ICT Knowledgebase
This category is used to document topics I am working on and to offer solutions for IT issues. Here you will find technical how-to’s and installation- and configuration instructions. Mostly, only high level steps are documented, because I think that some processes are self explanatory.
The easiest way to follow this “copy & paste” how-to’s is to use a command line SSH client (like putty) and simply copy and paste the commands (except where you have to provide your own information.
The SMTP banner is the SMTP connection response that a remote SMTP messaging server receives after it connects to a Receive connector that’s configured on a computer running Microsoft Exchange Server 2010/2013.
By default, Exchange will set the smtp banner… Continue reading
To move Exchnage database file and transaction logs files to another location, use the Move-DatabasePath cmdlet in EMS.
To view current list of databases |
|
To view the location of any database |
|
Before you proceed… Continue reading
This topic explains how to use the Exchange Management Console or the Exchange Management Shell to enable or disable circular logging for a storage group. Circular logging is a method of conserving hard disk space that allows Microsoft Exchange to overwrite transaction log files after the data that the log files contain has been committed to the database. The only reason to enable Circular Logging would be when a hard disk capacity is small or is nearly full.
Windows 7 Professional doesn’t allow you to enable BitLocker encryption. That’s only supported on Windows 7 Enterprise and from Windows 8 system. But It’s possible to use BitLocker Encrypted devices on Windows 7 Professional systems. This gives us the ability… Continue reading
SSL certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) will be blocked after 2016.
Google Chrome has already started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm. You have… Continue reading
RHEL/CentOS 7 introduces a new firewall daemon called FirewallD, a dynamically managed firewall that supports zones to define the trust level of network connections or interfaces. Because FirewallD runs as a daemon it also allows rules to be added instantly… Continue reading
Check Hostname |
|
Using Hostnamectl tool |
|
Restart the systemd-hostnamed daemon so that as to reflect the change in Static hostname. |
|
By Editing /etc/hostname Filevi /etc/hostname
The timedatectl utility is a part of the systemd system and service manager that allows you to change the current date and time of the linux system.
Display the current date and time |
|
Change the current date |
|
This article will show how to disable SELinux as some software do not support this Linux kernel security module that provides the mechanism for supporting access control security policies.
Display current state of SELinux
# sestatus
SELinux… Continue reading
You can use a Proxy Server to access Internet at Shell Prompt by setting the http_proxy variable.
This allows you to connect text based session and/or applications via the proxy server.