How to shut down Netapp san 9.2 cluster mode version1Saroj Sahu
The document provides step-by-step instructions for shutting down and powering up a NetApp cluster mode system. It describes the process of:
1. Shutting down connected host machines, switches, and SAN components like controllers and disk shelves.
2. Powering up disk shelves first, then controllers, switches, and host machines after 5-10 minutes.
3. Entering commands like disabling the cluster, halting nodes, and enabling the cluster during shutdown and startup.
The document discusses the Linux DMA Engine. It describes the key components of DMA controllers and different types of DMA transfers like contiguous and scatter-gather. It outlines the steps to perform a DMA transfer using the Linux DMA Engine API, including allocating a DMA channel, preparing descriptors, submitting transactions and starting the transfer. Finally, it provides references to learn more about the Linux DMA Engine.
SOSCON 2019.10.17
What are the methods for packet processing on Linux? And how fast are each packet processing methods? In this presentation, we will learn how to handle packets on Linux (User space, socket filter, netfilter, tc), and compare performance with analysis of where each packet processing is done in the network stack (hook point). Also, we will discuss packet processing using XDP, an in-kernel fast-path recently added to the Linux kernel. eXpress Data Path (XDP) is a high-performance programmable network data-path within the Linux kernel. The XDP is located at the lowest level of access through SW in the network stack, the point at which driver receives the packet. By using the eBPF infrastructure at this hook point, the network stack can be expanded without modifying the kernel.
Daniel T. Lee (Hoyeon Lee)
@danieltimlee
Daniel T. Lee currently works as Software Engineer at Kosslab and contributing to Linux kernel BPF project. He has interest in cloud, Linux networking, and tracing technologies, and likes to analyze the kernel's internal using BPF technology.
How to shut down Netapp san 9.2 cluster mode version1Saroj Sahu
The document provides step-by-step instructions for shutting down and powering up a NetApp cluster mode system. It describes the process of:
1. Shutting down connected host machines, switches, and SAN components like controllers and disk shelves.
2. Powering up disk shelves first, then controllers, switches, and host machines after 5-10 minutes.
3. Entering commands like disabling the cluster, halting nodes, and enabling the cluster during shutdown and startup.
The document discusses the Linux DMA Engine. It describes the key components of DMA controllers and different types of DMA transfers like contiguous and scatter-gather. It outlines the steps to perform a DMA transfer using the Linux DMA Engine API, including allocating a DMA channel, preparing descriptors, submitting transactions and starting the transfer. Finally, it provides references to learn more about the Linux DMA Engine.
SOSCON 2019.10.17
What are the methods for packet processing on Linux? And how fast are each packet processing methods? In this presentation, we will learn how to handle packets on Linux (User space, socket filter, netfilter, tc), and compare performance with analysis of where each packet processing is done in the network stack (hook point). Also, we will discuss packet processing using XDP, an in-kernel fast-path recently added to the Linux kernel. eXpress Data Path (XDP) is a high-performance programmable network data-path within the Linux kernel. The XDP is located at the lowest level of access through SW in the network stack, the point at which driver receives the packet. By using the eBPF infrastructure at this hook point, the network stack can be expanded without modifying the kernel.
Daniel T. Lee (Hoyeon Lee)
@danieltimlee
Daniel T. Lee currently works as Software Engineer at Kosslab and contributing to Linux kernel BPF project. He has interest in cloud, Linux networking, and tracing technologies, and likes to analyze the kernel's internal using BPF technology.
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesDavid McGeough
This session will cover advanced techniques in troubleshooting the Citrix NetScaler Appliance using tools such as Citrix TaaS, IPMI, nsconmsg, wireshark and log analysis. We will review usages of these tools along with case studies showing how to best troubleshoot common issues seen in operating Citrix NetScaler Appliances.
What you will learn
- Various tools available to troubleshoot issues and how to use them to isolate NetScaler Issues
- Common deployment problems and how to isolate the causes
Poptrie: A Compressed Trie with Population Count for Fast and Scalable Softwa...Hirochika Asai
Este documento describe Poptrie, una estructura de datos trie comprimido con conteo de población para búsqueda rápida y escalable de tablas de rutas IP en software. Poptrie reduce el tamaño de memoria y mejora el rendimiento mediante compresión de punteros con conteo de población y agregación de rutas. Evaluaciones exhaustivas muestran que Poptrie es 4-578% más rápido que otras tecnologías de vanguardia para tablas de rutas IPv4 y IPv6 públicas y privadas, incluidas tablas futuras
Introduction to Linux Privilege Escalation MethodsBishop Fox
So you’ve managed to get a foothold into the web server — now what? Privilege escalation can be an intimidating process for those unfamiliar with Linux systems or advanced penetration testing techniques. Servers are often cluttered with utilities, backups, and files; how do you find your way through to a root shell? Where are the first places an attacker might look for exploitable vulnerabilities? This slide deck will help you learn about common privilege escalation paths on Linux systems, including sticky bits, shell escapes, wildcard injections, and how to identify vulnerable services. Furthermore, it will illustrate several techniques for those looking to improve their security skills, with time for discussion afterward.
(This was originally presented on February 22, 2010 at Day of Shecurity Boston 2019).
OpenDaylight is an open source platform for programmable networks that supports NETCONF/Yang. It provides tools for working with Yang models including code generation from Yang definitions. Various open source projects provide Yang modeling and NETCONF/RESTCONF capabilities using OpenDaylight.
This document discusses optimizing Linux boot times on the Raspberry Pi. It begins with an overview of generic boot optimization concepts like identifying and measuring boot components, removing unnecessary functionality, and reordering initialization. It then presents a case study of optimizing boot for Raspbian on the Raspberry Pi through techniques like disabling unneeded services, assigning a static IP, using a minimal custom distro, and kernel optimizations like disabling initcalls and reducing the kernel size. The goal is to achieve an SSH login within 25 seconds instead of the original 30 seconds.
Zenith Networks is a network integration services company that has been providing LAN, WAN, routing, switching, and security services for 27 years. They are a partner of Juniper Networks and are headquartered in Philadelphia, PA. The document provides information on Zenith Networks' services and certifications, as well as background on their partner Juniper Networks. It also includes steps to access education slides on OSPF routing protocols hosted on Zenith Networks' website.
Troubleshooting Common Network Related Issues with NetScalerDavid McGeough
Webinar recording: https://www1.gotomeeting.com/register/737119097
As a NetScaler Administrator, you will need to understand how the NetScaler interacts with the network to ensure an optimally running environment for your applications. In this Webinar delivered by NetScaler Escalation Engineers you will learn some of the common network configuration issues, how to avoid them and when necessary how to troubleshoot them.
You will learn how to troubleshoot:
- HA issues
- GARP issues
- LA channel issues
- Layer 2 issues
You are tasked with gaining privileged access to a Windows 2008 server through a capture-the-flag event. You first use Metasploit to exploit vulnerable MS SQL services to get an unprivileged shell. Then, you use the exploit suggester module to find exploits for privilege escalation, using the ms16_014_wmi_recv_notif exploit to achieve a privileged shell. Finally, you perform an action like deleting important files to cause an information security breach on the target system.
1 of 9 CSCE 3600 Systems Programming Major Assignm.docxShiraPrater50
1 of 9
CSCE 3600: Systems Programming
Major Assignment 2 – The Shell and System Calls
Due: 11:59 PM on Wednesday, November 6, 2019
COLLABORATION
You should complete this assignment as a group assignment with the other members of
your group as assigned on Canvas using our GitLab environment (i.e., the same group
you had for Major 1). If desired, you may submit only one program per group, but all
source code must be committed in GitLab. Also, make sure that you list the names of all
group members who participated in this assignment in order for each to get credit.
BACKGROUND
A shell provides a command-line interface for users. It interprets user commands and
executes them. Some shells provide simple scripting terms, such as if or while, and
allow users to make a program that facilitates their computing environment. Under the
hood, a shell is just another user program. The file /bin/bash is an executable file for
the bash shell. The only thing special about your login shell is that it is listed in your
login record so that /bin/login (i.e., the program that prompts you for your password)
knows what program to start when you log in. If you run "cat /etc/passwd", you will
see the login records of the machine.
PROGRAM DESCRIPTION
GROUP COLLABORATIVE PORTION
In this assignment, you will implement the shell “engine” as the “group” component,
where all members are responsible for the following functionality:
• A Command-Line Interpreter, or Shell
Your shell should read the line from standard input (i.e., interactive mode) or a
file (i.e., batch mode), parse the line with command and arguments, execute the
command with arguments, and then prompt for more input (i.e., the shell prompt)
when it has finished.
1. Interactive Mode
In interactive mode, you will display a prompt (any string of your choosing)
and the user of the shell will type in a command at the prompt.
2. Batch Mode
In batch mode, your shell is started by specifying a batch file on its command
line. The batch file contains the list of commands that should be executed. In
batch mode, you should not display a prompt, but you should echo each line
you read from the batch file back to the user before executing it.
You will need to use the fork() and exec() family of system calls. You may
2 of 9
not use the system() system call as it simply invokes the system’s /bin/bash
shell to do all of the work.
You may assume that arguments are separated by whitespace. You do not have
to deal with special characters such as ', ", \, etc. However, you will need to
handle the redirection operators (< and >) and the pipeline operator (|), which
will be specified in the “individual” portion of this assignment.
Each line (either in the batch file or typed at the prompt) may contain multiple
commands separate with the semicolon (;) character. Each command separated
by a ; should be run sequentially, but the shell should not print the next prompt ...
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesDavid McGeough
This session will cover advanced techniques in troubleshooting the Citrix NetScaler Appliance using tools such as Citrix TaaS, IPMI, nsconmsg, wireshark and log analysis. We will review usages of these tools along with case studies showing how to best troubleshoot common issues seen in operating Citrix NetScaler Appliances.
What you will learn
- Various tools available to troubleshoot issues and how to use them to isolate NetScaler Issues
- Common deployment problems and how to isolate the causes
Poptrie: A Compressed Trie with Population Count for Fast and Scalable Softwa...Hirochika Asai
Este documento describe Poptrie, una estructura de datos trie comprimido con conteo de población para búsqueda rápida y escalable de tablas de rutas IP en software. Poptrie reduce el tamaño de memoria y mejora el rendimiento mediante compresión de punteros con conteo de población y agregación de rutas. Evaluaciones exhaustivas muestran que Poptrie es 4-578% más rápido que otras tecnologías de vanguardia para tablas de rutas IPv4 y IPv6 públicas y privadas, incluidas tablas futuras
Introduction to Linux Privilege Escalation MethodsBishop Fox
So you’ve managed to get a foothold into the web server — now what? Privilege escalation can be an intimidating process for those unfamiliar with Linux systems or advanced penetration testing techniques. Servers are often cluttered with utilities, backups, and files; how do you find your way through to a root shell? Where are the first places an attacker might look for exploitable vulnerabilities? This slide deck will help you learn about common privilege escalation paths on Linux systems, including sticky bits, shell escapes, wildcard injections, and how to identify vulnerable services. Furthermore, it will illustrate several techniques for those looking to improve their security skills, with time for discussion afterward.
(This was originally presented on February 22, 2010 at Day of Shecurity Boston 2019).
OpenDaylight is an open source platform for programmable networks that supports NETCONF/Yang. It provides tools for working with Yang models including code generation from Yang definitions. Various open source projects provide Yang modeling and NETCONF/RESTCONF capabilities using OpenDaylight.
This document discusses optimizing Linux boot times on the Raspberry Pi. It begins with an overview of generic boot optimization concepts like identifying and measuring boot components, removing unnecessary functionality, and reordering initialization. It then presents a case study of optimizing boot for Raspbian on the Raspberry Pi through techniques like disabling unneeded services, assigning a static IP, using a minimal custom distro, and kernel optimizations like disabling initcalls and reducing the kernel size. The goal is to achieve an SSH login within 25 seconds instead of the original 30 seconds.
Zenith Networks is a network integration services company that has been providing LAN, WAN, routing, switching, and security services for 27 years. They are a partner of Juniper Networks and are headquartered in Philadelphia, PA. The document provides information on Zenith Networks' services and certifications, as well as background on their partner Juniper Networks. It also includes steps to access education slides on OSPF routing protocols hosted on Zenith Networks' website.
Troubleshooting Common Network Related Issues with NetScalerDavid McGeough
Webinar recording: https://www1.gotomeeting.com/register/737119097
As a NetScaler Administrator, you will need to understand how the NetScaler interacts with the network to ensure an optimally running environment for your applications. In this Webinar delivered by NetScaler Escalation Engineers you will learn some of the common network configuration issues, how to avoid them and when necessary how to troubleshoot them.
You will learn how to troubleshoot:
- HA issues
- GARP issues
- LA channel issues
- Layer 2 issues
You are tasked with gaining privileged access to a Windows 2008 server through a capture-the-flag event. You first use Metasploit to exploit vulnerable MS SQL services to get an unprivileged shell. Then, you use the exploit suggester module to find exploits for privilege escalation, using the ms16_014_wmi_recv_notif exploit to achieve a privileged shell. Finally, you perform an action like deleting important files to cause an information security breach on the target system.
1 of 9 CSCE 3600 Systems Programming Major Assignm.docxShiraPrater50
1 of 9
CSCE 3600: Systems Programming
Major Assignment 2 – The Shell and System Calls
Due: 11:59 PM on Wednesday, November 6, 2019
COLLABORATION
You should complete this assignment as a group assignment with the other members of
your group as assigned on Canvas using our GitLab environment (i.e., the same group
you had for Major 1). If desired, you may submit only one program per group, but all
source code must be committed in GitLab. Also, make sure that you list the names of all
group members who participated in this assignment in order for each to get credit.
BACKGROUND
A shell provides a command-line interface for users. It interprets user commands and
executes them. Some shells provide simple scripting terms, such as if or while, and
allow users to make a program that facilitates their computing environment. Under the
hood, a shell is just another user program. The file /bin/bash is an executable file for
the bash shell. The only thing special about your login shell is that it is listed in your
login record so that /bin/login (i.e., the program that prompts you for your password)
knows what program to start when you log in. If you run "cat /etc/passwd", you will
see the login records of the machine.
PROGRAM DESCRIPTION
GROUP COLLABORATIVE PORTION
In this assignment, you will implement the shell “engine” as the “group” component,
where all members are responsible for the following functionality:
• A Command-Line Interpreter, or Shell
Your shell should read the line from standard input (i.e., interactive mode) or a
file (i.e., batch mode), parse the line with command and arguments, execute the
command with arguments, and then prompt for more input (i.e., the shell prompt)
when it has finished.
1. Interactive Mode
In interactive mode, you will display a prompt (any string of your choosing)
and the user of the shell will type in a command at the prompt.
2. Batch Mode
In batch mode, your shell is started by specifying a batch file on its command
line. The batch file contains the list of commands that should be executed. In
batch mode, you should not display a prompt, but you should echo each line
you read from the batch file back to the user before executing it.
You will need to use the fork() and exec() family of system calls. You may
2 of 9
not use the system() system call as it simply invokes the system’s /bin/bash
shell to do all of the work.
You may assume that arguments are separated by whitespace. You do not have
to deal with special characters such as ', ", \, etc. However, you will need to
handle the redirection operators (< and >) and the pipeline operator (|), which
will be specified in the “individual” portion of this assignment.
Each line (either in the batch file or typed at the prompt) may contain multiple
commands separate with the semicolon (;) character. Each command separated
by a ; should be run sequentially, but the shell should not print the next prompt ...
BACKGROUND A shell provides a command-line interface for users. I.docxwilcockiris
BACKGROUND
: A shell provides a command-line interface for users. It interprets user commands and executes them. Some shells provide simple scripting terms, such as
if
or
while
, and allow users to make a program that facilitates their computing environment. Under the hood, a shell is just another user program as you know from Minor2 assignment. The file
/bin/bash
is an executable program file for the bash shell. The only thing special about your login shell is that it is listed in your login record so that /bin/login (i.e., the program that prompts you for your password) knows what program to start when you log in. If you run "cat /etc/passwd", you will see the login records of the machine.
PROGRAM DESCRIPTION
GROUP COLLABORATIVE PORTION
: In this assignment, you will implement the shell “engine” as the group component, where all members are responsible for the following functionality.
A Command-Line Interpreter, or Shell
Your shell should read the line from standard input (i.e., interactive mode) or a file (i.e., batch mode), parse the line with command and arguments, execute the command with arguments, and then prompt for more input (i.e., the shell prompt) when it has finished. This is what Minor 2 program should do with addition of batch processing which means just reading a batch line by line and calling the same interpretation logic.
Batch Mode
In batch mode, your shell is started by specifying a batch file on its command line. The batch file contains the list of commands that should be executed. In batch mode, you should not display a prompt, but you should echo each line you read from the batch file back to the user before executing it. After a batch is finished the shell will exit.
Interactive Mode
No parameters specified on command line when the shell is started. In this mode, you will display a prompt (any string of your choice) and the user of the shell will type in a command at the prompt.
You will need to use the fork() and exec() family of system calls. You may not use the system() system call as it simply invokes the system’s /bin/bash shell to do all of the work. You may assume that arguments are separated by whitespace. You do not have to deal with special characters such as ', ", \, etc. You may assume that the command-line a user types is no longer than 512 bytes (including the '\n'), but you should not assume that there is any restriction on the number of arguments to a given command.
INDIVIDUAL PORTIONS
Build-in Commands:
Every shell needs to support a number of built-in commands, which are functions in the shell itself, not external programs. Shells directly make system calls to execute built-in commands, instead of forking a child process to handle them.
In this assignment, each member of the group will implement one of the following section and commit in GitLab the code that supports those commands:
Add a new built-in
alias
command that allows you to define a shortcut for commands by essenti.
SSAdaP 1989 DECUS Europe Symposium Jan HolyJan Holy
SSAdaP is a programming environment for creating, compiling, linking, and debugging Ada programs. It supports multiple hosts and targets. Versions currently exist for VAX/VMS and IBM mainframes, with UNIX versions under development. SSAdaP aims to implement the full Ada language specification and avoid restrictions. It provides features like separate compilation, configuration management, and a symbolic debugger. The system was developed in Hungary and Czechoslovakia to provide a full Ada implementation for Eastern Europe.
The document discusses various techniques used in Metasploit Framework including selecting exploits, configuring options, generating payloads, and executing exploits. It provides step-by-step instructions on using Metasploit to scan for vulnerabilities, select an exploit, configure the required options like target IP, payload, and listener port, and finally executing the exploit to achieve remote code execution on the target system. It also discusses different types of payloads like reverse shell, VNC injection, and Meterpreter and generating standalone executable payloads using msfpayload.
Shellcode is machine code that executes a shell when run. This document discusses shellcode, including:
- Shellcode injects machine code into a vulnerable application to spawn a shell.
- Three examples of shellcode are provided: an exit system call, displaying a message, and spawning a shell.
- Registers, assembly instructions, and system calls used in Linux are explained for creating shellcode.
The document discusses trap handling in Linux, focusing on system calls. It begins with background on interrupts, traps, and system calls. It then describes the function call flow from start_kernel() and initialization of the Interrupt Descriptor Table (IDT). Next, it covers system call entry and initialization of the system call table. Finally, it discusses the system call procedure from a user application using glibc and the Linux kernel. Key topics include IDT structure and gates, MSR register usage for system calls, fast vs slow system call paths, and how system calls are invoked and handled in the kernel.
This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box
The document discusses various types of shellcodes used in reverse engineering, including local shellcodes, remote shellcodes like reverse shellcodes and bindshell shellcodes, and other less common types. It provides details on the different techniques shellcodes use, such as staged shellcodes that download additional code in stages. The document also introduces the msfpayload command used to generate shellcodes in Metasploit and provides examples of configuring options and outputting shellcode in various formats.
Inspection and maintenance tools (Linux / OpenStack)Gerard Braad
This handout is part of the training at UnitedStack and will introduce you to several inspection and maintenance tools.
It is generated from the slides at: http://gbraad.gitlab.io/tools-training/
Source: https://gitlab.com/gbraad/tools-training
This document provides an overview of using the Oracle Enterprise Manager Command Line Interface (EM CLI). It discusses the different modes of EM CLI including standard, interactive, and scripting modes. It also covers installing and configuring EM CLI, common verbs, formatting and filtering output, and provides examples of using EM CLI to clear alerts, create blackouts, and change passwords via scripts. The document is intended as a crash course on getting started with EM CLI.
A shell is a user interface for accessing an operating system's services, either through a command-line interface or graphical user interface. A bind shell opens a listener port on the target machine and waits for an incoming connection from the attacker. A reverse shell is when the target machine connects back to the attacking machine. Netcat and PowerShell can be used to create bind and reverse shells for command execution on remote systems. Examples show how netcat can be used to establish each type of shell connection between an attacker and victim machine.
OverviewIn this assignment you will write your own shell i.docxalfred4lewis58146
Overview
In this assignment you will write your own shell in C. The shell will run command line
instructions and return the results similar to other shells you have used, but without many
of their fancier features.
In this assignment you will write your own shell, called smallsh. This will work like the
bash shell you are used to using, prompting for a command line and running commands,
but it will not have many of the special features of the bash shell.
Your shell will allow for the redirection of standard input and standard output and it will
support both foreground and background processes.
Your shell will support three built in commands: exit, cd, and status. It will also support
comments, which are lines beginning with the # character.
Specifications
All execution, compiling, and testing of this program should be done from the bash
prompt on the eos-class.engr.oregonstate.edu server.
Use the colon : symbol as a prompt for each command line. Be sure you flush out the
prompt each time you print it, this makes the test script look nicer.
The general syntax of a command line is:
command [arg1 arg2 ...] [< input_file] [> output_file] [&]
…where items in square brackets are optional. You can assume that a command is made
up of words separated by spaces. The special symbols <, >, and & are recognized, but
they must be surrounded by spaces like other words. If the command is to be executed in
the background, the last word must be &. If standard input or output is to be redirected,
the > or < words followed by a filename word must appear after all the arguments. Input
redirection can appear before or after output redirection.
Your shell does not need to support any quoting; so arguments with spaces inside them
are not possible.
Your shell should support command lines with a maximum length of 2048 characters, and
a maximum of 512 arguments. You do not need to do any error checking on the syntax of
the command line.
Command Execution
You will use fork, exec, and waitpid to execute commands. The shell will wait for
completion of foreground commands (commands without the &) before prompting for the
next command. The shell will not wait for background commands to complete.
Background commands should have their standard input redirected from /dev/null if the
user did not specify some other file to take standard input from. What happens to
background commands that read from standard input if you forget this?
Your shell should use the PATH variable to look for commands, and it should allow shell
scripts to be executed (see below for the testing script, for example). The right version
of the exec function will do this for you automatically. If a command fails because the
shell could not find the command to run, then the shell will print an error message and set
the exit status to 1.
After the fork but before the exec you must do any input/output redirection. A redirected
input file should be opened for reading.
The Linux kernel acts as an interface between applications and hardware, managing system resources and providing access through system calls; it uses a monolithic design where all components run in the kernel thread for high performance but can be difficult to maintain, though Linux allows dynamic loading of modules. Device drivers interface hardware like keyboards, hard disks, and network devices with the operating system, and are implemented as loadable kernel modules that are compiled using special makefiles and registered with the kernel through system calls.
This document discusses post-exploitation techniques on Windows systems after gaining initial access. It covers hiding user accounts, extracting password hashes from the SAM database and LSASS process, using Mimikatz to dump hashes and elevate privileges, patching logs to cover tracks, and techniques like Pass-the-Hash and session hijacking to authenticate as other users without knowing their passwords. The goal is internal network access, with suggestions to gather additional information from SAM, NTDS.dit, and LSASS and targets like domain administrators.
Useful Linux and Unix commands handbookWave Digitech
This article provides practical examples for most frequently used commands in Linux / UNIX. Helpful for Engineers and trainee engineers, Software developers. A handy notes for all Linux & Unix commands.
This document provides an overview of a presentation on .NET for hackers. The presenter introduces themselves and their background in software development, security, and collaboration with OWASP. The agenda includes introductions to .NET, disassembling binaries, debugging .NET applications, reflection, decompilation techniques, and a malware analysis use case. Key topics covered are the .NET Common Language Runtime environment, .NET file formats, memory models, Just-In-Time compilation, debugging tools like ILDASM and SOS extensions, reflection APIs, decompilation, and anti-decompilation tricks. Examples are provided for debugging and reflection code.
This document discusses using the Enterprise Manager Command Line Interface (EM CLI) to administer Oracle databases. It provides an overview of the EM CLI and important commands, such as getting job information, executing SQL, managing targets, and submitting procedure scripts. The EM CLI allows administrators to simplify management tasks across multiple databases through scripting and automation.
202202 SUGUKI UNIX X Command Tips and Tricksdhorvath
This document provides tips and tricks for using UNIX X commands in SAS. It discusses various commands like X, %sysexec, call system, systask command, and filename pipe that allow executing operating system commands from SAS code. It covers advantages and disadvantages of each approach, and alternatives that can be used when XCMD is not enabled. Examples are provided to demonstrate how to check command return codes and handle errors.
You are to simulate a dispatcher using a priority queue system.New.pdfgardenvarelianand
You are to conduct a sample survey to determine the mean family income in a rural area of
central Florida. The question is, how many families should be sampled? In a pilot smaple of 10
families, the standard deviation of the sample was $500. The sponsor of the survey wants you to
use the 95 percent confidence level. the estimate is to be within $100. How many families should
be interviewed?
Solution
Given a=0.05, Z(0.025)=1.96 (from standard normal table)
So n=(Z*s/E)^2
=(1.96*500/100)^2
=96.04
Take n=97.
Similar to Different type of shells In Netapp Cluster mode 8.X and how to access them through command mode (20)
How to Shutdown Netapp Cluster Mode Storage System with Multi-Node Cluster (6...Saroj Sahu
Here we have explain step by step how to shutdown the Netapp storage System with Multi-Node Cluster (6 nodes cluster with ontap version 9.1P14 with model FAS8200, AFF8040 & AFF8020)
How to assign the disks in Netapp storage cluster mode 8.XSaroj Sahu
Here we have described how to assign the disks which are in unassigned state in netapp cluster mode storage system and explained in which scenario we have to assign the disks.
How to assign unowned disk in the netapp cluster 8.3 Saroj Sahu
Here it has been described how to assign the disk which is unowned to the node in the netapp cluster mode 8.3 and how to enable the disk assign option shelf level and stack level
How to access the Netapp cluster mode 8.2 through CLI (command mode)Saroj Sahu
This document provides 3 methods for accessing a NetApp cluster mode storage system through the command line interface (CLI).
Method 1 involves connecting a laptop directly to the storage system's serial port using PuTTY software and logging in with username "admin". Method 2 allows using telnet or RSH by first cloning the firewall policy and enabling those services, but they are insecure. Method 3, which is recommended, uses SSH to securely access the storage system by hostname or IP and log in as "admin". The document provides instructions for downloading PuTTY and checking which CLI services are enabled or disabled.
Unable to access the net app cluster mode 9.2 san through gui after power mai...Saroj Sahu
Unable to access the NetApp storage system 9.2 cluster mode due to cluster management LIF down and http service was disable. Here we have mentioned the real time issue which we have faced and solution has been given step by stem by using the command mode. Hope it can be useful for NetApp Administrators
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...Saroj Sahu
Unable to access Netapp Filer by ssh from the RedHat Linux machine throwing the error message as "Unable to negotiate with 10.150.10.10 port 22: no matching cipher found. Their offer: 3des-cbc
How to work seamlessly in your vm without pressing host key again and againSaroj Sahu
How to work seamlessly in your oracle VM which is installed with Cent OS or RedHat Linux? You can copy and past from your local machine to the VM without any difficulties. (HOST KEY is not required) (Guest editions CD image installation in Oracle VM (Cent OS, RedHat Linux
Deleting a vserver in Netapp cluster mode Saroj Sahu
How to delete a vserver step by step in command mode in Netapp cluster mode version 9.2 system. Lot of hurdles can be avoided if you follow this document.Thank you!
How to enable efficiency (deduplication and compression in netapp cluster mod...Saroj Sahu
This step by step implementation of deduplication and compression will make you easy to implement in your environment on the volume of Netapp storage. we will get lot of space savings which will benefit for customer and business can grow beyond our limitation.
How to see the event and audit logs through ( gui and cli) in cluster ontap n...Saroj Sahu
With the help of this document, we can check the logs in NetApp storage. It will very helpful for troubleshooting of the issues. we can easily take the decision to act on the current issue by analysing the logs.
NetApp snapshot technology works by preserving the inode map at the time a snapshot is created and continuing to change the inode map on the active file system, while keeping the older version for the snapshot. Snapshots can be created quickly in just a few seconds without impacting performance and up to 255 snapshots can be created per volume, providing point-in-time copies of data.
High availability ensures that network services and data are accessible at all times by configuring storage systems in high availability pairs. When a network interface fails, negotiated failover can trigger an automatic failover of the storage system to prevent loss of connectivity. Enabling negotiated failover and selecting which network interfaces to include allows the storage system to fail over to the other node. The benefits of high availability include uninterrupted data access, and the ability to perform nondisruptive upgrades to storage system components like motherboards, adapters, disks and interfaces.
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SANSaroj Sahu
The document provides steps to change the IP address of a HP 3PAR SAN. It outlines logging into the SAN through Putty using default credentials. It then details using the 'setnet' command to change the IP address, netmask, and gateway. The 'shownet' command confirms the new network settings. Login to the SP console allows changing additional settings like the hostname through interactive menus.
Aggregate standard for Netapp storage 7 mode Saroj Sahu
1. Storage teams create aggregates using naming conventions like aggr0, aggr1 to provision storage. They decide the configuration including the RAID type, number of disks, and disk size.
2. When creating an aggregate, factors like recovery speed, data assurance, and storage space must be considered. Larger RAID groups improve performance but increase risk of data loss if multiple disks fail, while smaller groups reduce this risk but decrease performance.
3. Guidelines for RAID group sizing depend on disk type, with ATA/SATA generally having smaller groups than FC/SAS. The default sizes balance speed, protection, and space utilization, though the maximum sizes allow flexibility based on needs.
CIFS, also known as SMB, is a protocol that allows file sharing across different operating systems on a network. It runs over TCP/IP and uses SMB to enable file and printer sharing between Windows clients. To set up CIFS sharing on a NetApp storage system, you configure CIFS and SMB, create a CIFS share, and map the share as a network drive on Windows clients.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Different type of shells In Netapp Cluster mode 8.X and how to access them through command mode
1. Differentshells for CLI commandsin cluster mode 8.x NetApp
storage-:
What is shell?
Ans- Shell is an interface through which user can interact with the kernel (broadlyyou can say
Operatingsystem, as Kernel is the core of the operatingsystem)
In a simplelanguageshell accepts user commands,applicationsandtranslateintothe computer
readablebinary or languageto interact withthe Kernel andafter operation,giveback the outputof
the commandas a user readable formatto the user throughthe shell.
In NetAppstorage there are three typesof shellsforCLI(CommandLine Interface)
1. Clustershell
2. Node shell
3. Systemshell
1.Clustershell-:
The clustershell isthe native shell thatisstartedautomaticallywhenyoulogintothe cluster.
It providesall the commandsyouneedtoconfigure andmanage the cluster.
In thisshell youcanexecute yourrequiredcommandtodorequiredtaskandto do the troubleshooting
or day to day tasksthroughthe commandmode.
In the promptif you type the questionmarkitwill give youall the availablecommands.
2. Apart from thisif you type man command name it will give you the complete descriptionofall the
relatedcommands. For example,as below.
3. 2.Nodeshell-:
The node shell isa special shell forcommandsthattake effectonlyatthe node level,asoutcluster
consistsof multiple nodes,sowe cango each andindividual nodesandexecutethe commandforthat
particularnode to dosome requiredtaskinthe respective nodes.
Execute the belowcommandinthe clustershell toknow how manynodesthere inthe Clusterare.
4. (Or)
Cluster1::> systemnode show
Node HealthEligibilityUptime Model Owner Location
--------- ------ ----------- ------------------------ -----------------------
Node1
true true 13 days19:29 FAS8040
Node2
true true 13 days19:29 FAS8040
2 entrieswere displayed.
So as perthe above output isa two-node cluster.
Now we can go to each individual node to get access the node shell-:
Example-:
Cluster1: :>systemnode run -node <nodename>
(Or)
Here alsoyou can type the questionmarkinthe prompt(?) to get the listof commandsand man
commandname to get the detailsof the command
5. It is almost equal to all your Data ontap 7 mode commands
6. To come out from the node shell,type exittogetthe clustershell.
3.System shell -:
The systemshellisalow-levelshellthatisusedonlyfordiagnosticandtroubleshootingpurposes.Itis
not usedforgeneral administrativepurposes.Youaccessthe systemshell onlywithguidancefrom
technical support.
7. To access the systemshell,youneedone accountname calleddiagnosticaccount,username called
“diag” . By usingthis“diag” accountyou can performthe troubleshootingtasksinthe systemshell.
The “diag” account bydefaultisinlockedstatus,we needtounluckitand byusingthe password of
“diag” userwe needtoaccessthe systemshell,throughthe advancedcommand “systemnode
systemshell”
Process-:
How to unluckthe diag account-:
(Or)
Login to the diagnosticmode
Login into the system shell-:
8. (Or)
Example of cat command in the systemshell-:
To exit from the system shell-:
Exit from the diagnosticmode to admin mode
9. See the status of the diag user
To recognize differentshellsbyseeingthe prompt as below-:
Note- I have marked my hostnameina white paint asI don’twant to reveal the nameof my business.
Please don’tuse system shell and advancemode commandwithoutsuggestionby the NetApp. All the
commandsare very dangerous,itmay create a panicso take the helpof NetApp and execute as per
your requirement.
Thank you!
Saroj (NCDA Certifiedengineer)