Category : Documentation


A sample service check, annotated:    host_name                       dbsrp2076                  <– name of server     service_description             SSH                        <– service being monitored     servicegroups                   PROD-ssh                   <– service groups     is_volatile                     0                          <– Does this service spontaneously start and stop (always 0 for “no”)     check_period                    24×7                       <– during what hours is this service checked?     max_check_attempts              10                         <– ..

Read more


What if Windows let you quickly access administrative tools, backup and restore options and other important management settings from a single window? If that sounds good, look no further than the so-called “God Mode.” What Is God Mode? No, God Mode doesn’t unlock any extra secret features in Windows or let you do any tweaking ..

Read more


From screentogif.com: This free tool was (and still is) mainly projected to work as a quick and small screen recorder. If you plan to record hours of fullscreen content, I recommend switching to more advanced software. Recording 📹 ScreenToGif allows you to record part of your screen with the Screen Recorder, also there’s the Webcam ..

Read more


Nikto is a very popular and easy to use webserver assessment tool to find potential problems and vulnerabilities very quickly. This tutorial shows you how to scan webservers for vulnerabilities using Nikto in Kali Linux. Nikto comes standard as a tool with Kali Linux and should be your first choice when pen testing webservers and web applications. ..

Read more


To view the existing routes, C:\> route print To add a static route, Syntax: C:\> route add <target> mask <netmask> <gateway IP> metric <metric cost> if <interface> Example: C:\> route add 10.10.10.0 mask 255.255.255.0 192.168.1.1 metric 1 Note: If there is more than one Network Interface and if the interface is not mentioned, the interface ..

Read more


Executive Summary Advice is seldom welcome. And those who want it most always like it the least.    Philip Dormer Stanhope, Earl of Chesterfield  (1694-1773)   Guiding philosophy of this document:  The hero isn’t the developer that battles problems through the weekend, but the one that avoided the problem. Best practices (BP in this document) ..

Read more


Using the AWS console. Login to the AWS Management Console. Navigate to Redshift dashboard at https://console.aws.amazon.com/redshift/. In the left navigation panel, under Redshift Dashboard, click Clusters. Click Launch Cluster button from the dashboard top menu to start the cluster setup process. On the Cluster Details configuration page, enter a unique name for your new cluster ..

Read more


If you, or your clients, are unable to login to your/their email accounts and the system shows this error message: Plaintext authentication disallowed on non-secure (SSL/TLS) connections If you do not want to use SSL/TLS connection to get your email, and to disable SSL/TLS secure connection, do the following: 1. Edit dovecot configuration file: /etc/dovecot.conf ..

Read more


Below is a fairly comprehensive list of most widely used performance testing tools for measuring web application performance and load stress capacity, current as of this post date (2012-09-19). These load testing tools will ensure your application performance in peak traffic and extreme stress conditions. The list includes open source as well as licensed performance ..

Read more


MySQL is SO irritating in its timestamp limitations, in that you can only have one default timestamp column. (Update 6/12/2013: in version 5.6.x, this restriction will be lifted, so I hear) However, you *can* trick MySQL like this. You can use only one of the definitions in one table. Create both timestamp columns like so: ..

Read more


CONVERT ALL THE THINGS. Well, almost all the things. #!/bin/bash for database in aaaaa bbbbb ccccc ddddd eeee do thesetables=`mysql -N -B -e “SELECT CONCAT(TABLE_SCHEMA,’.’,TABLE_NAME) \ FROM information_schema.TABLES where TABLE_SCHEMA = \”$database\”” \ AND TABLE_SCHEMA NOT IN (‘mysql’,’information_schema’,’performance_schema’)` alltables=`echo $alltables $thesetables` # change the schema itself mysql -e “ALTER DATABASE $database CHARACTER SET utf8 COLLATE ..

Read more


NORMALIZATION DIAGRAM   ACID Atomicity Transactions are often composed of multiple statements. Atomicity guarantees that each transaction is treated as a single “unit”, which either succeeds completely, or fails completely: if any of the statements constituting a transaction fails to complete, the entire transaction fails and the database is left unchanged. An atomic system must ..

Read more


(2012-05-12 update:  Please replace all mentions of “utf8” with “utf8mb4” to get a full utf8 character set.  utf8_general_ci is just a half-assed implementation of utf8. Similarly, replace all representations of utf8_xxxxxx_xx collations with their utf8mb4 variant.  In for a penny, in for a pound.  NO ONE wants to do two utf8 migrations, ever. The methodology ..

Read more