Date time formatting in PHP
Many scripts written in php need date and time function . PHP has many predfined date formats and you can also customized it as per your need .
Here are some of the date format examples and additional details for php.
How to configure passwordless ssh &sftp access in Unix & Linux systems? Follow these simple steps with examples with a basic troubleshooting section at the end. sftp uses underlaying ssh access for authentication and after you establish passwordless ssh access you will have passwordless sftp access as well.
This a real life example of configuring passwordless access for two users . The user ‘web’ in this case needs a secure password less access to another user james in a server ‘devserver’
NISplus is network which allows you to store client information at a
central place where all the clients have access. This enables system
administrators to manage a group of servers from a central place.
This article discusses the nisplus objects, installation of servers ,clients and administration commands.
- Take the list of exam objective and study carefully its
- Organize your study keeping these objectives in mind.
Sample Question – Solaris Certification
Following are some sample questions . These are some of the representative questions and is meant to demonstrate the type of question you might expect in Solaris Certification examination and plan your study accordingly. No answers are given out of the belief that anyone preparing for the exam should be able to work it out .
Solstice disksuite is used to create Metadevices, virtual device composed of several physical devices slices/disks and use them to create different type of RAIDS to protect against disk failures
Learn about in good details ghow you can configure and use solstice disksuite.
Geek Speaks – collection of previous geek speaks
SE, HVD, LVD SCSI interfaces
CIDR : Classless Inter-Domain Routing
Dynamic System Domains
This is a Unix Tutorial where you can learn Unix OS Basics to get started with UNIX and Linux operating systems and covers Unix Directory structure , Unix Commads and Unix Shells
- Running Sol
aris in 32 or 64 bit mode – Page 1
- Removing ^M from Unix text files – Page 2
- Backup commands – ufsdump , tar , cpio – Page 3
- Setting up Ethernet card speed & duplex mode – Page 4
- One Line scripts – Page 4
Learn about the default text editor, vi, pronounced as ”vee eye”, in Unix, Linux and other Unix like systems. A short, concise vi quick reference lets you get started with vi today. Explains vi editor mode & vi commands with examples for editing in vi.
Unix and Linux backup and restore can be done using backup commands tar, cpio ufsdump, dump and restore. Though these commands may be sufficient for small setups in order to take a enterprise backup you have to go in for some custom backup and restore solutions like Symatic netbackup, EMC networker or Amanda.
Any backup solution using these commands depends on the type of backup you are taking as these backup commands offers different capabilities.
Setting up cron jobs in Unix, Solaris & Linux
cron is a unix, solaris, Linux utility that allows tasks to be automatically run in the background at regular intervals by the cron daemon.
Solaris Jumpstart – howto guide
Setup and configuration of jumpstart server & clients .
Jumpstart offers a way to install Solaris using network over multiple server with similar of different configurations.
Here is a step by Step howto guide to install Solaris over network.
Learn about the Unix commands with their usages and examples.
This Unix command tutorial introduces you with some of the most popular and useful commands used in nix operating system to get you started with Unix.
All Unix OS comes with online manual system, man, which can be used used as ,man
Protect your system from internal & external security vulnerabilities
Solaris security broadly falls under two groups – one is where the system is accessible using local area network/vlan and it has to be secured against unauthorized access. Second is system is accessible over the Internet to a number of persons and it has to be protected against unauthorized access using network or security loopholes.
This document details some of the focus areas for security and provides suggestions to make it strong.