Mountain Climbing Journal (MCJ) is a general purpose journal application that can be used to explore links between ideas, people, places, things, and times. In the realm of network administration, this can be used to store the results of, say, an Nmap scan, and proceed to wrangle with the associated security and networking issues the […]
Network Auditing Using the Mountain Climbing Journal
Word Abbreviation With Vi
You can use word abbreviation with vi to insert common chunks of code, commands, or text into your documents. Simply type esc: (to go into command mode) and enter ab abbr phrase. For instance, say you were editing html, and you wanted sztt to enter standard table tags of BORDER=”0″ BGCOLOR=”#E0E0E0″ WIDTH=”99%”, you could enter: […]
LiveJournal Systems Documentation Example
There is a glorious example of systems documentation of the LiveJournal system here. It includes how to install, administer, and program the system. Further, the documentation was generated with DocBook and XSL stylesheets, which means that it is relatively easy to produce documentation that looks exactly like this. Another benefit of using something like DocBook […]
Disabling Shutdown Reasoning on Windows Server 2003
When you shut down or restart Windows Server 2003, you are required to explain yourself: The only way to shut down is to enter something in the lower box: Whatever. Makes us want to punch the screen in defiance, like when XP gently asks if you have forgotten your password. Now, you might think this […]
Testing Daylight Savings Time on Microsoft Windows
There is a curious and strangely insidious problem associated with the change of the start of Daylight Savings Time. One thing that is counter intuitive for some is that just because information is stored in GMT for stuff like future appointments, it doesn’t mean that there won’t be problems when the time changes. The exact […]
Creating a One Way External Trust Between Windows 2003 and NT (MMC)
To allow users in an NT domain to use resources on a Windows 2003 domain, you need to set up a one way external trust. In NT-style language, this means that the Windows 2003 domain (trusting) trusts the NT domain (trusted). In User Manager for the NT domain, select policies->trust relationships, and add a trusting […]
Using sar – Part 1
Getting Started sar (System Activity Reporter) is an oldy but a goody that should be in your bag of tricks and installed on every *nix system you administer. It collects and logs system data at regular intervals, allowing analysis of system actity historically, trending, baselining and much much more. It comes as part of the […]
Pstree
Use the pstree command to list processes in a tree format. It will show the process owners. Default is to start the root of the tree at init: u-1@srv-1 u-1 $ pstree init-+-3*[agetty] |-ahc_dv_0 |-bdflush |-crond—2*[sh—perl—sh-+-grep] | `-iget-quote] |-cupsd |-devfsd |-keventd |-khubd |-kjournald |-kscand |-ksoftirqd_CPU0 |-kswapd |-kupdated |-lockd |-login—bash—startx—xinit-+-X | `-sh-+-icewm-+-Eterm—bash—ssh | | |-Eterm—bash—pstree | […]
Using sar – Part 2
Using sar Part 2 – Making it Play In Part 1 of this article, we looked at basic invocation of sar and how it works. In Part 2 of this article, we’ll use sar to look at disk, network, and CPU activity. In Part 3, we’ll look at the options available to report on the […]
Setting Time Synchronization With Windows 2000
We have some Windows 2000 servers we administer that are authenticating against some NT domain controllers. You can set up your Windows 2000 servers to synchronize time with an outside source: C:\>net time /querysntp This computer is not currently configured to use a specific SNTP server. The command completed successfully. For a list of NTP […]
Hail Support
Have you ever had a user call you, and the thought of guiding them through running ipconfig or winver is daunting? Hail Support is a program that users can run to submit a support request. The program runs identically on MacOS X (Intel and PowerPC), Windows (NT and 2000+), and GNU/Linux (GTK 2) systems, and […]
Don’t Wrap in the Middle of a Word, and Display Partial Paragraphs in Vim
A couple things that really annoy me are the default vim settings where words get chopped in the middle and paragraphs don’t display correctly. I’m sure there is a reason for the defaults, but here is how you change this while in vim: :set linebreak :set display+=lastline If you put this in .vimrc in your […]
Slipstreaming SP2 into Microsoft Windows Server 2003 Install Files
Slipstreaming is the application of service pack files into the original install files from the distribution media so that you can point to one location when adding components to Windows Server 2003. The command with Service Pack 2, and probably others is: sp2 /integrate:c:\win2003std\ sp2 is the name of the service pack .exe, and win2003std […]
Services Subkey Entries
Beware! Make sure you have a backup of the registry and are 100% confident of the syntax of the entries before you change anything. If you mess up, your NT system may never boot again, and you will have to reinstall NT. Try to tweak the registry indirectly whenever you can through control panel/services, system […]
Using Strace to Determine What Files a Program Opens
We were recently configuring AIDE, and didn’t pay attention to the defaults in the configuration when we compiled it, and didn’t know where aide.db.new was going to after running aide initially. Sure, lsof would work while to porgram is running; however, we needed to know what files were open while the program was running. Strace […]
In Case of Emergency… Yodel
Your servers are all monitored with Nagios. Splunk is constantly eating your logs, hence why we’ve added some alternative to splunk here. You’ve got your EPO switch, your UPS, your temperature sensors and surveillance camera. The cables are tied up as neat as a Mouseketeer’s pigtails, remote management interfaces are quietly waiting for a server […]
Using the CACLS command
The cacls command is used to edit and display file permissions on NTFS partitions. Here is a list of the options: D:\>cacls Displays or modifies access control lists (ACLs) of files CACLS filename [/T] [/E] [/C] [/G user:perm] [/R user […]] [/P user:perm […]] [/D user […]] filename Displays ACLs. /T Changes ACLs of specified […]
Changing the Default Crontab Editor
The default crontab editor is nano on some systems. This is a pain. You can change this by setting the EDITOR environment variable. In BASH: srv-4 / # set | grep EDITOR EDITOR=/bin/nano srv-4 / # which vi /usr/bin/vi srv-4 / # export EDITOR=/usr/bin/vi srv-4 / # set | grep EDITOR EDITOR=/usr/bin/vi _=EDITOR srv-4 / […]
Imagine, Express, Observe, Improve, Converge
I encourage every systems administrator, engineer, or architect to watch this. The birth of new systems is presented in three stages: bootstrapping, configuration, and command and control. These stages are analyzed with traditional procedures vs. the vision of Adam and Ezra of a better way. Bootstrapping is facilitated by cloud computing; configuration focuses on expressions […]
Our Favorite NT Registry Entries
Beware! Make sure you have a backup of the registry and are 100% confident of the syntax of the entries before you change anything. If you mess up, your NT system may never boot again, and you will have to reinstall NT. Try to tweak the registry indirectly whenever you can through control panel/services, system […]