IPHONE 7 Best Black Friday Deal £25.99

ENTER: BLACKNOV32 to get £100 off

http://www.mobiles.co.uk/apple-iphone-7-32gb-rose-gold.html?tid=EF5QMAUG16&affiliate=awinm-103504&awc=380_1479397393_8a8e244caf2f85401ce8be255dbe4ed0&utm_source=Awin&utm_medium=Affiliate&utm_campaign=TechRadar

 

£225.00 handset cost

  • Unlimited mins
  • 2GB data
  • Unlimited texts
Only

£25.99

Per month / 24 month

Voucher -£100.00
= Save-£100.00

  Total
= £25.99 per month
To pay today Total
= £ 125.00

 

How to restore Cisco IOS config from backup using console

  1. Install the TeraTerm -> Start and use COM port to connect to console

You console configuration might be as follow

COM1

Speed 9600

Data Bits 8

Stop Bits 1

Parity None

Flow Control None

2. Connect to switch/switch using console

enable

copy xmodem: run (This will copy the config to running config)

Once the transfer is started navigate in Teraterm to

File -> Transfer -> XMODEM -> Send… then select the file.

you can then run

show running-config

and you configuration should be there.

 

 

How to rename file in Cisco Flash IOS

If you have need to rename any file in the Cisco flash then you can use the following

dir – to display list of files in flash

then

2  -rwx     8055040   Mar 1 1993 14:24:51 +00:00  c2960-lanbasek9-mz.122-50.SE1.bing

then type

rename flash:c2960-lanbasek9-mz.122-50.SE1.bing c2960-lanbasek9-mz.122-50.SE1.bin

then confirm destination file

Destination filename [c2960-lanbasek9-mz.122-50.SE1.bin]?

once done .

dir

2  -rwx     8055040   Mar 1 1993 14:24:51 +00:00  c2960-lanbasek9-mz.122-50.SE1.bin

We can see that the file has been renamed correctly.

Postfix Cheatsheet

Check the queue

mailq – Check emails queue (then with ! are on hold)

Move all deferred messages to the hold queue

postsuper -h ALL deferred

Release 200 emails from holding back to deferred

mailq | awk ‘ /^[0-9A-F][0-9A-F]/ {print $1}’ | grep ! | head -n 200 | tr -d ‘!’ | postsuper -H –

Delete messages from the hold queue sent by ‘domain.com’

mailq | awk ‘ /^[0-9A-F][0-9A-F]*.*domain\.com$/ {print $1}’ | tr -d ‘!’ | postsuper -d –

Delete messages from the hold queue sent by ‘example@domain.com’

mailq | awk ‘ / example.domain\.com$/ {print $1}’ | tr -d ‘!’ | postsuper -d –

mailq | grep -E “^[A-Z0-9]+” | grep example@domain.com | cut -c1-12 | postsuper -d –

postqueue -p | tail -n +2 | awk ‘BEGIN { RS = “” } / example@domain\.com/ { print $1 }’ | tr -d ‘*!’ | postsuper -d –

Move 100 messages in the hold queue back to deferred

mailq | awk ‘ /^[0-9A-F][0-9A-F]/ {print $1}’ | grep ! | head -n 100 | tr -d ‘!’ | postsuper -H –

Block an IP/Subnet from sending email

Add a /etc/postfix/access file with content like the following. The first line blocks a single IP, the second blocks a subnet

10.2.18 REJECT
10.2.64.1 REJECT

Run ‘postmap /etc/postfix/access’ to create the lookup table.

Add the following line into /etc/postfix/main.cf:

smtpd_client_restrictions = check_client_access hash:/etc/postfix/access, permit

The ‘permit’ statement at the end is very important to allow other email.

Reload postfix to apply the block.

Cisco CCENT Notes

Please find my notes below for CCENT exam.

  1. OSPF (Open Shortest Path First) uses cost as metric.
  2. Dotted-decimal equivalent of
    1. /15 is 255.254.0.0.0
    2. /16 255.255.0.0
    3. /24 255.255.255.0
    4. /32 255.255.255.255
  3. OSPF  is NOT called an advance distance-vector protocol
    1. EIGRP , RIP1, RIP2, Babel is an advanced distance-vector protocol
    2. OSPF OR IS-IS is link state router protocol 
    3. Link-state protocol is performed by every switching node in the network. The concept is that every node construct a map of connectivity to the network, in the form of graph, showing which nodes are connected to which other nodes. each node then independently calculates the next best logical path from it to every possible destination in the network. The collection of best paths will then form the node’s routing table.
    4. Distance-vector routing protocols, which work by having the each node share it’s routing table with it’s neighbors. in the link-state protocol the only information passed between nodes is connectivity related. The link-sate algorithms are sometimes called characterized informally as each routers “telling the world about it’s neighbors”.
  4. Area border routers are the routers which are in a least two areas in the same time. Any router that is member of two areas in an area border router, or ABR, by definition.
  5. show processes cpu – can be used  to determine a router’s capacity to generate debug output.
  6. Source and destination addresses, source and destination ports and protocol is used in the IP extended access list for permitting or denying packets.
  7. Backoff on a an Ethernet network is the retransmission delay that’s enforced when a collision occurs. n a variety of computer networks, binary exponential backoff or truncated binary exponential backoff refers to an algorithm used to space out repeated retransmissions of the same block of data, often as part of network congestion avoidance.
  8. show access-lists – allow to view the entire content of all access list.
  9. SSH – application layer protocol sets up a secure session that’s similar to Telnet.
  10. Only 1 collision domains  exists when a hub is used.
  11. L type is /32 mask in routes in the routing table.
  12. bandwidth 64 – command sets the bandwidth metric of Frame Relay connection to 64000 bps.
  13. FCS section is the Error detection in the ethernet II Frame
  14. Incrementing of runts on the interface is caused by collisions 
  15. False. Layer 2 switches and bridges are faster than routers because they don’t take up time looking at the Data Link layer header information.
  16. The logging synchronous command causes the system to return you to your previous promt after displaying

Web Testing Tool and Site

HP Load Runner

http://www8.hp.com/us/en/software-solutions/loadrunner-load-testing/try-now.html

WebLoad

Why WebLOAD new design

Searching Multiple file using zgrep

find -name \*.eml.gz -print0 | xargs -0 zgrep "STRING"

You have to escape the first ‘*’ so that the shell does not interpret it. “-print0” tells find to print a null character after each file it finds; “xargs -0” reads from standard input and runs the command after it for each file; “zgrep” works like “grep”, but uncompresses the file first.

Added for myself  for quick info from here:

http://unix.stackexchange.com/questions/187742/how-do-i-grep-recursively-through-gz-files