MSSQL 2005 Tips
Simple and complete examples for performing common tasks
with Microsoft SQL Server 2005.
Performance Monitoring on Linux
Demonstrated examples using oprofile, IOzone, vmstat, smartmontools, and
the ps command are covered in this tutorial. This work-in-progress
covers profiling the kernel, generating stress tests, examining
memory swapping, querying the number of hours your drive has been
spinning plus getting the current, maximum and minimum temperatures.
Postfix 2nd Instance for Sender-based Routing: Multiple Gmail
and Comcast Accounts.
Configure your home system to support several Gmail accounts, and
additionally, Comcast and or other ISP accounts that require
individual authentication rules based on the sending address. This
tutorial walks you through configuring a second instance of Postfix,
on a second IP address (same NIC), with sender-based routing.
Linux Quota Tutorial
This tutorial walks you through implementing disk quotas for both users and
groups on Linux, using a virtual filesystem, which is a filesystem created
from a disk file. Since quotas work on a per-filesystem basis, this is a way
to implement quotas on a sub-section, or even multiple subsections of your
drive, without reformatting. This tutorial also covers quotactl, or quota's
C interface, by way of an example program that can store disk usage in a
SQLite database for monitoring data usage over time.
Gmail on Home Linux Box using Postfix and Fetchmail
If you have a Google Gmail account, you can relay mail from your home linux system.
It's a good exercise in configuring Postfix with TLS and SASL. Plus, you will learn
how to bring down the mail safely, using fetchmail with the "sslcertck" option, that is,
after you have verify and copied the necessary certificates. You'll learn it all
from this tutorial. And you'll have Gmail running on your local Postfix MTA.
Breaking Firewalls with OpenSSH and PuTTY
If the system administrator deliberately filters out all traffic except
port 22 (ssh), to a single server, it is very likely that you can still
gain access other computers behind the firewall. This article shows how
remote Linux and Windows users can gain access to firewalled samba,
mail, and http servers. In essence, it shows how openSSH and PuTTY can be
used as a VPN solution for your home or workplace.
Create your own custom Live Linux CD
These steps will show you how to create a functioning Linux system, with the
latest 2.6 kernel compiled from source, and how to integrate the BusyBox
utilities including the installation of DHCP. Plus, how to compile in
the OpenSSH package on this CD based system. On system boot-up a filesystem
will be created and the contents from the CD will be uncompressed and
completely loaded into RAM -- the CD could be removed at this point for
boot-up on a second computer. The remaining functioning system will have
full ssh capabilities. You can take over any PC assuming, of course,
you have configured the kernel with the appropriate drivers and the
PC can boot from a CD.
This article explores the power and simplicity of sqlite3, first by starting with common commands and triggers,
then the attach statement with the union operation is introduced in a way that allows multiple tables, in separate
databases, to be combined as one virtual table, without the overhead of copying or moving data. Next, the simple
sign function and the amazingly powerful trick of using this function in SQL select statements to solve
complex queries with a single pass through the data is demonstrated, after making a brief mathematical
case for how the sign function defines the absolute value and IF conditions.
Lemon Parser Tutorial
Lemon is a compact, thread safe, well-tested parser generator written by D. Richard Hipp. Using a parser
generator, along with a scanner like flex, can be advantageous because there is less code to write.
You just write the grammar for the parser. This article is an introduction to the Lemon Parser, complete
NTP, UTC, and Working with Time on Linux
This article defines what is meant by UTC, shows you how to use the date command to calculate the date for any timezone including with
or without dst. Plus you will see how to setup and confirm that NTP is working. There is also a program to calculate sunrise and sunset given
longitude and latitude in degrees.
There are over 200 Linux tips and tricks from using encryption, tar, cpio, setting up multiple IP addresses on
one NIC, tips for using man, putting jobs into the background, using shred, watch who is doing what on your
system, listing system settings, IPC status, how to make a file immutable so that even root cannot delete,
ssh key pair generation, keeping 12 months of backups in the system logs, low level tap commands (mt),
mount an ISO image as a filesystem, getting information on the hard drive, setting up cron jobs, look command,
getting a bigger word dictionary, find out if a command is aliased, ASCII codes, using elinks, screen commands,
FTP auto-login, Bash brace expansion, Bash string operators, for loops in Bash, diff and patch, script,
change library path (ldconfig), monitor file usage, --parents option in commands, advance usage of the
find command, cat tricks, guard against SYN flood attacks and ping, special shell variables, RPM usage,
finding IP and MAC address, DOS to UNIX conversion, PHP as command line scripting language, Gnuplot,
POVRAY and making animated GIFs, plus a lot more.
Virtual Filesystem: Building
a Linux Filesystem from an Ordinary File
You can take a disk file, format it as ext2, ext3, or reiser filesystem and then mount it, just like a physical drive. Yes, it then possible to read and write files to this newly mounted device. You can also copy the complete filesystem, since it is just a file, to another computer. If security is an issue, read on. This article will show you how to encrypt the filesystem, and mount it with ACL (Access Control Lists), which give you rights beyond the traditional read (r) write (w) and execute (x) for the 3 user groups file, owner and other.
How to Compile 2.6 kernel for RedHat 9 and 8.0 and get Fedora Updates
Upgrading Redhat 9 or 8.0 to the 2.6.x kernel. This is a step by step approach on how to compile the kernel
from source, then, get yum updates for all your other packages. There is also information and examples on
writing a 2.6 kernel module.
MySQL Tips and Tricks
Find out who is doing what in MySQL and how to kill the process, create binary log files,
connect, create and select with Perl and Java, remove duplicates in a table with the index command,
rollback and how to apply, merging several tables into one, updating foreign keys, monitor port 3306
with the tcpdump command, creating a C API, complex selects, and much more.
Comcast Email on Home Linux Box with Sendmail
Suppose you have accounts on your home Linux system that differ from the name of
your email accounts from your ISP. For instance, my email account (from comcast) is mchirico but the account I
have on my Linux box is chirico. What I wanted to do, is use the local chirico
account to get, create, send, email automatically as email@example.com. This
article will show you how to do that.