Monday, November 17, 2008

Definisi System Administrator dan Network Administrator

Di bawah ini difinisi System Administrator dan Network Administrator saya ambilkan dari http://en.wikipedia.org/wiki/System_administrator dan http://en.wikipedia.org/wiki/Network_administrator



A system administrator, systems administrator, or sysadmin, is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology department.

The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff. A System Administrator must demonstrate a blend of technical skills and responsibility.
Contents
[hide]

* 1 Skills
* 2 Related fields
* 3 Training
* 4 Duties of a system administrator
* 5 System Administrator Privileges
* 6 See also
* 7 References
* 8 External links
o 8.1 Certification Organizations
o 8.2 Periodicals
o 8.3 Conferences
o 8.4 Books
o 8.5 Online Resources
o 8.6 Technology Unions and related links
o 8.7 Articles

Skills

The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails a knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers.

However, perhaps the most important skill to a system administrator is problem solving -- frequently under various sorts of constraints and stress. The sysadmin is on call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it.

System administrators are not software engineers or developers. It is not usually within their duties to design or write new applications software. However, sysadmins must understand the behavior of software in order to deploy it and to troubleshoot problems, and generally know several programming languages used for scripting or automation of routine tasks.

Particularly when dealing with Internet-facing or business-critical systems, a sysadmin must have a strong grasp of computer security. This includes not merely deploying software patches, but also preventing break-ins and other security problems with preventive measures. In some organizations, computer security administration is a separate role responsible for overall security and the upkeep of firewalls and intrusion detection systems, but all sysadmins are generally responsible for the security of the systems in their keep.

Related fields

Many organizations staff other jobs related to systems administration. In a larger company, these may all be separate positions within a computer support or Information Services (IS) department. In a smaller group they may be shared by a few sysadmins, or even a single person.

* A database administrator (DBA) maintains a database system, and is responsible for the integrity of the data and the efficiency and performance of the system.
* A network administrator maintains network infrastructure such as switches and routers, and diagnoses problems with these or with the behavior of network-attached computers.
* A security administrator is a specialist in computer and network security, including the administration of security devices such as firewalls, as well as consulting on general security measures.
* A web administrator maintains web server services (such as IIS or Apache) that allow for internal or external access to web sites. Tasks include managing multiple sites, administering security, and configuring necessary components and software. Responsibilities may also include software change management.
* Technical support staff respond to individual users' difficulties with computer systems, provide instructions and sometimes training, and diagnose and solve common problems.
* A computer operator performs routine maintenance and upkeep, such as changing backup tapes or replacing failed drives in a RAID array. Such tasks usually require physical presence in the room with the computer; and while less skilled than sysadmin tasks require a similar level of trust, since the operator has access to possibly sensitive data.

In some organizations, a person may begin as a member of technical support staff or a computer operator, then gain experience on the job to be promoted to a sysadmin position.

Training

Unlike many other professions, there is no single path to becoming a system administrator. Many system administrators have a degree in a related field: computer science, information technology, computer engineering, information system management, or even a trade school program. Other schools have offshoots of their Computer Science program specifically for systems administration.

Some schools have started offering undergraduate degrees in Systems Administration. The first, RIT[1] started in 1992. Others such as Rensselaer Polytechnic Institute, Marist College, and Drexel University have more recently offered degrees in Information Technology.

As of 2008, only four U.S. universities, Rochester Institute of Technology[2], New York City College of Technology,Tufts, and Michigan Tech have graduate programs in system administration.[citation needed] In Norway, there is a special English-taught MSc program organized by Oslo University College [3] in cooperation with Oslo University, named "Masters programme in Network and System Administration." University of Amsterdam (UvA) offers a similar program[1], in cooperation with Hogeschool van Amsterdam (HvA). However, many other schools offer related graduate degrees in fields such as network systems and computer security.

One of the primary difficulties with teaching system administration as a formal university discipline, is that the industry and technology changes much faster than the typical textbook and coursework certification process. By the time a new textbook has spent years working through approvals and committees, the specific technology for which it is written may have changed significantly or is now obsolete.

In addition, because of the practical nature of systems administration and the easy availability of open-source server software, many systems administrators enter the field self-taught.

Generally, a prospective administrator will be required to have some experience with the computer system he or she is expected to manage. In some cases, candidates are expected to possess industry certifications such as the Microsoft MCSA, MCSE, Red Hat RHCE, Novell CNA, CNE, Cisco CCNA or CompTIA's A+ or Network+, Sun Certified SCNA, among others.

Sometimes, almost exclusively in smaller sites, the role of system administrator may be given to a skilled user in addition to or in replacement of his or her duties. For instance, it is not unusual for a mathematics or computing teacher to serve as the system administrator of a secondary school.

Duties of a system administrator

A system administrator's responsibilities might include:

* Analyzing system logs and identifying potential issues with computer systems.
* Introducing and integrating new technologies into existing data center environments.
* Performing routine audits of systems and software.
* Performing backups.
* Applying operating system updates, patches, and configuration changes.
* Installing and configuring new hardware and software.
* Adding, removing, or updating user account information, resetting passwords, etc.
* Answering technical queries.
* Responsibility for security.
* Responsibility for documenting the configuration of the system.
* Troubleshooting any reported problems.
* System performance tuning.
* Insuring that the network infrastructure is up and running.

In larger organizations, some tasks listed above may be divided among different system administrators or members of different organizational groups. For example, a dedicated individual(s) may apply all system upgrades, a Quality Assurance (QA) team may perform testing and validation, and one or more technical writers may be responsible for all technical documentation written for a company.

In smaller organizations, the system administrator can also perform any number of duties elsewhere associated with other fields:

* Technical support
* Database administrator (DBA)
* Network administrator/analyst/specialist
* Application analyst
* Security administrator
* Programmer

System administrators, in larger organizations, tend not to be system architects, system engineers, or system designers. However, like many roles in this field, demarcations between systems administration and other technical roles often are not well defined in smaller organizations. Even in larger organizations, senior systems administrators often have skills in these other areas as a result of their working experience.

In smaller organizations, IT/computing specialties are less often discerned in detail, and the term system administrator is used in a rather generic way — they are the people who know how the computer systems work and can respond when something fails.


Network administrator is a modern profession responsible for the maintenance of computer hardware and software that comprises a computer network. This normally includes the deployment, configuration, maintenance and monitoring of active network equipment. A related role is that of the network specialist, or network analyst, who concentrate on network design and security.


The Network Administrator is usually the highest level of technical/network staff in an organization and will rarely be involved with direct user support. The Network Administrator will concentrate on the overall health of the network, server deployment, security, ensuring network connectivity throughout a company's LAN/WAN infrastructure, and all other technical considerations at the network level of an organizations technical hierarchy. Network Administrators are considered Tier 3 support personnel that only work on break/fix issues that could not be resolved at the Tier1 (helpdesk) or Tier 2 (desktop/network technician) levels.

Depending on the company, the Network Administrator may also design and deploy networks. However, these tasks may be assigned to a Network Engineer should one be available to the company.

The actual role of the Network Administrator will vary from company to company, but will commonly include activities and tasks such as network address assignment, assignment of routing protocols and routing table configuration as well as configuration of authentication and authorization – directory services. It often includes maintenance of network facilities in individual machines, such as drivers and settings of personal computers as well as printers and such. It sometimes also includes maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems, etc.

Network specialists and analysts concentrate on the network design and security, particularly troubleshooting and/or debugging network-related problems. Their work can also include the maintenance of the network's authorization infrastructure, as well as network backup systems.

The administrator is responsible for the security of the network and for assigning IP addresses to the devices connected to the networks. Assigning IP addresses gives the subnet administrator some control over the professional who connects to the subnet. It also helps to ensure that the administrator knows each system that is connected and who personally is responsible for the system.

Wednesday, October 15, 2008

Apologies - our website is struggling to cope with the unprecedented

Apologies - our website is struggling to cope with the unprecedented
demand for the new release 3.0 of OpenOffice.org. The technical teams are
trying to come up with a solution.

Thank you for your patience.
Please consider to contribute to the Project via a monetary donation
OpenOffice.org download


Wooow ... seems all people around the world waiting for open office 3.0, yeah of course me too.



Capture on 15 October 2008 9:27 PM, GMT +7, WIB

Introducing Bernoulli Integral For Solving Some Physical Problems

Some of both modeling and problems in physics have been commonly presented in a first-order nonlinear differential equations (DE) of constant coefficients. Because the DE are integrable, therefore one must have an integral formulation for solving the physical problems. This paper introduces Bernoulli integral to complete the Tables of Integral for all of the Mathematical Handbooks. Basically, the Bernoulli integral is integral form of the homogeneous Bernoulli differential equation (BDE) of
constant coefficients. Under proper transformation, the Bernoulli integral can be used to generate another integral formulation especially for integrals that can be transformed into arctangent DE. By using the Bernoulli integral, one can create its self the integral formulation of solving the physical problems, and hence reduces utilization the tables of integral. A special application in generating Euler
formula also presented.

Key-words : Arctangent, tangent, arctangent differential equation, Bernoulli equation, Bernoulli differential equation, integral, Bernoulli integral, Schrödinger equation, modulation instability, Euler formula, Argand diagram, electromagnetic, logistic growth, chaotic, soliton, fluxon, squeezed laser

I. INTRODUCTION
Some of both modeling and problems in physics have been commonly presented in a first-order nonlinear differential equations (DE) of constant coefficients For instance, in designing electromagnetic apparatus [Markus,1979], the logistic growth process [Welner,2004], chaotic behavior [Barger et al,1995], the generation and propagation of soliton [Wu et al 2005],[Morales,2005], the transport of fluxon [Gonzile et al,2006], the generation of squeezed laser [Friberg,1996 ],etc. One requires Table of Integral to solve a specific integral for solving such differential equation [Spiegel,MR,1968]. To complete the Table of integral,
we introduce Bernoulli integral that until now not including in both of the Table integral and mathematical Handbook. By using the Bernoulli integral, one can create the integral formulation required in solving the physical problems, and hence reduces utilization the Tables of integral.


Full version of this article please visit and download the article.
http://rohedi.com/content/view/34/1/

Thursday, September 18, 2008

Delete all except one

How to delete all file except file(s) ...

> ls
1 2 3 4 5 6 7
>

I want to delete files 3, 4, 5, 6, 7 except 1 & 2
> rm `ls * | egrep -v "1|2"`
> ls
1 2
>

Tuesday, September 2, 2008

Backup and Restore Alfresco

Overview

Backing up an Alfresco repository involves backing up both the directory pointed to by the dir.root setting AND the database Alfresco is configured to use, as if they were a single unit. Backing up either one without the other results in a backup that cannot be successfully restored.

Similarly, when you restore an Alfresco backup you must restore both the dir.root directory AND the Alfresco database from the same backup set - restoring either one in isolation is guaranteed to corrupt your repository.

The dir.root directory is usually defined in /alfresco/extension/custom-repository.properties. By default this directory is named 'alf_data' and is located within the directory where Alfresco is installed.
[edit] Cold Backup Procedure

By default, the dir.root contains both the content and indexes, so for cold backup it is possible to backup just the content and then do a full reindex when a backup is restored. A full reindex can be a time consuming process however, so the steps below include the indexes in the backup.

1. Stop Alfresco
2. Backup the database Alfresco is configured to use, using your database vendor's backup tools
3. In parallel, backup the Alfresco dir.root directory in its entirety
4. Store both the database and Alfresco dir.root backups together as a single unit (neither is useful without the other)
5. Start Alfresco

[edit] Hot Backup Procedure
[edit] Overview

1. Backup the database Alfresco is configured to use, using your database vendor's backup tools (see below for details)
2. As soon as the database backup completes, backup specific subdirectories in the Alfresco dir.root (see below for details)
3. Store both the database and Alfresco dir.root backups together as a single unit (neither is useful without the other)

[edit] Backing up the Database

In an Alfresco system, the ability to support hot backup is fundamentally dependent on the hot backup capabilities of the database product Alfresco is configured to use. Specifically, it requires a tool that can "snapshot" a consistent version of the Alfresco database (ie. it must capture a transactionally consistent copy of all of the tables in the Alfresco database). In addition, to avoid serious performance problems in the running Alfresco system, this "snapshot" operation should operate without taking out locks in the Alfresco database.

Backup capabilities vary widely between relational database products, and you should ensure that any backup procedures that are instituted are validated by a qualified, experienced Database Administrator before being put into a production environment.
[edit] Backing up the Filesystem

Backup the following subdirectories of the Alfresco dir.root directory using whatever tools you're comfortable with (rsync, xcopy, etc.):

* contentstore
* contentstore.deleted
* audit.contentstore
* backup_lucene_index

IMPORTANT NOTE: Never, never, under any circumstances, attempt to backup the lucene-indexes subdirectory while Alfresco is running. Doing so is almost certain to cause Lucene index corruption.
[edit] Notes

* Alfresco includes a background job responsible for backing up the Lucene indexes that (by default) is configured to run at 3am each night. The hot backup process must not run concurrently with this background job, so you should either ensure that the hot backup completes by 3am, or wait until the index backup job has completed before initiating a hot backup.
* The Alfresco WCM functionality includes a background job called the 'avmOrphanReaperJob' that must not be allowed to run while a hot backup is in progress. By default this job is scheduled to run every minute, but this can be reconfigured by overriding the default schedule defined in scheduled-jobs-context.xml. Please make sure you are familiar with Alfresco's Repository Configuration mechanism before making any configuration changes. If you are not using the Alfresco WCM functionality no action is required.

[edit] Restore Procedure

1. Stop Alfresco
2. Copy the existing dir.root to temp location
3. Restore dir.root
4. If you're restoring from a hot backup, rename dir.root/backup_lucene_index to dir.root/lucene-indexes
5. Restore the database from the database backups
6. Start Alfresco

[edit] Lucene Index Restoration

Note that in addition to full restorations, the backup sets created via either the cold or hot backup procedures described above can also be used to restore just the Lucene indexes. This is useful in cases where the repository itself does not need to be restored but for some reason the Lucene indexes are stale.

The Lucene index restoration process is as follows:

1. Stop Alfresco
2. Move the existing dir.root/lucene-indexes directory out of the way
3. If you're performing cold backups, restore dir.root/lucene-indexes from the most recent backup step
4. If you're performing hot backups, restore dir.root/backup_lucene_index from the most recent backup step and rename it to dir.root/lucene-indexes
5. Restart Alfresco

Upon restarting, Alfresco will (by default) detect that the indexes are stale, and incrementally reindex just that content that has changed since the last backup was performed. As the size of your content set grows, the time savings from performing incremental reindexing rather than full reindexing will become greater and greater (incremental reindexing is typically measured in minutes, whereas full reindexing can take hours for large content sets).

Important note: in order for incremental reindexing to occur properly, you should leave the index.recovery.mode property at its default value of "VALIDATE". Setting this property to "FULL" forces a full reindex even if incremental reindexing is possible (thereby negating any benefits from this procedure).

----
Copy Paste From http://wiki.alfresco.com/wiki/Backup_and_Restore without permission.

Sunday, August 17, 2008

Kunci Sains Dan Teknologi Ada Di Angka Kelahiran Republik Indonesia

Kunci Sains Dan Teknologi Ada Di Angka Kelahiran Republik Indonesia
Oleh : Ali Yunus Rohedi(1)
Staf Pengajar Pada Jurusan Fisika FMIPA – ITS, Surabaya
Telp/Fax : (031)5943351, e-mail : rohedi@physics.its.ac.id
(1)Kepala ROHEDI Laboratory Surabaya, e-mail : aliyunus@rohedi.com
Para visitor tentu ingat bahwa saat saya meluncurkan website rohedi.com kepada
khalayak, artikel pertama yang saya tampilkan adalah info tentang formula analitik untuk
polinomial orde positif sembarang versi saya. Pada artikel tersebut saya contohkan komparasi
nilai sisa polinomial (remainder) antara rohedi’s formula dengan hasil hitungan perangkat
lunak Matlab untuk polinomial orde 1060. Remainder hitungan rohedi’s formula tetap
konsisten dengan teori matematika yakni mendekati nol, sedangkan remainder hitungan
Matlab sangat payah karena nilainya mendekati takberhingga. Walaupun demikian saya tidak
terburu-buru mengklaim formula analitik yang saya miliki tersebut sebagai penemuan, karena
disamping paper tentang formula digdaya itu belum saya publikasikan ke manca negara, juga
karena saya masih ingin berbagi tips dengan sesama anak bangsa, siapa tahu ada diantara
visitor yang brillian mendapatkannya, sehingga saya turut berbangga mengantarkan sang
penemu meraih field medal yaitu gelar prestisius di bidang matamatika. Tak ayal lagi kelak
Indonesia akan menjadi sentra New Science sebagaimana saya ilustrasikan pada
rohedi.blogspot. Mengapa? karena tentu semua visitor akan sependapat dengan saya, bahwa
karya Profesor PTN dan PTS produk DIKTI Indonesia tentu jauh lebih hebat dari karya
ROHEDI yang hanya tamatan S2 dalam negeri.
Sebagaimana inspirasi untuk mendapatkan rohedi’s reversion sebagai teknik reversi
baru dalam menyelesaikan persamaan diferensial biasa nonlinear dalam bentuk Maclaurin
series (silahkan baca kembali artikel How to upgrade the running time of computer), untuk
mendapatkan formula analitik polinomial orde sembarang dimaksud, sayapun terinspirasi
akan ketajaman hati nurani para Pendiri Bangsa dalam menetapkan kelahiran RI (Republik
Indonesia) tercinta ini pada 17–8–1945. Pada penyelesaian persamaan diferensial arctanget,
ternyata angka-angka tanggal, bulan, dan tahun kelahiran RI tersebut termaktub dalam
koefisien deret tangent function pada suku ke 8 (delapan).

Artikel lengkap bisa di lihat di link di bawah ini.
http://rohedi.com/content/view/29/1/

Friday, August 15, 2008

snmpd problems occur when running portsentry

The problems is when installing portsentry, then running the snmpd. Because the snmp was block by portsentry. The solutions is start snmpd first, then portsentry.

Here is the sockstat from our gateway.
First, we check using sockstat to list open ports. From first line, seems port 161 "used" by portsentry. My college down the portsentry and run the snmpd. You can see in the 3rd command.

gw1# sockstat | grep 161
root portsentry 1066 4 udp4 *:161 *:*
squid squid 1016 161tcp4 127.0.0.1:3128 10.0.16.174:2642
squid squid 1016 174tcp4 117.102.83.187:53898 195.161.119.84:80
squid squid 1016 213tcp4 10.0.17.247:3128 10.0.16.161:2137
squid squid 1016 697tcp4 117.102.83.187:* 212.96.161.229:80
gw1#
gw1# netstat -a |grep snmp
udp4 0 0 *.snmptrap *.*
udp4 0 0 *.snmp *.*
gw1# sockstat | grep 161
root snmpd 60836 10 udp4 *:161 *:*
squid squid 1016 95 tcp4 10.0.17.247:3128 10.0.16.161:2242
squid squid 1016 161tcp4 127.0.0.1:3128 10.0.16.174:2642
squid squid 1016 174tcp4 117.102.83.187:53898 195.161.119.84:80
squid squid 1016 209tcp4 10.0.17.247:3128 10.0.16.49:2161
gw1#

Saturday, July 26, 2008

Tentang Bayam

Tentang BAYAM



Kalau memasak makanan yang mengandung bayam, cukup buat satu porsi aja ya. Intinya, jangan pernah memanasi makanan yang mengandung bayam. Loh, kenapa? Ada beberapa alasan. Ini dia :



a. Bayam mengandung zat besi yang berupa Fe2+ (ferro)

Kalau dia terlalu lama kontak dengan O2 (oksigen dari udara), Fe2+ akan teroksidasi menjadi Fe3+ (ferri). Meski sama-sama zat besi, yang berguna bagi kita adalah ferro. Sedangkan ferri bersifat toxid pada bayam. Jadi kalau bayam dipanasi, akan berlaku oksidasi tersebut.



b. Jangan pernah mengonsumsi bayam lebih dari 5 jam

Soalnya, selain mengandung zat yg disebutin tadi itu, bayam juga mengandung zat Nitrat (NO3). Kalau teroksidasi oleh udara, maka akan menjadi NO2 (nitrit). Nitrit adalah senyawa yang tidak berwarna, tidak berbau, dan bersifat racun bagi tubuh manusia.



Menurut John S Wishnok, bayam segar yang baru dicabut dari persemaiannya telah mengandung senyawa nitrit kira-kira sebanyak 5 mg/kg. Bila bayam disimpan di lemari es selama 2 minggu, kadar nitrit akan meningkat sampai 300 mg/kg. Dengan kata lain, dalam 1 hari penyimpanan, senyawa nitrit akan meningkat 21 mg/kg (7%).

Efek toksik (meracuni tubuh) yang ditimbulkan oleh Nitrit bermula dari reaksi oksidasi Nitrit dengan zat besi dalam sel darah merah, tepatnya di dalam Hemoglobin (Hb).

Telah kita ketahui bahwa salah satu tugas hemoglobin adalah mengikat oksigen untuk disalurkan ke seluruh organ tubuh. Ikatan nitrit dengan hemoglobin,disebut Methemoglobin, mengakibatkan hemoglobin tidak mampu mengikat oksigen. Jika jumlah methemoglobin mencapai lebih dari 15% dari total hemoglobin, maka akan terjadi keadaan yang disebut Sianosis, yaitu suatu keadaan dimana seluruh jaringan tubuh manusia kekurangan oksigen. Jika hal ini terjadi pada bayi dikenal dengan nama "Blue Baby".

Efek toksik lainnya adalah kemampuan nitrit bereaksi dengan Amino sekunder dapat membentuk senyawa yang dapat menyebabkan kanker.



c. Jangan masak bayam pake panci alumunium

Soalnya bisa bereaksi dengan zat besi yang ada di bayam, dan... jadi racun.



Tips mengkonsumsi bayam :

* Pilih bayam yang baru dipetik dan masih segar

* Hendaknya langsung diolah setelah mendapatkan bayam segar

* Jangan terlalu lama disimpan dalam lemari es.



Jadi takut mengonsumsi bayam?? JANGAN ... soalnya, kandungan nutrisinya sangat TOP BANGET. Bahkan, bayam disebut sebagai King of Vegetables.

Sumber: Searching google, dan dapat di bawah ini.
http://www.mail-archive.com/milis-nova@news.gramedia-majalah.com/msg01308.html

Friday, July 11, 2008

Penemuan Fenomenal Di Akhir Tahun 2006

Penemuan fenomenal yang penulis maksudkan berupa teknik baru pemecahan persamaan diferensial nonlinear. Masyarakat umum tentu awam terhadap istilah persamaan diferensial ini, tetapi penulis juga meyakini bahwa tidak semua mahasiswa dan dosen di perguruan tinggi yang mengenal betul bentuk persamaan diferensial nonlinear tersebut. Hal ini karena materi kuliah di perguruan tinggi umumnya di seputaran persamaan diferensial linear. Karena itu para pembaca pastilah mengira kalau penulispun kebingungan tentang bagaimana cara menyampaikan berita baik ini kepada khalayak, agar penemuan yang menurut keyakinan penulis Insya Allah bakal ”mengibarkan merah putih” di manca negara itu dapat membanggakan siapa saja yang membaca tulisan ini Ibu ibu di rumah tentu lumrah mempraktekkan resep adonan kue yang dibacanya dari sebuah majalah. Menurut resep itu untuk membuat sepotong kue diperlukan sekian gram tepung terigu, sekian gram gula, sekian miligram panili, dan sekian gram kuning telur (ibu-ibu sekalian, di buku pelajaran fisika jumlah gram ini dinamakan massa bukanlah berat seperti yang biasa kita sebut). Kalau jumlah gram tepung terigu, gula, panili dan kuning telur masing-masing dilambangkan dengan u,v,w,x , maka resep kue itu dapat dituliskan dalam sebuah persamaan sederhana y= u + v + w + x . Tetapi kalau ibu-ibu hendak membuka usaha katering kue, maka rumus atau formula resep itu disamping harus memasukkan upah produksi, juga perlu mengoptimalkan komposisi bahan-bahannya, guna meraup keuntungan yang maksimal. Resep kue tersebut sekarang berubah menjadi y = au + bv + cw + dx + e, yang oleh mahasiswa ekonomi dikenal dengan persamaan linear yang mengandung 4 perubah bebas u,v,w, dan x. Tentu formula resep kue yang terakhir ini sudah diluar jangkauan ibu-ibu, karenanya ibu-ibu perlu menyekolahkan salah seorang putra-putrinya ke fakultas ekonomi, untuk mengetahui bagaimana cara mendapatkan angka a,b,c,d, dan e optimal yang akan membuat usaha katering kue tersebut sukses menyedot banyak pelanggan. Lantas dalam bentuk apa persamaan yang notabene menjadi basis sains dan teknologi tinggi itu?

Menurut penulis berkembangnya ilmu pengetahuan modern merupakan perwujudan cara memandang alam sekitar yang ditindaklanjuti dengan upaya menjelaskan keteraturan dan ketidakteraturan peristiwa yang terjadi di dalamnya (ini oleh para fisikawan disebut hukum alam). Dulu ketika di sekolah dasar kita sama-sama pernah diajarkan cara menghitung panjang garis miring segitiga siku-siku dengan dalil phitagoras. Ternyata dalil Phitagoras itu tidak sekedar untuk menghitung panjang ”garing” segitiga siku-siku, melainkan merupakan pembangun tiga fungsi trigonometri fundamental yaitu fungsi sina, cosa, dan tana. Mungkin tidak banyak yang tahu bahwa sesungguhnya hampir semua persoalan kehidupan di dunia ini pada dasarnya dapat ditangani dengan ketiga fungsi penting tersebut, asalkan mereka tahu bagaimana cara menggunakannya. Mengingat demikian pentingnya maka penulis mensketsakan gambar segitiga ”keramat” tersebut di bawah ini lengkap dengan definisi ketiga fungsi fundamental sina, cosa, dan tana

Page diatas, sengaja di edit, bukan tulisan penulis secara penuh(copy paste edit)
Untuk lengkapnya, silangkan kunjungi website www.rohedi.com

http://rohedi.com/content/view/15/26/

Penulis dalam hal ini adalah Drs. Ali Yunus Rohedi, MT.

Friday, July 4, 2008

Create startup script for postgresql on solaris

Here is simple script postgresql 8.2(startup on solaris)
Create file in /etc/init.d with name postgresql


#!/sbin/sh
#change with your prefix installation
PGBIN=/usr/postgres/8.2/bin
PGDATA=/export/postgres82/pgdata
PGLOG=/export/postgres82/pgdata/log
PGUSER=postgres
case "$1" in
'start')
su - $PGUSER -c "$PGBIN/pg_ctl -D $PGDATA start"
;;

'stop')
su - $PGUSER -c "$PGBIN/pg_ctl -D $PGDATA stop"
;;

'refresh')
su - $PGUSER "$PGBIN/pg_ctl -D $PGDATA reload"
;;
*)

echo $"Usage: $0 {start|refresh}"
exit 1
;;

esac

change file permission to 755
then you have to make link to other directory.
#ln /etc/init.d/postgresql /etc/rc0.d/K03postgresql
#ln /etc/init.d/postgresql /etc/rc1.d/K03postgresql
#ln /etc/init.d/postgresql /etc/rc2.d/K03postgresql
#ln /etc/init.d/postgresql /etc/rcS.d/K03postgresql
#ln /etc/init.d/postgresql /etc/rc3.d/S90postgresql

Try to start stop service and restart the system.
check with
# ps -ef | grep post
postgres 736 734 0 15:47:00 ? 0:00 /usr/postgres/8.2/bin/postgres -D /export/postgres82/pgdata
root 739 711 0 15:49:13 pts/2 0:00 grep post
postgres 734 1 0 15:47:00 pts/2 0:00 /usr/postgres/8.2/bin/postgres -D /export/postgres82/pgdata
postgres 737 734 0 15:47:00 ? 0:00 /usr/postgres/8.2/bin/postgres -D /export/postgres82/pgdata
#
Finish

Installing pkg_get on Solaris 10

This package is for automatically download and install package. This is package have same function with apt-get on debian or yum on Redhat.
First download package from http://www.blastwave.org/pkg_get-3.8.4-SunOS5.8-all-CSW.pkg
# pkgadd -d pkg_get-3.8.4-SunOS5.8-all-CSW.pkg

The following packages are available:
1 CSWpkgget pkg_get - CSW version of automated package download tool
(all) 3.8.4

Select package(s) you wish to process (or 'all' to process
all packages). (default: all) [?,??,q]:

Processing package instance from

pkg_get - CSW version of automated package download tool(all) 3.8.4
You may use and copy this software without charge, as you see fit.
The software is copyright (C) Philip Brown, Nov 2000-2007

Dont forget to update /opt/csw/etc/pkg-get.conf with your nearest archive site.
(or /etc/opt/csw/pkg-get.conf)

The default site ibiblio.org may or may not be slow for you!


The selected base directory must exist before installation
is attempted.

Do you want this directory created now [y,n,?,q] y
Using as the package base directory.
## Processing package information.
## Processing system information.
WARNING: setting mode of to default mode (755)
WARNING: setting mode of to default mode (755)
WARNING: setting mode of to default mode (755)
WARNING: setting mode of to default mode (755)
WARNING: setting mode of to default mode (755)
1 package pathname is already properly installed.
## Verifying disk space requirements.
## Checking for conflicts with packages already installed.
## Checking for setuid/setgid programs.

This package contains scripts which will be executed with super-user
permission during the process of installing this package.

Do you want to continue with the installation of [y,n,?] y

Installing pkg_get - CSW version of automated package download tool as

## Installing part 1 of 1.
/opt/csw/bin/pkg-get
/opt/csw/etc/pkg-get.conf.csw
/opt/csw/share/man/man1m/pkg-get.1m
/var/pkg-get/admin-fullauto
[ verifying class ]
## Executing postinstall script.

Installing /opt/csw/etc/pkg-get.conf.csw to pkg-get.conf

**** IMPORTANT ****
A default configuration file for pkg-get has been created in
/opt/csw/etc/pkg-get.conf
You should edit it to change the 'site' configuration, to point to
the most appropriate mirror for you, from the list at
http://www.blastwave.org/mirrors


Installation of was successful.
#
# /opt/csw/bin/pkg-get -help
pkg-get, by Philip Brown , phil@bolthole.com
(Internal SCCS code revision 3.11)
Originally from http://www.bolthole.com/solaris/pkg-get.html

pkg-get is used to install free software packages
pkg-get
Need one of 'install', 'upgrade', 'available','compare'
'-i|install' installs a package
'-u|upgrade' upgrades already installed packages if possible
'-a|available' lists the available packages in the catalog
'-c|compare' shows installed package versions vs available
'-l|list' shows installed packages by software name only

Optional modifiers:
'-d|download' just download the package, not install
'-D|describe' describe available packages, or search for one
'-U|updatecatalog' updates download site inventory
'-S|sync' Makes update mode sync to version on mirror site
'-f' dont ask any questions: force default pkgadd behaviour
Normally used with an override admin file
See /var/pkg-get/admin-fullauto

'-s ftp://site/dir' temporarily override site to get from
#

For example I will install package nano for editing.
# /opt/csw/bin/pkg-get -i nano
...
/opt/csw/share/locale/sr/LC_MESSAGES/nano.mo
/opt/csw/share/locale/sv/LC_MESSAGES/nano.mo
/opt/csw/share/locale/tr/LC_MESSAGES/nano.mo
/opt/csw/share/locale/uk/LC_MESSAGES/nano.mo
/opt/csw/share/man
/opt/csw/share/man/man1/nano.1
/opt/csw/share/man/man5/nanorc.5
[ verifying class ]
## Executing postinstall script.
Updating the info dir file for CSWtexinfo
chroot: exec failed: No such file or directory

Installation of was successful.

# /opt/csw/bin/nano # running nano

Wednesday, July 2, 2008

cvsup ports-supfile

viperbsd# cp /usr/share/examples/cvsup/ports-supfile /tmp
copy ports-supfile ke /tmp
edit bagian di bawah, pilih salah satu mirror ports.
*default host=cvsup1.FreeBSD.org
viperbsd# cvsup -g -L 2 ports-supfile

...
Applying fixups for collection ports-all/cvs
Fixup ports/games/doom/files/patch-ab
Fixup ports/graphics/vcg/files/tMakefile
Fixup ports/net/wmwave/files/patch-wmwave.c
Shutting down connection to server
Finished successfully
viperbsd#

Biar gak lupa link cvsup mirror seluruh dunia .. :)

http://www.freebsd.org/doc/handbook/cvsup.html#CVSUP-MIRRORS

Friday, June 27, 2008

Photo merit

Foto2 merit q.

Merit

Yahoo ...blok ip telkomspeedy ...

Test email dari server testing Centos 5.1, saya pakai cyrus-imapd versi 2.3.7 dan postfix 2.3.3. Server kirim dan terima dari server gmail bisa, namun begitu saya coba email ke yahoo ternyata di blok.


: host mx1.mail.sg1.yahoo.com[124.108.116.72]
said: 553 Mail from wahyu@xxxxx.org not allowed - 5.7.1
[BL21] Connections not accepted from IP addresses on Spamhaus PBL; see
http://postmaster.yahoo.com/550-bl21.html [550] (in reply to MAIL FROM
command)

Ternyata yahoo blok dari spamhaus PBL. Saya menggunjungi website spamhaus.


IP Address Lookup

125.164.xx.xxx is not listed in the SBL

125.164.xx.xxx is listed in the PBL, in the following records:

* PBL171259

125.164.xx.xxx is not listed in the XBL


Berdasarkan di bawah, blok ip dari Telkomspeedy di blok
Ref: PBL171259

125.164.72.0/23 is listed on the Policy Block List (PBL)

Berarti ada 510 IP yang di blok. Karena hanya untuk testing, saya tidak remove IP address statik saya.

Wednesday, June 25, 2008

Setting PPPoE di Centos 5.1 menggunakan telkomspeedy

Catatan untuk membuat PPPoE di Centos 5.1 menggunakan telkomnetspeedy.
Karena Up Link dan Down Link Telkomspeedy sudah lumayan kenceng, walaupun kalau lagi lemot juga sangat lemot.

Gambar di bawah capture konfigurasi modem am300 gratis dari telkomspeedy :)




Setting modem di setting seperti diatas.

Kemudian setting Centos 5.1 dengan 2 ethernet, 1 ethernet untuk jaringan lokal, dan 1 ethernet untuk koneksi ke modem.

Internet <--> Modem(bridge) <--> Server gateway(eth1,eth0)

[root@wahyucentos ssh]# cat /etc/redhat-release
CentOS release 5 (Final)
[root@wahyu ssh]#

[root@wahyucentos ssh]# ifconfig
eth0 Link encap:Ethernet HWaddr 00:50:8D:C3:39:7D
inet addr:192.168.0.105 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::250:8dff:fec3:397d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5990 errors:0 dropped:0 overruns:0 frame:0
TX packets:2161 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:825820 (806.4 KiB) TX bytes:1069634 (1.0 MiB)
Interrupt:217 Base address:0xa800

eth1 Link encap:Ethernet HWaddr 00:1E:58:31:B3:EB
inet addr:192.168.100.96 Bcast:192.168.100.255 Mask:255.255.255.0
inet6 addr: fe80::21e:58ff:fe31:b3eb/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2847 errors:0 dropped:0 overruns:0 frame:0
TX packets:2878 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1084873 (1.0 MiB) TX bytes:539141 (526.5 KiB)
Interrupt:209 Base address:0x2000
[root@wahyucentos ssh]#
[root@wahyucentos ssh]#system-config-network




Klik New, dan pilih xDSL connections, pilih ethernet 1(eth1)masukan username dan
password telkom.

Setelah itu, active kan ppp
Sehingga dapat di lihat seperti dibawah ini. Dapat di lihat bahwa, pppC dengan nama koneksi test sudah aktif.



Di atas, saya juga mengaktifkan eth1 dengan ip address lokal.

[root@wahyucentos ssh]# ifconfig
eth0 Link encap:Ethernet HWaddr 00:50:8D:C3:39:7D
inet addr:192.168.0.105 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::250:8dff:fec3:397d/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5990 errors:0 dropped:0 overruns:0 frame:0
TX packets:2161 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:825820 (806.4 KiB) TX bytes:1069634 (1.0 MiB)
Interrupt:217 Base address:0xa800

eth1 Link encap:Ethernet HWaddr 00:1E:58:31:B3:EB
inet addr:192.168.100.96 Bcast:192.168.100.255 Mask:255.255.255.0
inet6 addr: fe80::21e:58ff:fe31:b3eb/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2847 errors:0 dropped:0 overruns:0 frame:0
TX packets:2878 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1084873 (1.0 MiB) TX bytes:539141 (526.5 KiB)
Interrupt:209 Base address:0x2000

lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:1296 errors:0 dropped:0 overruns:0 frame:0
TX packets:1296 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:2913220 (2.7 MiB) TX bytes:2913220 (2.7 MiB)

ppp0 Link encap:Point-to-Point Protocol
inet addr:125.xxx.xx.xxx P-t-P:125.xxx.xx.x Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
RX packets:2629 errors:0 dropped:0 overruns:0 frame:0
TX packets:2617 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:1013596 (989.8 KiB) TX bytes:460371 (449.5 KiB)

[root@wahyucentos ssh]#

Jangan lupa untuk setting iptables, dan forwarding agar, bisa di gunakan sebagai gateway. Atau kalau ingin menggunakan squid, bisa di installkan juga.

Tuesday, June 24, 2008

Delete mailbox on cyrus-imap

To delete mailbox on cyrus-imap you have to give permission. By default admin doesn't have permission deleting mailbox.


moonlight# cyradm -u cyrus localhost
Password:
localhost> lm
user.bafrin (\HasChildren) user.john.Sent (\HasNoChildren)
user.bafrin.Drafts (\HasNoChildren) user.john.Trash (\HasNoChildren)
user.bafrin.Sent (\HasNoChildren) user.wahyu (\HasChildren)
user.bafrin.Trash (\HasNoChildren) user.wahyu.Drafts (\HasNoChildren)
user.john (\HasChildren) user.wahyu.Sent (\HasNoChildren)
user.john.Drafts (\HasNoChildren) user.wahyu.Trash (\HasNoChildren)
localhost> dm user.john
deletemailbox: Permission denied
localhost>
localhost> lam user.john
john lrswipkxtecda
localhost> dm user.john
deletemailbox: Permission denied
localhost> sam user.john cyrus c
localhost> lam user.john
john lrswipkxtecda
cyrus kxc
localhost> dm user.test
deletemailbox: Mailbox does not exist
localhost> dm user.john
localhost> lm
user.bafrin (\HasChildren) user.wahyu (\HasChildren)
user.bafrin.Drafts (\HasNoChildren) user.wahyu.Drafts (\HasNoChildren)
user.bafrin.Sent (\HasNoChildren) user.wahyu.Sent (\HasNoChildren)
user.bafrin.Trash (\HasNoChildren) user.wahyu.Trash (\HasNoChildren)
localhost>

Friday, June 6, 2008

General IO error in openoffice using NFS

http://ubuntuforums.org/showthread.php?t=332043

Thursday, June 5, 2008

Buat jasperserver di satu server

Idenya sih, karena kita memakai jasperserver 2.1, dan ada beberapa aplikasi yang berjalan menggunakan DB postgresql 8.2 yang berbeda. Agar aplikasi report yang di pakai, bisa menggunakan satu server report(jasperserver).

Saya menggunakan jasperserver versi di bawah, karena untuk mempermudah saja, installnya.
Karena sudah bundle dengan MySql, dan tomcat.

jasperserver-2.1-linux-installer.bin


Installasi saya taruh di /home/jasperserver-2.1

[root@temo jasperserver-2.1]# ls
ant jasperctl.sh license.txt scripts
apache-tomcat java mysql uninstall
docs js-installer-version.txt releaseNotes.txt
ireport licenses samples
[root@temo jasperserver-2.1]#
/home/jasperserver-2.1/apache-tomcat/webapps

copy folder jasperserver ke jasperprc, jaspershp, jaspervr di sesuaikan dgn namanya.

Edit file2 berikut, di sesuaikan dgn kebutuhan.

[root@temo WEB-INF]#
hibernate.properties jboss-web.xml web.xml
[root@temo WEB-INF]#

Edit web.xml, edit bagian ini ...

JasperSHP UI application


webAppRootKey
jaspershp.root


Di samakan dgn DBnya mysql.

Untuk hibernate.properties
# Properties file with JDBC-related settings.
# Applied by PropertyPlaceholderConfigurer from "applicationContext-*.xml".
# Targeted at system administrators, to avoid touching the context XML files.

# Property that determines the Hibernate dialect
metadata.hibernate.dialect=org.hibernate.dialect.MySQLInnoDBDialect

metadata.hibernate.dataSource.jndiName=jdbc/jaspershp

Dan seterusnya.

Buat database di mysql.

mysql> show databases;
+--------------------+
| Database |
+--------------------+
| information_schema |
| foodmart |
| jasperprc |
| jaspershp |
| jaspervr |
| mysql |
| sugarcrm |
| test |
+--------------------+
8 rows in set (0.03 sec)

mysql>

Edit file di :
/home/jasperserver-2.1/apache-tomcat/webapps/jaspershp/META-INF
nama file context.xml

auth="Container"
name="jdbc/jaspershp"
type="javax.sql.DataSource"
password="passwordnya"
driverClassName="com.mysql.jdbc.Driver"
maxIdle="30"
maxWait="1000"
username="usernya"
url="jdbc:mysql://127.0.0.1:3306/jaspershp?useUnicode=true&characterEncoding=UTF-8"
maxActive="20"/>


Restart apache tomcat, melalui manager.


note: bbrp langkah di lewati, spt, create db, import db data(import DB data dump harus di ganti sesuai dbnya [use namadbnya])

Wednesday, March 12, 2008

Install perl CPAN module

Cara install perl CPAN modul.
Masuk ke cpan shell:
[root@mis07 nightly]# perl -MCPAN -e shell
cpan> install DBD::mysql
Running install for module DBD::mysql
Running make for C/CA/CAPTTOFU/DBD-mysql-4.006.tar.gz
Is already unwrapped into directory /root/.cpan/build/DBD-mysql-4.006
Has already been processed within this session
Running make test
PERL_DL_NONLAZY=1 /usr/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'blib/lib', 'blib/arch')" t/*.t
t/00base..............ok
t/10connect...........ok
t/20createdrop........ok
t/25lockunlock........ok
t/30insertfetch.......ok
t/35limit.............ok
t/35prepare...........ok
t/40bindparam.........ok
t/40bindparam2........ok
t/40blobs.............ok
t/40catalog...........ok
t/40keyinfo...........ok
t/40listfields........ok
t/40nulls.............ok
t/40numrows...........ok
t/40server_prepare....ok
t/40types.............ok
t/41bindparam.........ok
t/41blobs_prepare.....ok
t/42bindparam.........ok
t/50chopblanks........ok
t/50commit............ok
t/60leaks.............skipped
all skipped: $ENV{SLOW_TESTS} is not set
t/65types.............ok
t/70takeimp...........skipped
all skipped: test feature not implemented
t/75supported_sql.....ok
t/80procs.............ok
t/insertid............ok
t/multi_statement.....ok
t/param_values........ok
t/prepare_noerror.....ok
t/texecute............ok
t/utf8................ok
t/warnings............ok
All tests successful, 2 tests skipped.
Files=34, Tests=656, 3 wallclock secs ( 2.74 cusr + 0.62 csys = 3.36 CPU)
/usr/bin/make test -- OK
Running make install
Installing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/auto/DBD/mysql/mysql.bs
Installing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/auto/DBD/mysql/mysql.so
Files found in blib/arch: installing files in blib/lib into architecture dependent library tree
Installing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/DBD/mysql.pm
Installing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/DBD/mysql/INSTALL.pod
Installing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/DBD/mysql/GetInfo.pm
Installing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/Bundle/DBD/mysql.pm
Installing /usr/share/man/man3/Bundle::DBD::mysql.3pm
Installing /usr/share/man/man3/DBD::mysql.3pm
Installing /usr/share/man/man3/DBD::mysql::INSTALL.3pm
Writing /usr/lib64/perl5/site_perl/5.8.8/x86_64-linux-thread-multi/auto/DBD/mysql/.packlist
Appending installation info to /usr/lib64/perl5/5.8.8/x86_64-linux-thread-multi/perllocal.pod
/usr/bin/make install -- OK

cpan>
cpan> install IO::All
IO::All is up to date.

cpan> q --> utk quit.

utk ganti mirror
cpan>o conf init

Thursday, March 6, 2008

How to install GRUB on the MBR

How to install GRUB on the MBR

GRUB (GRand Unified Bootloader)

Briefly, a boot loader is the first software program that runs when a computer starts. It is responsible for loading and transferring control to an operating system kernel software (such as Linux). The kernel, in turn, initializes the rest of the operating system (e.g. a GNU system).

GNU GRUB Homepage
http://www.gnu.org/software/grub/


Problem

"There is not a boot manager screen at all, it just boots right into windows but GRUB boot window does not appear. I cannot figure out to access fedora, I do not have a boot disk and need to know if there is someway to boot into fedora"

"I forgot to install GRUB, I didn't install GRUB in the MBR, I chose to install GRUB on the first track on the partition where I installed Fedora but that was not an active primary partition".

Solution

You have to install GRUB on the MBR (Master Boot Record). To do this just follow this steps:

(First of all, enter your BIOS setup and in BOOT Sequence window choose to boot with CDROM first.)

1) Boot with your Fedora Core Installation CD 1.

2) Type "linux rescue" at the prompt.

3) Answer the questions about keyboard and language.

4) Tell the rescue mode to use your proper partition to mount (the one that you want to get booted into)

5) When you come to the console prompt type: chroot /mnt/sysimage

6) Type grub

7) Set the GRUB's root device to the partition containing the boot directory like this:

grub> root (hd0,0)

Filesystem type is ext2fs, partition type 0x83

I have Windows 98 in hd0,0 ; Windows XP in hd0,1, Fedora Core /boot partition in hd0,2 and Mandrake /boot partition in hd0,6. So in my case the command should be: > root (hd0,2)

If you are not sure which partition actually holds this directory, use the command 'find' like this:

grub> find /boot/grub/stage1

This will search for the file name '/boot/grub/stage1' and show the devices which contain the file.
Once you've set the root device correctly, run the command 'setup'.

8) Then, run the command setup

grub> setup (hd0)

Checking if "/boot/grub/stage1" exists....... no
Checking if "/grub/stage1" exists....... yes
Checking if "/grub/stage2" exists....... yes
Checking if "/grub/e2fs_stage1_5" exists....... yes
Running "embed /grub/e2fs_stage1_5 (hd0)"....... 15 sectors are embedded
succeded
Running "install /grub/stage1 (hd0) (hd0) 1+15 p (hd0,2)/grub/stage2 /grub/grub.conf....... succeded
Done


This command will install GRUB boot loader on the Master Boot Record (MBR) of the first drive.

9) Type quit

grub> quit

GRUB is now in the MBR.

10) Finally, you'll have to edit your /boot/grub/grub.conf, for example whith nano:

> nano /boot/grub/grub.conf

(/etc/grub.conf or /boot/grub/grub.conf or /boot/grub/menu.lst, they are the same file) This file has the boot partitions of the disk/s.

11) Restart your PC without the Fedora Core CD 1 Installation.


My grub.conf

default=0
timeout=30
splashimage=(hd0,2)/grub/splash.xpm.gz

title GNU/Linux Fedora Core 1 (2.4.22-1.2188.nptl)
root (hd0,2)
kernel /vmlinuz-2.4.22-1.2188.nptl ro root=LABEL=/ hdc=ide-scsi hdd=ide-scsi apm=off acpi=on vga=788
initrd /initrd-2.4.22-1.2188.nptl.img

#title GNU/Linux Fedora Core 1 (2.4.22-1.2174.nptl)
#root (hd0,2)
#kernel /vmlinuz-2.4.22-1.2174.nptl ro root=LABEL=/ hdc=ide-scsi apm=off acpi=on rhgb
#initrd /initrd-2.4.22-1.2174.nptl.img

title GNU/Linux Mandrake 9.2
kernel (hd0,6)/vmlinuz root=/dev/hda8 devfs=mount hdc=ide-scsi resume=/dev/hda9
initrd (hd0,6)/initrd.img

title Microsoft Windows 98 SE & XP Pro
rootnoverify (hd0,0)
chainloader +1




List of commands,

default=0
My default boot system is, of course, Fedora.

timeout=30
Fedora will boot in 30 seconds if you don't touch anything.

splashimage=(hd0,2)/grub/splash.xpm.gz
Generally the splash image is in your /boot partition. In my case, hd0,2 is where I have the image.

title GNU/Linux Fedora Core 1 (2.4.22-1.2174.nptl)
The name of your OS that will appear in your menu at starup, you can write anything you want.

root (hd0,2)
This is your /boot partition specifies which partition contains your Linux kernel image. So "root (hd0,2) tells GRUB that the kernel is on the 3rd primary partition of my first hard disk (I have two), in my case (hd0,2).

kernel /vmlinuz-2.4.22-1.2174.nptl ro root=LABEL=/ hdc=ide-scsi apm=off acpi=on rhgb
Tells GRUB where to find your kernel, my kernel version is 2.4.22-1.2174, you have to type your kernel version.

rhgb
Red Hat Graphical Boot

apm=off acpi=on
I had to add 'apm=off acpi=on' to my kernel parameters to get power-off to work properly.

initrd /initrd-2.4.22-1.2174.nptl.img
Tells where your init ramdisk image is located.

title Microsoft Windows 98 SE & XP Pro
As I said, I have Windows 98 in hd0,0 and Windows XP in (hd0,1).

rootnoverify (hd0,0)
rootnoverify tells GRUB to boot from the Windows partition, but not to attempt to mount it.
(hd0,0) is where Windows XP puts the boot.ini to boot into Windows 98 and XP.

chainloader +1
chain-load is the mechanism for loading unsupported operating systems by loading another boot loader. It is typically used for loading DOS or Windows.
chainloader tells GRUB to chain to Windows' boot loader which will start Windows.

Other options you can use:

map
If you have installed DOS (or Windows) on a non-first hard disk, you have to use the disk swapping technique, because that OS cannot boot from any disks but the first one.

Map the drive from_drive to the drive to_drive. This is necessary when you chain-load some operating systems, such as DOS, if such an OS resides at a non-first drive. Here is an example:

grub> map (hd0) (hd1)
grub> map (hd1) (hd0)

This performs a virtual swap between your first and second hard drive.

Caution: This is effective only if DOS (or Windows) uses BIOS to access the swapped disks. If that OS uses a special driver for the disks, this probably won't work.

makeactive
Set the active partition on the root disk to GRUB's root device. This command is limited to primary PC partitions on a hard disk.

Code:
title Windows 98 SE
map (hd0) (hd1)
map (hd1) (hd0)
makeactive
rootnoverify (hd1,0)
chainloader +1


hide
Hide the partition partition by setting the hidden bit in its partition type code. This is useful only when booting DOS or Windows and multiple primary FAT partitions exist in one disk.

unhide
Unhide the partition partition by clearing the hidden bit in its partition type code. This is useful only when booting DOS or Windows and multiple primary partitions exist in one disk.

Explanation and examples of the hide and unhide commands

If you installed more than one set of DOS/Windows onto one disk, they could be confused if there are more than one primary partitions for DOS/Windows. There is a solution if you do want to do so. Use the partition hiding/unhiding technique.

If GRUB hides a DOS (or Windows) partition, DOS (or Windows) will ignore the partition. If GRUB unhides a DOS (or Windows) partition, DOS (or Windows) will detect the partition. Thus, if you have installed DOS (or Windows) on the first and the second partition of the first hard disk, and you want to boot the copy on the first partition.

Here's how to create two installations of Windows, hda1 and hda2 or (hd0,0) and (hd0,1), using the commands hide and unhide.

For Windows 98 SE "My Entry":
Code:
title My Entry
unhide (hd0,0)
hide (hd0,1)
rootnoverify (hd0,0)
makeactive
chainloader +1


For Windows 98 SE "Family Entry"
Code:
title Family Entry
unhide (hd0,1)
hide (hd0,0)
rootnoverify (hd0,1)
makeactive
chainloader +1


I did not have to use the 'hide' or 'unhide' command 'cause Windows XP, 2000 or NT have a boot manager (boot.ini) included. So, I only had to point where this boot.ini is. In my case, Windows XP copies this boot.ini where Windows 98 is installed, (hd0,0)
You should definitely use the 'hide' or 'unhide' command if you have,for example, two installations of Windows 98 or ME.



If everything went just fine, voila, GRUB now becomes your main boot manager for your multi OS system.


GRUB and Linux Partitions

First of all, GRUB requires that the device name be enclosed with ( ). Please, note that the partition numbers are counted from zero, not from one.


(hd0) in GRUB = is hda in Linux
Here, 'hd' means it is a hard disk drive. The first integer '0' indicates the drive number, that is, the first hard disk.


(hd1) in GRUB = is hdb in Linux
The first integer '1' indicates the drive number, that is, the second hard disk.


(hd0,1) in GRUB = is hda2 in Linux
This expression means the second primary partition of the first hard disk drive. In this case, GRUB uses one partition of the disk, instead of the whole disk.


(hd0,4) in GRUB = hda5 in Linux
This specifies the first extended partition of the first hard disk drive. Note that the partition numbers for extended partitions are counted from '4', regardless of the actual number of primary partitions on your hard disk.


(hd0,5) in GRUB = hda6 in Linux
This is the first logical unit of the extended partition of the the first hard disk.


(hd1,0) in GRUB = is hdb1 in Linux
This is the first primary partition of the second hard disk.


Source : http://www.fedoraforum.org/forum/showthread.php?t=975
Copy Paste, without permission.

Thursday, January 24, 2008

Adding new Library PATH

I am getting error when I create postgresql database. The error is

error while loading shared libraries: libpq.so.5: cannot open shared object file: No such file or directory



then i just add the library of postgres to /etc/ld.so.conf


include ld.so.conf.d/*.conf
/u01/postgres/postgresql/8.2.0/lib

Then I run :
/sbin/ldconfig

Thats it.

Friday, January 11, 2008

Install Java di ubuntu

Install java di ubuntu 7.10.

Download java di, java.sun.com dalam bentuk bin.
http://java.sun.com/javase/downloads/index_jdk5.jsp

root>apt-get install fakeroot
root>apt-get install java-pakage

Kemudian "di sulap" jadi .deb dengan perintah (tidak boleh root):

userbiasa> fakeroot make-jpkg jre-1_5_0_12-linux-i586.bin

setelah semua proses selesai dengan menerima aggrementnya. maka akan di buat pakage debian. sun-j2re1.5_1.5.0+update12_i386.deb

userbiasa>su -l #untuk login ke root(install paketnya)
root>dpkg -i
sun-j2re1.5_1.5.0+update12_i386.deb
root>java -version
java version "1.5.0_12"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_12-b04)
Java HotSpot(TM) Client VM (build 1.5.0_12-b04, mixed mode, sharing)


Selesai.

Tuesday, January 8, 2008

Recover Data From a dead hard drive using ddrescue

Recover Data From a dead hard drive using ddrescue

by @ 9:07 am. Filed under Backup

Like dd, dd_rescue does copy data from one file or block device to another.dd_rescue is a tool to help you to save data from crashed partition. It tries to read and if it fails, it will go on with the next sectors where tools like dd will fail. If the copying process is interrupted by the user it is possible to continue at any position later. It can copy backwards.


dd_rescue Advantages

Imagine, one of your partitions is crashed, and as there are some hard errors, you don’t want to write to this hard disk any more. Just getting all the data off it and retiring it seems to be suitable. However, you can’t access the files, as the file system is damaged.

Now, you want to copy the whole partition into a file. You burn it on CD-Rom, just to never lose it again. You can setup a loop device, and repair (fsck) it and hopefully are able to mount it.

Copying this partition with normal Un*x tools like cat or dd will fail, as those tools abort on error. dd_rescue instead will try to read and if it fails, it will go on with the next sectors. The output file naturally will have holes in it, of course. You can write a log file, to see, where all these errors are located.

The data rate drops very low, when errors are encountered. If you interrupt the process of copying, you don’t lose anything. You can just continue at any position later. The output file will just be filled in further and not truncated as with other Un*x tools.

If you have one spot of bad sectors within the partition, it might be a good idea, to approach this spot from both sides. Reverse direction copy is your friend.

The two block sizes are a performance optimization. Large block sizes result in superior performance, but in case of errors, you want to try to salvage every single sector. So hardbs is best be set to the hardware sector size (most often 512 bytes) and softbs to a large value, such as the default 16k.

Install dd_rescue in Debian

Install ddrescue using the following command

#apt-get install ddrescue

Install ddrescue in Ubuntu

sudo apt-get install ddrescue

This will complete the installation

ddrescue Syntax

dd_rescue [options] infile outfile

Now we will see how to use ddrescue under damaged disk

If you have a damaged hard disk /dev/sda1 and you have an empty space hard disk /dev/sda2 Now if you want to copy data from /dev/sda1 to /dev/sda2 use the following commnd

# dd_rescue /dev/sda1 /dev/sda2/backup.img

If you are using ubuntu linux use the following command

sudo dd_rescue /dev/sda1 /dev/sda2/backup.img

This copies an image of /dev/sda1 to sda2

Now you need to check the backup image consistency this will check for is there any problems with this image.

#fsck -y /dev/sda2/backup.img

If you are using ubuntu linux use the following command

sudo fsck -y /dev/sda2/backup.img

After finishing this checking you need to mount your disk image in to your other hard disk

#mount /dev/sda2/backup.img /mnt/recoverydata

If you are using ubuntu linux use the following command

sudo mount /dev/sda2/backup.img /mnt/recoverydata

This will mount all the data from the backup.img under /mnt/recoverydata now you can try to access the data it should work without any problem.

Restore image

If you want to restore this image use the following command

#dd_rescue /dev/sda2/backup.img /dev/sda1

If you are using ubuntu linux use the following command

sudo dd_rescue /dev/sda2/backup.img /dev/sda1

Copy Disk Image to remote machine using SSH

If you want to copy your disk image to remote machine over ssh you need to use the following command

#dd_rescue /dev/sda1 - | ssh username@machineip ‘cat /datarecovery/backup.img’

If you are using ubuntu linux use the following command

sudo dd_rescue /dev/sda1 - | ssh username@machineip ‘cat /datarecovery/backup.img’

This will be prompetd for password of the username you have menctioned in the above command after entering the password dd_rescue strats copying obviously it will take some time to copy over the network.

Possible Error

If you see the following error at the time of copying you can ignore this error

dd_rescue: (warning): output file is not seekable!
dd_rescue: (warning): Illegal seek

If you want to take this image in compressed format you can use the following command format

#tar zcvf - /dev/sda1 | ssh username@machineip ‘cat@@>/tmp /datarecovery/backup.tar.gz’

If you are using ubuntu linux use the following command

sudo tar zcvf - /dev/sda1 | ssh username@machineip ‘cat@@>/tmp /datarecovery/backup.tar.gz’

If you want to know more available options check dd_rescue man page