/proc file system provides detailed information about various hardware devices and other Linux kernel information. See Linux kernel /proc documentations for further details. Common /proc examples:
# cat /proc/cpuinfo
# cat /proc/meminfo
# cat /proc/zoneinfo
# cat /proc/mounts


17#: Nagios - Server And Network Monitoring

Nagios is a popular open source computer system and network monitoring application software. You can easily monitor all your hosts, network equipment and services. It can send alert when things go wrong and again when they get better. FAN is "Fully Automated Nagios". FAN goals are to provide a Nagios installation including most tools provided by the Nagios Community. FAN provides a CDRom image in the standard ISO format, making it easy to easilly install a Nagios server. Added to this, a wide bunch of tools are including to the distribution, in order to improve the user experience around Nagios.

18#: Cacti - Web-based Monitoring Tool

Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use interface that makes sense for LAN-sized installations up to complex networks with hundreds of devices. It can provide data about network, CPU, memory, logged in users, Apache, DNS servers and much more. See how to install and configure Cacti network graphing tool under CentOS / RHEL.

#19: KDE System Guard - Real-time Systems Reporting and Graphing

KSysguard is a network enabled task and system monitor application for KDE desktop. This tool can be run over ssh session. It provides lots of features such as a client/server architecture that enables monitoring of local and remote hosts. The graphical front end uses so-called sensors to retrieve the information it displays. A sensor can return simple values or more complex information like tables. For each type of information, one or more displays are provided. Displays are organized in worksheets that can be saved and loaded independently from each other. So, KSysguard is not only a simple task manager but also a very powerful tool to control large server farms.
Fig.05 KDE System Guard
Fig.05 KDE System Guard {Image credit: Wikipedia}
See the KSysguard handbook for detailed usage.

#20: Gnome System Monitor - Real-time Systems Reporting and Graphing

The System Monitor application enables you to display basic system information and monitor system processes, usage of system resources, and file systems. You can also use System Monitor to modify the behavior of your system. Although not as powerful as the KDE System Guard, it provides the basic information which may be useful for new users:
  • Displays various basic information about the computer's hardware and software.
  • Linux Kernel version
  • GNOME version
  • Hardware
  • Installed memory
  • Processors and speeds
  • System Status
  • Currently available disk space
  • Processes
  • Memory and swap space
  • Network usage
  • File Systems
  • Lists all mounted filesystems along with basic information about each.
Fig.06 The Gnome System Monitor application
Fig.06 The Gnome System Monitor application

Bonus: Additional Tools

A few more tools:
  • nmap - scan your server for open ports.
  • lsof - list open files, network connections and much more.
  • ntop web based tool - ntop is the best tool to see network usage in a way similar to what top command does for processes i.e. it is network traffic monitoring software. You can see network status, protocol wise distribution of traffic for UDP, TCP, DNS, HTTP and other protocols.
  • Conky - Another good monitoring tool for the X Window System. It is highly configurable and is able to monitor many system variables including the status of the CPU, memory, swap space, disk storage, temperatures, processes, network interfaces, battery power, system messages, e-mail inboxes etc.
  • GKrellM - It can be used to monitor the status of CPUs, main memory, hard disks, network interfaces, local and remote mailboxes, and many other things.
  • vnstat - vnStat is a console-based network traffic monitor. It keeps a log of hourly, daily and monthly network traffic for the selected interface(s).
  • htop - htop is an enhanced version of top, the interactive process viewer, which can display the list of processes in a tree form.
  • mtr - mtr combines the functionality of the traceroute and ping programs in a single network diagnostic tool.
Did I miss something? Please add your favorite system motoring tool in the comments.
 
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator
 

20 Windows Tools Every SysAdmin Should Know


1. Task Manager – CPU and memory usage

Everyone that deals with Windows in a system administrator capacity has to know about Task Manager.  The nice thing is it keeps getting better with each new version of Windows.
The screenshots below show Task Manager from Windows 2008 R2.  To make sure you see everything, click the button (a check box in older versions) in the lower left corner.
task manager processes
The Processes tab is probably the most useful.  Here you can see the list of running processes, how much memory and CPU each process is using, the user account the process is running under and more.
In addition, you can click View -> Select Columns… to show even more information, such as the Session ID a process is in, the full path to the executable, how much virtual memory the process has allocated, and more.  One stop system administrator goodness :)
But wait, there's more!
The Performance tab gives some nice charts of CPU utilization.  You can also see total memory, kernel memory, etc.
task manager performance
A low amount of Free memory is not a bad thing — it often means Windows is using your RAM to cache parts of the hard disk, thus speeding up many operations.  If the RAM is needed, the caches will give it back.
One of the best kept secrets, the Resource Monitor, is also accessible from here.

 

2. Resource monitor – high level disk I/O tracking

Have you ever been using a computer or server and noticed it get really sluggish?  Sometimes you can hear the disk thrashing and know that some process is busier than you want it to be.  If you're lucky, you can check Task Manager and sort by CPU to see which process is using a lot of CPU.  But in many cases, the offending process is doing very little with CPU because it's so busy thrashing the disk.  Resource Monitor lets you find the culprit.
 
windows resource monitor
Start the Resource Monitor and click the Disk tab.  Expand the "Processes with Disk Activity" drop down.  Sort the list by the "Total (B/sec)" column to quickly see which process is so busy.  To further understand what is happening, you can expand the "Disk Activity" drop down and sort that list by "Total (B/sec)".  Looking at the file names will sometimes give a hint about whether the process is doing a backup, writing to a log file, or some other activity.

 

3. Performance Monitor (aka Perfmon)

Performance Monitor is a real gem on Windows, and many IT folks would benefit by becoming more comfortable with it.  The operating system publishes many useful stats here (active database connections, active HTTP connections, CPU usage, time per disk read, network usage, process memory, etc).  In addition, other application providers can also include stats, and most (all?) of Microsoft’s major apps do, like IIS, MS SQL Server and Exchange.
When you first start perfmon.exe or perfmon.msc (they’re the same), it’s not much to look at.  Make sure to click the “Performance Monitor” node, and then the green plus symbol to add counters to watch.
windows performance monitor
There are sooo many counters that can be monitored that this article can't even begin to cover them.  One thing that will help though – when you’re looking at the list of counters, check the “Show description” box at the bottom left corner – this helps you understand what the selected counter does.
Also note that Perfmon can connect to other computers on your network and display their counter values.
(Side note, there is a compiled list of typical counters to monitor for Microsoft Exchange at:
http://www.poweradmin.com/help/latestSMHelp.aspx?page=howto_monitor_exchange.aspx )


 

4. Services

The Services applet (services.msc — it’s the gear looking thingy in Administrator Tools) is where you can control the service processes that are running on Windows.  Of particular interest to IT admins is the service’s start up type (usually automatic or manual) and the Log On As account.
windows services applet
'Recovery' is a cool under-used feature. Right click a service and go to Properties.  Here you can tell Windows what it should do if the service stops unexpectedly (crashes).  Restarting the service is often a good option.
Service Crash Recovery

 

5. Event Log Viewer – system logs, errors and events

The Windows Event Log Viewer shows a wealth of information about problems that might be happening on a server, including hardware errors, server restarts and more.  The Application and System logs are typically where you'll find what you're looking for, but there are more logs than that on modern Windows.  If you have a blue screen, a server hang, or an application misbehaving, look in the Event Log first.
Event Log Viewer

 

6. PsExec – start apps on remote computers

PsExec is not an app that comes with Windows, but it’s a free utility from Microsoft (originally from Sysinternals) that lets you start apps on a remote computer.
Microsoft PsExec
In the simple example above, PsExec was started locally, to run ipconfig on a remote computer (‘archive’) to find out what gateway it is using.  PsExec can be very handy in many situations. If you need a redistributable PsExec, take a look at PAExec.

 

7. Process Monitor – low level file I/O and registry spying

Another beauty from Microsoft (Sysinternals) is Process Monitor.  From the web page: Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity.”
Process Monitor
The power is in the filtering – you can have it show you only registry access to a particular key, or file I/O operations taking place in a specific folder, or from a specific program.  It’s a great help when something ought to work but doesn’t because you can (for example) see where a file or registry read is failing.

 

8. Task Scheduler

Unix has its cron, and Windows has Task Scheduler.  (Well, Windows also has ‘at’, but that’s another story).  Task Scheduler can be found in Administrator Tools, or started via taskschd.msc.
Task Scheduler
From the screenshot, you can see that various companies (Google and Adobe for example) will create scheduled tasks so their applications are launched periodically for some background processing.  Windows itself has many tasks it uses.  And of course, you can easily create your own.  One simple example is to compress and/or move log files.  Or run a periodic database cleanup script. Or to check for updates. Or ….

 

9. netstat – view network connections

Being familiar with netstat signals you’re no mere hobbyist, but a serious IT professional.  Netstat shows the status of current network connections – run it without any command line arguments and that’s what you’ll see.
To see connections along with the process that created them, run netstat –b.  To see current connections as well as ports that are listening for incoming connections, run netstat –ab as shown below:
Windows Netstat
Note that the process involved with the port is shown below the port information.  So mysqld is listening on port 3306, not 3389.

 

10. Wireshark – view network packets

If you ever need to see network packets entering and leaving a computer, look no further than Wireshark.  This is a fantastic piece of free software that will capture every packet, and even better, break each one down into its appropriate protocol headers and content.  Below I’ve clicked a packet for an HTTP 302 redirect message coming in from a web server.
Wireshark View Network Packets
The documentation is great, and once you get the hang of it, you can spy on all of the applications on your computer, see what servers they are talking too, and what information is being sent and received.


 

11. RegEdit – configure all the things!

Anyone that’s been in IT for long surely must have peaked at their registry.  This is where most of the configuration data for most apps and most of the operating system still lives, even in 2013.
RegEdit Registry Editor
One handy feature is you can export and import branches of the registry.  BUT, do NOT do this if you’re not absolutely sure what you’re doing.  This can REALLY screw up your machine.  Also note, I’ve not seen it documented, but you can export files that are bigger than what the importer will read in (IIRC, the importer will only read the first 64KB or so of a registry file).

 

12. Server Monitoring

If you have more than one or two servers to keep track of, automate the monitoring of those servers so you don’t have to sit and babysit them.  There are many good products on the market, all of which will monitor for low disk space, high CPU usage, event log errors, crashed services and more.  We're partial to PA Server Monitor, but GFI and SolarWinds also make nice products.
Server Monitoring Software
If you like low-level control with scripts and config files to spelunk through, Nagios is a very popular (and free) open source product that is very well respected. Open Source Server Monitor List tries to collect all of the big names in open source monitoring.

 

13. Password Management

If you’re in IT, it’s very likely you have the keys to the kingdom, so to speak.  Please, oh please, don’t store your passwords in a text file or Excel spreadsheet.  And do make them long, with non-alphanumeric characters thrown in.  This will help keep your systems safe.  But then you have passwords that you can’t remember.  So you need a password manager.  KeePass and LastPass are two excellent open source solutions you should consider.

 

14. Ping and tracert – simple connectivity test

Ping is a quick test to check and see if:

  • A connection to the target is IP address is possible
  • How fast the connection is (in milliseconds)
  • How stable the connection is (i.e. were packets dropped)
Simply run:  ping.exe google.com
Windows Ping.exe
A bit more interesting is tracert (trace route).  This uses a bunch of ping packets to detect each computer between you and the target server, and lists how long each hop is.  This can help diagnose where a network link is down, or maybe a routing problem.
Here you can see the route packets take from an example PC to google.com:
Windows Tracert (Trace Route)
There are some neat visual trace route tools on the Internet that display the different network hops on a map.  A quick Google search will show you a list of them.
Be sure to run -? after both of the commands above to see the various command line options that are also useful.

 

15. net.exe and sc.exe

Need to stop a service but don’t want to launch services.msc, wait for the service list to load, find the service, and press the stop button?  Net.exe to the rescue!
Services have a short "service name" and a more descriptive "display name".  Either can be used with the net.exe command.  If using the display name (which usually contains spaces), enclose it in quotes.  In the example below I’ve stopped and started the Windows Update service.
Net.exe and SC.exe
Another handy command is the sc.exe (Service Control) command – it lets you install, remove, and query services.  Just run “sc.exe query” to get a quick list of all the services on the computer and the current status.

 

16. Notepad++ – for viewing large log files

Opening a 100MB log file in Notepad is a pain.  WordPad is slightly quicker, but it can’t open files that are currently being written to (as many log files are).  Notepad++ handles large files with ease.  One great feature is the “Find All in Current Document”.  In this contrived example, we're looking for all requests in an IIS log file that came from 192.168.7.37.  Piece of cake – they’re all shown together.  You can also mark matching lines, etc.  And did I mention it can open huge files without breaking a sweat?  Huge fan here!
Notepad++

 

17. Remote Desktop

Remote Desktop apps are life savers when you need to look at a server and don’t want to walk into the server room.  Windows Remote Desktop app (aka RDP) is great.  There are RDP clients for Linux, OSX and even the iPhone (and probably more than that).  You might have known that you can copy/paste text, URLs, etc. from the remote desktop to your workstation and vice versa.  But did you know you can also copy/paste files as a simple form of remote file copy?  Very useful.

 

18. Speedfan – server temperature display

There aren’t many good ways to see a server’s internal hardware temperatures, even though most motherboards have built-in temperature probes.  SpeedFan is a great utility that can read those probes and display them in a simple user interface.  If you want to access those temperatures from across the network, use Power Admin’s free SpeedFan HTTP Agent app.
Speedfan Server Temperature Display
Please note: There are a few reports of server blue screens with SpeedFan, particularly on Dell hardware, so try it out on a staging server before putting it on the production server.
Which leads us to…

 

19. Blue screen crash analysis

If you’ve got a server crashing, there is a cool service by OSR where you can upload the crash dump file and their system will do a quick automated review of the crash dump and give you a starting point for the cause of the crash (hopefully even showing the offending driver that was involved).
How do you use their service?  Configure Windows to create a crash dump of course!
Go to Start and right-click on My Computer and choose Properties. From there, choose the “Advanced System Settings” link.  This will lead you to the System Properties dialog below:
System Properties - Blue Screen Crash Analysis
The Settings button will show this dialog
System Properties Settings
Choose the memory dump type (which controlls how much data is dumped). Depending how much RAM you have, a Kernel memory dump may be too large for the free OSR service. So you may need to choose the Small Memory dump option.
You can also see where the dump file will be written, which in this case is C:\Windows\MEMORY.DMP.  Often this will already be configured and the MEMORY.DMP file is out there waiting for you. NOTE: When choosing a Kernel memory dump, you specify the file to save to.  When choosing a Small Memory dump, you specify the folder where the dump will be stored.
This .DMP file is what you zip and upload to the OSR page for analysis:
http://www.osronline.com/page.cfm?name=analyze
Memory.dmp File Analysis

 

20. That’s all!

Your suggestion here!
OK, we cheated, there are only 19! :) What do you recommend for #20?

How to fix : The Recycle Bin C:\ is corrupted. Do you want to empty the Recycle Bin for this drive.

 Error Message :


Solution :

1.   Login with Administrator > Click Start button and type cmd
2.    At the command prompt enter the following line and press Enter:
 rd /s c:\$recycle.bin



3.    When prompted to confirm the deletion type Y and press Enter to confirm.
4.    Close the command prompt window and restart the PC.
A new recycle directory will have been created.

Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

How to Install and configure sendmail for Windows Task Scheduler

Easy way to install and configure sendmail on windows machine.

If you want using send mail on windows without installing  smtp server
you can done it, fallow below step and done process.

Requirement :

1. Windows 7/vista , 2003/2008 server
2. sendEmail-v156-notls.zip or above ( download to this link
    http://caspian.dotconf.net/menu/Software/SendEmail/ )

Put the zip file where you want like C:\sendEmail-v156-notls.zip
extract this  and rename folder name : sendEmail-v156-notls to sendmail

c:\sendmail

Add event :
Got o Event Viewer > Task Scheduler > Operational > right click on alert massage and attached task to this event




 
Program/script: click on browse and select sendEmail.exe
C:\sendmail\sendEmail.exe
Add arguments(optional) :
-f abc@zyx.com -t abc@xyz.com -u Subject -m Task start Failed! -s mail.abc.com:25 -xu abc@xyz.com -xp password
Send multiple mail :
-f abc@zyx.com -t abc@xyz.com  -t alina@xyz.com -u Subject -m Task start Failed! -s mail.abc.com:25 -xu abc@xyz.com -xp password

 
click next and finish configuration!
 
 
 
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator
 
 
 
 
 

VPN configuration and installation in Windows Server 2012 R2


Getting Started Wizard

How to Install VPN on Windows Server 2012 R2

This post shows you how you can install a VPN Server on Windows Server 2012 R2 Step-by-Step. It shows you how you can easily setup a VPN server fro a small environment or for a hosted server scenario.
This is definitely not a guide for an enterprise deployment, if you are thinking about a enterprise deployment you should definitely have a look at Direct Access.
I already did a similar post on Windows Server 2008 R2 and Windows Server 2012.
First install the “Remote Access” via Server Manager or Windows PowerShell.
Remote Access
















Select the “DirectAccess and VPN (RAS)” role services.

DirectAccess and VPN (RAS)
On the next steps just use the default settings. After that you can have a look at the Overview screen and install the role.
Remote Access Installtion Confirmation
After the features are installed, which can take a while to finish you see the link for the Getting Started Wizard. Click on “Open the Getting Started Wizard“.
Getting Started Wizard
This opens a new wizard which will help you to configure the server. On the first screen select “Deploy VPN only“.
Deploy VPN
This opens the Routing and Remote Access MMC
Routing and Remote Access MMC
Right click on the Server name and click on “Configure and Enable Routing and Remote Access“.
Configure and Enable Routing and Remote Access
On the new wizard select “Custom configuration“.
Custom VPN Configuration
Select “VPN Access“.
VPN Access
After you have click finish you can now start the Routing and Remote Access service.
Start Rotuing adn Remote Access Service
If you have an other firewall between the internet and your Windows Server you have to open the following Firewall port sand forward them to your Windows Server:
For PPTP: 1723 TCP and Protocol 47 GRE (also known as PPTP Pass-through)
For L2TP over IPSEC: 1701 TCP and 500 UDP
For SSTP: 443 TCP
After the installation Users have to be enabled for Remote Access to connect to your VPN Server. On a standalone server this can be done in the Computer Management MMC, in a domain environment this can be done in the user properties of an Active Directory user.
Allow Remote VPN Access for User
If you don’t have a DHCP Server in your environment you have to add a static IP address pool. This is often needed if you have a single server hosted at a service provider. In the properties of your VPN server you can click on the IPv4 tab and enable and configure the “Static address pool”.
static address pool
You now have to add a IP address from the same subnet as your static address pool to the network interface of your server, so users can access the server.
I hope this helps you to setup a VPN server in a small environment, lab or hosted server.
Tags.
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

What Is Virtualization? and its Advantages


Virtualization addresses IT’s most pressing challenge: the infrastructure sprawl that compels IT departments to channel 70 percent of their budget into maintenance, leaving scant resources for business-building innovation.
The difficulty stems from the architecture of today’s X86 computers: they’re designed to run just one operating system and application at a time. As a result, even small data centers have to deploy many servers, each operating at just five percent to 15 percent of capacity—highly inefficient by any standard.
Virtualization software solves the problem by enabling several operating systems and applications to run on one physical server or “host.” Each self-contained “virtual machine” is isolated from the others, and uses as much of the host’s computing resources as it requires.


VMware Advantages
  • The most mature, proven, and comprehensive platform. VMware vSphere is fifth-generation virtualization—many years ahead of any alternative. It delivers higher reliability, more advanced capabilities, and greater performance than competing solutions. VMware’s virtualization pre-eminence is recognized universally by analysts and overwhelmingly by the marketplace.
  • High application availability. Purchased separately, high-availability infrastructure remains complex and expensive. But VMware integrates robust availability and fault tolerance right into our platform to protect all your virtualized applications. Should a node or server ever fail, all its VMs are automatically restarted on another machine, with no downtime or data loss.
  • Wizard-based guides for ease of installation. VMware’s wizard-based guides take the complexity out of setup and configuration. You can be up and running in one-third the deployment time of other solutions.
  • Simple, streamlined management. VMware lets you administer both your virtual and physical environments from a “single pane of glass” console right on your web browser. Time-saving features such as auto-deploy, dynamic patching, and live VM migration reduce routine tasks from hours to minutes. Management becomes much faster and easier, boosting productivity without adding to your head count.
  • Higher reliability and performance. Our platform blends CPU and memory innovations with a compact, purpose-built hypervisor that eliminates the frequent patching, maintenance and I/O bottlenecks of other platforms. The net result is best-in-class reliability and consistently higher performance; for heavy workloads, VMware achieves 2-to-1 and 3-to-1 performance advantages over our nearest competitors.
  • Superior security. VMware’s hypervisor is far thinner than any rival, consuming just 144 MB compared with others’ 3-to-10 GB disk profile. Our small hypervisor footprint presents a tiny, well-guarded attack surface to external threats, for airtight security and much lower intrusion risk.
  • Greater savings. VMware trumps other virtualization solutions by providing 50 percent to 70 percent higher VM density per host—elevating per-server utilization rates from 15 percent to as high as 80 percent. You can run many more applications on much less hardware than with other platforms, for significantly greater savings in capital and operating costs.
  • Affordability. VMware is highest in capabilities, but not cost. Starting at $165 per server, our small business packages consolidate more of your applications on fewer servers, with greater performance—delivering the industry’s lowest total cost of ownership (TCO).
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator


Virtualization addresses IT’s most pressing challenge: the infrastructure sprawl that compels IT departments to channel 70 percent of their budget into maintenance, leaving scant resources for business-building innovation.
The difficulty stems from the architecture of today’s X86 computers: they’re designed to run just one operating system and application at a time. As a result, even small data centers have to deploy many servers, each operating at just five percent to 15 percent of capacity—highly inefficient by any standard.
Virtualization software solves the problem by enabling several operating systems and applications to run on one physical server or “host.” Each self-contained “virtual machine” is isolated from the others, and uses as much of the host’s computing resources as it requires.
- See more at: http://www.vmware.com/virtualization/virtualization-basics/what-is-virtualization.html#sthash.fy2jTZC0.dpuf
Virtualization addresses IT’s most pressing challenge: the infrastructure sprawl that compels IT departments to channel 70 percent of their budget into maintenance, leaving scant resources for business-building innovation.
The difficulty stems from the architecture of today’s X86 computers: they’re designed to run just one operating system and application at a time. As a result, even small data centers have to deploy many servers, each operating at just five percent to 15 percent of capacity—highly inefficient by any standard.
Virtualization software solves the problem by enabling several operating systems and applications to run on one physical server or “host.” Each self-contained “virtual machine” is isolated from the others, and uses as much of the host’s computing resources as it requires.
- See more at: http://www.vmware.com/virtualization/virtualization-basics/what-is-virtualization.html#sthash.fy2jTZC0.dpuf
Virtualization addresses IT’s most pressing challenge: the infrastructure sprawl that compels IT departments to channel 70 percent of their budget into maintenance, leaving scant resources for business-building innovation.
The difficulty stems from the architecture of today’s X86 computers: they’re designed to run just one operating system and application at a time. As a result, even small data centers have to deploy many servers, each operating at just five percent to 15 percent of capacity—highly inefficient by any standard.
Virtualization software solves the problem by enabling several operating systems and applications to run on one physical server or “host.” Each self-contained “virtual machine” is isolated from the others, and uses as much of the host’s computing resources as it requires.
- See more at: http://www.vmware.com/virtualization/virtualization-basics/what-is-virtualization.html#sthash.fy2jTZC0.dpuf