Author: Cornel Caba

The Job Scheduler provides administrators the ability to schedule recurring commands or “jobs” on their switch. A feature of the Job Scheduler is the ability to schedule a command triggered by certain pre-defined events such as switch reboot. There is no prompt for user input with this feature. Administrators using this feature can schedule such commands as enabling or disabling ports, turning on or off LEDs and Power-Over-Ethernet commands. Syntax HP_Switch# (config) job <name> atjob <Name> at [HH:]MM [on [MM/]DD][config-save]<Command>job <Name> at <Event> [config-save] <Command>no job <Name> Schedules a command that will run automatically in the date and time given.…

Read More

1. Decrypt files right-click .gpg file select Services > OpenPGP: Decrypt File If the passphrase for your OpenPGP key is not in the cache or stored in macOS Keychain Access pinentry will ask for it. Once decryption is finished you will see a notification. Click the notification to see the Verification Results. For signed file, GPG Services shows the result of the signature verification along with an option to show the decrypted file in Finder. 2. Decrypt text To decrypt an encrypted text message mark entire PGP message from—–BEGIN PGP MESSAGE—– to —–END PGP MESSAGE—– right-click message and select Services > OpenPGP: Decrypt Selection…

Read More

WhatsApp is a popular messaging app and is used by millions of users to communicate with friends and family members. There are times when you need to contact an unknown person on WhatsApp for some work. So, for this, you usually need to save the phone number in order to drop a message on WhatsApp. This could be annoying if you just need to reach out to any service on WhatsApp for a little work and you can’t do that without saving the phone number. Additionally, saving an unknown person’s number also means that the individual will be able to…

Read More

Windows Server 2019/2016 Product Key Free Download Latest OEM RTM version. It is a Full Bootable ISO Image of Windows Server. This is a complete offline installer and standalone setup for Windows Server 2019/2016 Edition. This would be compatible with 64-bit windows. Today, I will show you how to activate Windows in your VPS or dedicated server for FREE using the KMS client product key. Although the KMS license is valid for 180 days only there is no limit on the number of activations. So, you can renew it whenever you want. Actually, the license will be renewed automatically every…

Read More

A network topology is so essential for various reasons. First, it is key to how well your network works. The right network topology can improve the performance, reliability, and security of your network. In this post, you’ll learn what a network topology is, how it is connected, classified, and types. Then, in the last section, we’ll introduce how to design and map them using the software. What is Network Topology? Network topology is the physical and logical layout of the network in which various nodes, devices, and connections are arranged to relate to each other. There are many methods to…

Read More

If command lines are your bread and butter, you probably already know about esxcli commands and how they are used to perform management and configuration tasks on ESXi. If on the other hand, the esxcli system is all new to you, this post will hopefully give you a head start. For the time being, you just need to know that esxcli commands are run from the ESXi shell. If the command line is something you want to delve into, consider having a look at the PowerCLI Primer series. With that out the way, let’s get on with the show labelled…

Read More

When you troubleshoot the problems of Windows Update, you often come across different error codes. As a rule, when you see a new error in the windowsupdate.log, setup log or Control Panel, you need to googling and compile all available information about the error code you need. For example, an administrator has come across error 0x80070422 in the log. What does it mean? From the windowsupdate error code it is absolutely not clear what the problem is. What if you could convert it in something more understandable, like ERROR_SERVICE_DISABLED? In this case you can clearly see that there is an issue with disabled…

Read More

This is the most comprehensive list of Active Directory Security Best Practices online. In this guide, I’ll share my recommendations for Active Directory Security and how you can improve the security of your Windows domain environment. You don’t have to spend a fortune to improve security there are many no cost and low cost solutions that I’ll show you in this guide. Let’s dive right in. Active Directory Security Concerns In many organizations, Active Directory is the centralized system that authenticates and authorizes access to the network. Even in the cloud or hybrid environments, it can still be the centralized…

Read More

Use redirection, for example: ping 192.168.1.1 -t > filename.txt This will redirect all (standard) output from the program into filename.txt, which will be created if it doesn’t exist and overwritten if it does. You can use >> instead of > to redirect the output to a file and append the results to the end of the file, instead of overwriting (with thanks to @Jane T for the reminder). Note that you will not receive the normal on-screen output if you do this. Update in response to comment To delay between pings and record the time of each, you can do…

Read More

Have you ever wondered which text editor is the best one to use in Linux? One of the best things about the world of Linux is the plethora of ways to get jobs done. That includes programming and editing configuration files in the command line. Depending on who you ask, Linux aficionados might tell you to use Emacs, Vi/Vim, or Nano. It is a fiercely debated topic. Emacs and Vi/Vim are complex and powerful text editors while Nano is a lightweight, simplified editor. While it’s fun to have light-hearted debates about which command-line text editor is the best text editor to…

Read More