Category: Blog for Unix Admin

2

Solaris Troubleshooting – Recreating /etc/path-to-install

If there are problems with device path creation using a reconfiguration boot, devfsadm, or drvconfig it may be necessary to rebuild the /etc/path_to_inst file to solve the problem. It is possible to easily rebuild the /etc/path_to_inst file gracefully by first making note of the root device,...

2

Linux Troubleshooting – Root Password Reset

The General problem that we see in an enterprise environment, where there is no centralized automated password management tool is  …. missing root passwords for the servers. Missing root passwords are also common when the servers initially managed by one team and later handed over to...

7

ORACLE-SUN Hardware Reference

Current trend of System Administration is Remote System Administration, and as a remote system administrator most of us having very less exposure to the Server hardware and their architecture.  For a system administrator it is always beneficial to know about the hardware that he is supporting remotely, this...

4

VCS (Veritas Cluster Services ) Beginners Lesson – Cluster Communications

    In our previous post “Beginners Lesson – Veritas Cluster Services for System Admin” we have discussed the fundamentals of clustering and it’s purpose. In this post I would like to take you little deep inside of the clusters just to explore how the VCS...

14

VxVM Beginners – Commands and Examples – Part 2

This is a continuation post for our previous post Beginner’s Lesson – VERITAS Volume Manager for Solaris Learning VxVM administration will be much easier by understanding below three things> 1. How Veritas Volume Manager treats Operating System Native Disks into Veritas Volumes 2. What are the...

49

Beginners Lesson – Veritas Cluster Services for System Admin

The purpose of this post is to make the Cluster concept easy for those young brothers who have just started their career as System Administrator. while writing this post I have only one thing in mind, i.e. explain the entire cluster concept with minimum usage of technical jargon...

6

Someone could be eavesdropping on you right now (man-in-the-middle attack)! – It is SSH thing

    How many of you noticed  below warning message during your attempt to connect remote hosts using SSH ” Someone could be eavesdropping on you right now (man-in-the-middle attack)! “ If you are the one wondering the meaning of this warning, you should go through this...

Close
  Our next learning article is ready, subscribe it in your email

What is your Learning Goal for Next Six Months ? Talk to us