Tuesday, 16 April 2013
THE NOBLE QUR'AN
|
||||||||||
|
Understanding Islam
|
||||||||||||
|
Islamic Invitation
We are concerned Muslims with various national
backgrounds, education and skills , united
by: our belief (Tawheed), with conviction
in the Qur'an
(being the last revelation from Almighty Allah (God) to mankind
revealed to his last Prophet
Muhammad (PBUH) and the Sunnah (injunctions,
laws and practical examples of the Qur'an in action) of the
Prophet Muhammad (PBUH),
and the rightly guided Predecessors (the Family and the Companions
of the Prophet Muhammad (PBUH)
and successive generations).
We claim
no affiliation with, and do not support, any sect or political
ideology which deviates from the above principles - in belief
or practice.
We ask Allah (Most Exalted
is He) to accept our efforts which we do only in seeking His
absolute pleasure and we ask His forgiveness for any mistakes or miss understanding
we have made, due to our lack of knowledge or ignorance.
Monday, 8 April 2013
IV-2 BTECH Important Units CSE
Management Science : 1,2,3,6,7,8 Units.
Web Services : 1,3,4,5,7,8 Unitshttp://www.4shared.com/rar/G7UlwGJr/WS_ASN.html
I am also keeping books WS and on blog (ASN)
http://www.4shared.com/rar/G7UlwGJr/WS_ASN.html
Tuesday, 26 March 2013
MAKE YOU LAPTOP OR PC(MUST WIFI CARD INSTALLED) AS A WIFI HOTSPOT
1. WHAT IS WIFI HOTSPOT?
A hotspot is a site that
offers Internet access over a wireless local area network through the
use of a router connected to a link to an Internet service provider.
Hotspots typically use Wi-Fi technology.
Hotspots may be found
in coffee shops and various other public establishments in many
developed urban areas throughout the world.
your pc will serve as a wifi hotspot that means it share its internet to other laptop or pc.
2. METHOD TO MAKE YOUR LAPTOP AS A WIFI
HOTSPOT.
a. goto>control panel>open network and sharing center
b. click on setup a new connection.
c. a popup window will open, select wireless ad hoc network (at the bottom of all option)
d. click next then next, after this it will ask you your network name and its encryption type and its password.
e. fill any name in network name, select wep encryption, put any password then click next.
f. after finish page it show a option to share your internet. click on that link it will connect with internet.
Setup Kickstart Server in Linux
Red Hat Linux operating system installations can be done via a network connection using a Kickstart server. It is frequently much faster than using CDs and the process can be automated.Example Kickstart Get the kickstart cfg from http server and start the install boot: linux ks=http://server.com/path/to/kickstart/file Get the kickstart cfg from nfs server and start the install boot: linux ks=nfs:server:/path/to/kickstart/file Serving the Kickstart file from nfs server through dhcp /etc/dhcpd.conf next-server 10.10.10.100; filename "/export/rhinstall/kickstart/ks.cfg"
Setup a Kickstart Server
01. Install and configure the DHCPD server
02. Install tftp server and enable TFTP service
a. yum install tftp-server b. Enable TFTP server. vi /etc/xinetd.d/tftp and change disable to 'no' c. service xinetd restart
03. Install syslinux if not already installed
a. yum install syslinux
04. Copy needed files from syslinux to the tftpboot directory
cp /usr/lib/syslinux/pxelinux.0 /tftpboot cp /usr/lib/syslinux/menu.c32 /tftpboot cp /usr/lib/syslinux/memdisk /tftpboot cp /usr/lib/syslinux/mboot.c32 /tftpboot cp /usr/lib/syslinux/chain.c32 /tftpboot
04. Create the directory for your PXE menus
mkdir /tftpboot/pxelinux.cfg
05.
For each "Release" and "ARCH" Copy vmlinuz and initrd.img from
/images/pxeboot/ directory on "disc 1" of that $Release/$ARCH to
/tftpboot/images/RHEL/$ARCH/$RELEASE
mkdir -p /tftpboot/images/RHEL/i386/4.3 mkdir -p /tftpboot/images/RHEL/i386/5.5 mkdir -p /tftpboot/images/RHEL/x86_64/4.3 mkdir -p /tftpboot/images/RHEL/x86_64/5.5
For RHEL 5.5 x86_64, do the following
mount /dev/cdrom /cdrom cd /cdrom/images/pxeboot cp vmlinuz initrd.img /tftpboot/images/RHEL/x86_64/5.5
Do the above for all releases and ARCH you want to kickstart from this server.
06. Add this to your existing or new /etc/dhcpd.conf.
Note: xxx.xxx.xxx.xxx is the IP address of your PXE server
Note: xxx.xxx.xxx.xxx is the IP address of your PXE server
allow booting; allow bootp; option option-128 code 128 = string; option option-129 code 129 = text; next-server xxx.xxx.xxx.xxx; filename "/pxelinux.0";
07. Restart DHCP service
# service dhcpd restart
08.
Create Simple or Multilevel PIXIE menu. Create a file called "default"
in /tftpboot/pxelinux.cfg directory. A Sample file named "isolinux.cfg"
is found on the boot installation media in "isolinux" directory. Copy
this file as default and edit this file as per requirement. A sample
default file is given bellow.
default menu.c32 prompt 0 timeout 300 ONTIMEOUT local MENU TITLE PXE Menu LABEL Pmajic MENU LABEL Pmajic kernel images/pmagic/bzImage append noapic initrd=images/pmagic/initrd.gz root=/dev/ram0 init=/linuxrc ramdisk_size=100000 label Dos Bootdisk MENU LABEL ^Dos bootdisk kernel memdisk append initrd=images/622c.img LABEL RHEL 5 x86 eth0 MENU LABEL RHEL 5 x86 eth0 KERNEL images/RHEL/x86/5.5/vmlinuz APPEND initrd=images/RHEL/x86_64/5.5/initrd.img ramdisk_size=10000 ks=nfs:xx.xx.xx.xxx:/ ksdevice=eth1 LABEL RHEL 5 x86_64 eth0 MENU LABEL RHEL 5 x86_64 eth0 KERNEL images/RHEL/x86_64/5.5/vmlinuz APPEND initrd=images/RHEL/x86_64/5.5/initrd.img ramdisk_size=10000 ks=nfs:xx.xx.xx.xxx:/ ksdevice=eth1
09. Install the kickstart Configurator tool. This tool will be helpful to create the kickstart configuration file.
yum install system-config-kickstart
10.
Create the kickstart config file. This file can be created using
kickstart Configuration Tool. A Sample file anaconda-ks.cfg based on
current installation of a system is placed in /root directory. We can
also use this /root/anaconda-ks-cfg as the configuration file. Copy this
file to the location specified in the default file. Make sure the
directory is NFS exported if you are using NFS for installing the OS.
11.
Modify the kickstart configuration file as per requirement. If you are
using NFS for installation, Make sure to copy the ISO images of Linux
disks to any NFS server and NFS export the directory. This
server/directory details need to be specified in the jumpstart
configuration file.
12. After creating the KS configuration files and copying the ISO images, the installation can be started.
13 Basic Safety Rules for Social Networking
Set up privacy settings for your online profile
Don’t publish all the intimacies of your life—your hatred for your
boss or an impending divorce — don’t become public when people find you
in a search. Facebook, for example, lets you decide who can see your
information and pictures. You can limit exposure to “friends” or even
just a few people on your list.
Don’t rush to friend your children!
There are tons of teen or college-age kids on these sites; wait to
see if they reach out to you. There are some things you really don’t
want to know about your little angels. Plus, they probably like having
their own parent-free space on the Web.
Use LinkedIn and Facebook to stay in touch with former colleagues
These days (unfortunately) you never know when you’ll need a
reference for a new job or opportunity. It’s always better to keep your
professional network strong and well-updated.
Don’t post boring status updates
Please don’t update your Facebook status every single second of your day. If you must share, save those comments for Twitter (and please don’t have your Twitter feed post to Facebook—even though you can). Trust us, your associates don’t want a dull rundown of how you overslept this morning, are having tummy issues, and can’t find that missing sock.
Think twice before friending your employees
Give a good thought before friending your employees on social sites.
They don’t want to offend you by saying no, but they also don’t want you
to see their wall posts post work hours, they have probably had enough
of you all day!
Don’t randomly add strangers
Don’t “friend” strangers and waste your time inspecting or commenting
on their profiles. Same goes for people you haven’t seen in years.
Social-networking sites are for staying in touch—not stalking!
Limit what you share
It’s fine if you want to take a “Which serial killer are you?” quiz.
When you complete all of the multiple-choice questions, however, you’ll
almost certainly be asked to invite a dozen or so people to take the
quiz, too; there’s no need for this unless you think they’ll really
enjoy it. Look for a ‘Skip this step’ or ‘Continue to result’ button (in
tiny type) somewhere on the page, click it, and you won’t have to send
invitations to anyone as a precondition to getting your quiz results.
Clicking the ‘Skip’ button on the following screen will prevent the quiz
from showing up on your wall or being shared on your friends’ walls.
Limit Facebook chat
Just because someone has a Facebook window open doesn’t mean they’re
automatically available for a chat session. Facebook Chat is like any
other instant messaging platform–use it appropriately, and recognize
that your friends may be too busy to respond immediately, especially
during business hours.
No Pokes
If you are over the age of 16, don’t “poke” people–seriously.
Avoid making Groups for official concerns
One disconcerting trend among many Facebook users involves creating a
Group for a business concern, and then inviting everyone under the sun
to join the group. This is a misuse of the feature–and bad manners–since
Groups are designed to serve as gathering places to discuss genuine
leisure, cultural, social, or other common interests, not as ad hoc copy
shops. Common courtesy should impel you not to create a Group for your
business–but if you insist on doing so anyway, please invite only
employees to join the Group. If your business needs a Facebook presence,
create an official Page for it; then, if you must, invite friends to
becomes fans of that Page.
Beware of embarrassing photos
Resist the temptation to post every last photo from your birthday
party on Facebook, particularly images that may cast your guests in an
unflattering light. If you have any doubt, ask the subjects of any iffy
pics in advance whether they’d mind your posting the shots; then abide
by their wishes.
Tag smartly
The same thing goes for tagging: The people in a picture might not
object to its being online as long as their names are not associated
with it. It is no breach of etiquette to untag yourself from any
photograph. Remember, though, that untagging is permanent: You can’t be
retagged to a photo once the tag is removed.
Ignore Away
You are under no obligation to acknowledge a Facebook friend request,
whether it comes from a stranger or from someone you know but don’t
want as part of your digital life. After all, you wouldn’t be obliged to
seat visitors at your dinner table if they showed up without warning at
your house at 7 o’clock. (One alternative way of dealing with this
situation is to add iffy contacts to a severely restricted limited
profile list.) On the flipside, if you want to friend a stranger (for
whatever reason), add a note of explanation to your friend request,
explaining who you are and the reason for your request.
Subscribe to:
Posts (Atom)