Cisco Networking: Configuration Saving

Your Cisco network configuration is stored in two main locations: One is in RAM, and the other is in the configuration that is in use, or the running configuration. When you type commands, those commands are activated immediately and are stored in the running configuration, which is stored in RAM

 

You can use two commands to save your configuration, the write command or the copy command. The write command is deprecated, but would look like this

Router#write memory
Building configuration...
[OK]

The newer version of the command is the copy command, which looks like

Router#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]

The deprecated command is short and single-purposed, not flexible with full options like the newer command.

For any command you only have to type as many letters as the IOS requires to uniquely identify the command. So you will find that a lot of old-timers use the following command as a reflex after they complete changes and when they exit Global Configuration mode to copy their current running-config to the startup-config:

wri mem

The copy command offers more flexibility and options. Not only can you copy the running configuration data to the startup configuration file, but you could copy it to a file on flash or to a TFTP server on your network. The copy command is only a little more to type:

copy run sta

iOS 4.3.3: Install, Unthethered Jailbreak, Unlock with Sn0wbreeze

This isĀ  a step-by-step guide to Install, Jailbreak and unlock iPhone 4.3.3. You may choose to jailbreak iPod Touch, iPad with the same method except leaving the options that are only available to locked iPhones. You should jailbreak factory unlocked iPhone with Redsn0w

Continue reading iOS 4.3.3: Install, Unthethered Jailbreak, Unlock with Sn0wbreeze

Plesk Login prompt error

Plesk Login prompt Issue

A strange login prompt is presented when trying to view a website on a windows plesk account , even though the website directory is not password protected.

The Fix:
This issue results from the anonymous account password used to deliver the site to public web viewers , getting out of sync with the main account password. To fix, just re sync anonymous password by issuing the following command in the run dialog:

"%plesk_bin%\websrvmng.exe " --update-anon-password --domain-name=yourdomain.com

How to remove Tomcat on cPanel

Want to remove Tomcat from cPanel?

Log-into your server as root using ssh:

Execute the following command to stop the Tomcat process:
# /usr/sbin/stoptomcat

…and to remove the next files, enter:
# rm -f /usr/sbin/starttomcat
# rm -f /usr/sbin/startomcat
# rm -f /usr/sbin/stoptomcat

Finally, remove all mod_jk lines from httpd.conf, including addmodule, loadmodule, and include lines.

FTP Tutorial : Overview

FTP is a commonly known and used acronym for the words ‘File Transfer Protocol’. FTP has become an imperative part of the World Wide Web (for both surfers downloading files and webmasters building websites) due to the reality of it being the fastest way to send and receive files from one computer to another over the internet. If you plan on building and maintaining a website of your own, it is important that you have the necessary skills and information to perform basic commands through an FTP client software
Continue reading FTP Tutorial : Overview

PHP/MySQL Tutorial

By Graeme Merral : Open source has brought a lot more than Linux to the computing world. It has also given us PHP and MySQL. According to Graeme, PHP and MySQL are the world’s best combination for creating data-driven sites. In the first installment of this three-lesson tutorial, our Kiwi guide covers everything you need to know to begin developing database hubs. He gives instructions for installation on both Unix and Windows, and then goes on to show some simple scripts that will insert information into a database and display that data on a Web page.
Continue reading PHP/MySQL Tutorial

What is Link Popularity?

The theory goes something like this: The search engine Powers That Be have decided that if other sites are linking to your site, it must be a winner; therefore, it deserves a boost in rankings (when all else is equal). If you think about it, this makes a lot of sense. People link to good sites, not bad ones.
Continue reading What is Link Popularity?

Keyword Density: How Much Is Too Much

Copywriting for search engines is one of the more important aspects of the SEO industry. Ensuring your content is relevant and keyword rich is an effective method to “impress” the search engines. By impress, I mean that the majority of search engines value optimized content with keyword-laden text. However, if you have too much keyword density, Google and others can consider this spam, and may penalize your site.
Continue reading Keyword Density: How Much Is Too Much