October 31st, 2009 by elizar
Here are a couple of commands for the XSCF console specifics for the M-series servers of Sun. There are ‘stolen’ from Review Ninja plus more! Thanks Jon!
To Connect to a domain
XSCF> console -d
To Show status of a domain
XSCF> showdomainstatus -d
usage : showdomainstatus -a
showdomainstatus -d domain_id
XSCF> showdomainstatus -a
DID Domain Status
To displays the domain information specified for a system board.
To displays the temperature, humidity, voltage, and fan rotation speed.
To lists degraded components.
To displays users who login to the XSCF.
To reset domain there are 3 modes for reset command
* por: Domain system reset
* request: Domain panic instruction
* xir: Domain CPU reset
XSCF> reset -d domainhere por
To power on/off all domain or sepcified domain
Remember you can always use –help on every command to see what are teh available switched and options for it.
To logout of XSCF> type exit
To return to XSCF from a domain terminal type #.
Hope this help.
More command from Sun:
October 29th, 2009 by elizar
Notes on ZFS quotas, reservations and others.. like adding up disk for the pool and creating pool altogether.
First, create a pool using ‘zpool‘. Then use ‘zfs‘ to make the filesystems.
Creating Pool with zpool
Create a pool called pool1. The -m is optional. If given, it specifies a mount point for zfs filesystems created from the specified pool. The mount point should be empty or nonexistant. If the -m argument is omitted, mount point is “/”.
Read the rest of this entry »
October 15th, 2009 by elizar
I know nothing about HP UX (yeah, except SAM). That’s why, just now, when there’s a request to just make a trace route from an HPUX server to another server, I have to login and do execute the command. I couldn’t log in as my user id so i logged in as root instead from the console.
I check grep’d my account the walah! It was there! I reset the password, open an ssh terminal and tried to login. unsuccessful, that’s why i knew then that it is locked.
Here’s how to unlock a locked user account in HP UX in command line.
In HP-UX 11.xx if user account is locked, you can unlock the account by running SAM. But running SAM takes some time usually 2-3 minutes on heavily loaded HP-UX servers. You can unlock the locked user account from command line by running following command:
1. Login as root or use sudo from your account, if there is no sudo installed just use su – root :
2. Run this command to unlock the locked HP-UX user account:
|#/usr/lbin/modprpw –l –k johnm
Running modprpw will unlock the locked user account in HP-UX from command line.without running SAM
NOTE: modprpw is HP-UX command only and wouldn’t work in Solaris,AIX and any Linux servers
That info was ‘borrowed’ from here…. thanks!
October 15th, 2009 by elizar
Send Break on SPARC Enterprise T5120 – well it for the T5000 series I guess, the newer ones. Or “Sending Break onan ILOM..
“->” = ILOM
“sc>” = ALOM
.. and since this particular server has the “->” prompt we’re using the ILOM.
From ILOM to Solaris:
-> start /SP/console
From ALOM to Solaris:
And of course.. Enter “#.” to return to ALOM / ILOM !!
Send Break on ILOM
set /HOST send_break_action=break
c)ontinue, s)ync, r)eset? s
bada bing! bada boom!
October 9th, 2009 by elizar
PWS-Gamania or PWS-Gamania.gen.a is a computer trojan discovered July 22, 2008. PWS-Gamania is a password stealing trojan which attempts to steal user information for certain online games.
The characteristics of this password stealer with regards to passwords stolen, sites accessed, files downloaded etc will differ, depending on the way in which the attacker had configured it. Hence, this is a general description.
PWS-Gamania is also knows as
- Trj/Lineage.BZE [Panda]
- Trojan.Win32.Vaklik.bkh [Kaspersky]
- Trojan:Win32/Meredrop [Microsoft]
- W32.Gammima.AG [Symantec]
- W32/Autorun-CL [Sophos]
My Dell D630 laptop is probably infected by this one. Good thing I am no gamer nor is there any important password this trojan can steal.
More information about PWS-Gamania can be found here: http://vil.nai.com/vil/content/v_147533.htm