Archive for category Uncategorized

Private IPv6 Address Range Generator

Until one can actually get an IPv6 address range from your ISP, you may want to use “private” addresses for internal networks and testing; here’s a link that will generate one for you.

Leave a comment

The Argument against Disabling IPv6

The following was taken from this link.


It is unfortunate that some organizations disable IPv6 on their computers running Windows Vista or Windows Server 2008, where it is installed and enabled by default. Many disable IPv6-based on the assumption that they are not running any applications or services that use it. Others might disable it because of a misperception that having both IPv4 and IPv6 enabled effectively doubles their DNS and Web traffic. This is not true.


From Microsoft’s perspective, IPv6 is a mandatory part of the Windows operating system and it is enabled and included in standard Windows service and application testing during the operating system development process. Because Windows was designed specifically with IPv6 present, Microsoft does not perform any testing to determine the effects of disabling IPv6. If IPv6 is disabled on Windows Vista, Windows Server 2008, or later versions, some components will not function. Moreover, applications that you might not think are using IPv6—such as Remote Assistance, HomeGroup, DirectAccess, and Windows Mail—could be.


Therefore, Microsoft recommends that you leave IPv6 enabled, even if you do not have an IPv6-enabled network, either native or tunneled. By leaving IPv6 enabled, you do not disable IPv6-only applications and services (for example, HomeGroup in Windows 7 and DirectAccess in Windows 7 and Windows Server 2008 R2 are IPv6-only) and your hosts can take advantage of IPv6-enhanced connectivity.

2 Comments

Where is your computer connecting to?

Hello everyone, here’s a quick command to allow you to view the current internet connections that your computer has ‘established’.


  1. Find your Command Prompt icon, right click on it and select “Run as administrator”.
  2. Next, type the following command: netstat -abf 5 | find “ESTABLISHED”
  3. Press ENTER.
Note: The command line, and its parameters, in step 2 work as shown for Windows 7. You can also save the contents to a text file by adding ” > c:\Results.txt” to the end of the command.


Leave a comment

Record Your Mac OS X Desktop

Unlike Windows and Linux, there aren’t as many free applications/utilities for OS X. So, what if you want to record your OS X desktop; is there an easy and free way of doing this task?

Well, there is…it’s called QuickTime Player – and it comes free with Mac OS X.

Here are the steps on how to achieve this:

  1. Open your “Applications” folder
  2. Click to launch “QuickTime Player”
  3. Now click on “File” and select “New Screen Recording
  4. When the “Screen Recording” window comes up, click on the “record” button
  5. You’re going to asked if you really want to record, click on “Start Recording
  6. When you’re done recording, simple click on “Stop Recording” on the menu bar (button’s located on the upper right-hand corner)
  7. Once you’ve stopped your screen recording you’ll be asked to save your “movie”; select the file format to record this movie
  8. Done!

 

From step 3. New Screen Recording

From step 4. Screen Recording

From step 5. Screen Recording 2

From step 6. Stop Recording

From step 7. Save Recording

Leave a comment

Secure my Google+

So the new kid in the block, Google+, has made an impression on me so far. There are a few things still that need some polishing; however, I think I personally like Google’s new product. With that said, how can I secure by Google+ profile?
First, let’s start by editing your Google+ profile by clicking on the “Edit Profile” icon. Once you’re in “edit mode” now you can change many privacy settings in your  Google+ profile.
Up until now, the only profile setting that is public by default, and can’t be changed, is your gender option; all other profile setting can be modified to make them private. (Update: You can now privatize the “gender” field)

Let’s begin.

Who can contact you via email.
This option sits right below your profile picture. When in profile edit mode, you can change who can contact you via emails.
Step 1. Send Email 1 Step 2. Send Email 2

Protect who can view your circles.
This feature prevents other people from viewing who is in your circles or network. Where is this section that I’m talking about? This is the section that shows just about below your profile picture. When you click in this area, then you’ll be asked what you wish to display – people in your circles or people who have you in their circles. You can either select both, one or the other, or none. I like this flexibility.
Step 1.View Circles 1 Step 2. View Circles 2

Protect your – Introduction.
By default, this section is public for everyone to read.
Agan, once in “edit mode” click on the Introduction field, and this will give you the opportunity to choose who can read your Google+ profile introduction. As you type your Google+ introduction, for the world or just a few, to read, you are given the option to select who can view it. Those options are given to you by clicking on the drop down box that’s just below the introduction text box.
Step 1. Introduction 2 Step 2. Introduction 1

Protect your – Bragging rights
By default, this section is public for everyone to read.
To modify privacy settings for this section, you pretty much have to do the same as in the previous section (Protect your – Introduction); click on the section and then you’ll have the options to set your “bragging rights” in addition to set privacy settings.
Step 1. Bragging Rights 2 Step 2. Bragging Rights 1

I think you get the idea on how to protect your privacy in the new Google+ networking site. All the other profile sections can be protected the same way as the previous sections that I’ve mentioned so far, so please take the time to set the privacy settings to your liking.
As I find new, and improved, features in the new Google+ I will post them in this site.

Leave a comment

Introduction to ZABBIX 1.8.1

I’ve been a Cacti user for quite some time now; however, recently I was introduced to Zabbix by a visiting co-worker of mine.

Installation was pretty straight forward, as a matter of fact I have it now running in the same Linux virtual machine as my Cacti installation. I will not talk much about installing Zabbix on a Linux box as there are many documents that discuss this topic.

However, I will discuss the steps of how to monitor Windows servers with Zabbix. From a new Zabbix user perspective, this task was pretty challenging – especially having to gather information from the many threads in Zabbix’s forums.

So, here’s what must be done in order to monitor your Windows servers after Zabbix has been successfully installed.

I won’t go into details on how to setup a Windows hosts in Zabbix; however, the easiest way, in my opinion, to monitor Windows servers is by loading Zabbix 1.8.1 Windows’ agent (download the executable from here). Now, in Zabbix web console, go to Configuration, then Hosts, click on Create Host. At this point type the host name, select a group for this host, select a template, type in a dns name for this server (if there is one), type an ip address for this server, and choose whether Zabbix will communicate with the server’s agent either via ip or dns name. When you’re ready, click Save and you’re done. I’ve attached a screenshot to help you with this step.

The template you picked, during the host creating process, plays a big role in how Zabbix will monitor this host. The windows template will provide you with about 30 items, and these items are the objects that you will use to help you monitor your server. Take the time to familiarize yourself with the items page. Later on, these items are the objects you will use in your graphs.

One item that’s missing from the Windows template is the NIC’s bandwidth utilization. I will go in details on how to create this item. The template does provide items for CPU, memory, disk space, etc.

So, I’m going to give details on how to create the NIC’s bandwidth utilization item.

Leave a comment