Active 3G/GPRS on Google Nexus One (SingTel/M1)

7:17:00 AM |
Just moved to Singapore recently and try to find the way to surf Internet from my Google  Nexus One. I failed with M1 card. However, still try one last time in SingTel (Hi!card). Amazingly, It works!!!!!!!!!!!!

Read more…

How To Hack WPA/WPA2 Wireless

8:08:00 AM |
In this video, I'll show you how to crack WPA/WPA2 using Aircrack-ng. This is an WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. This this post, I installed Aircrack-ng on Ubuntu 10.4. You can use Backtrack 5 to achieve the same result.
Read more…

How To Send An Email Automatically With SendEmail (Windows/Linux)

6:14:00 AM |
This is a convenient way for you to make a daily or weekly report form Windows or Linux. This SendEmail application is already on Linux Machine. On Microsoft Windows, you need to download manually from SendEmail.
Read more…

How To Secure Your Database (MySQL)

11:52:00 PM |
Your data is essential to your Web database application. You have spent valuable time developing your database, and it contains important information entered by you or by your users. In this post, I will show you how to protect your data from hackers. 
Read more…

How To Recover MySQL Root Password

11:24:00 AM |
Suppose you accidentally deleted MySQL’s root account or forgot what it is. In this case, this post explains how to recover MySQL root password by setting a new MySQL password.
Read more…

How To Install Thunderbird 6.0 On Ubuntu

1:03:00 AM |
Thunderbird is a free email application that’s easy to set up and customize. If you want the latest version, let’s go to and get it! You need to decompress the installation files before starting to use it. In my case:
Read more…

How To Manage Database Using phpMyAdmin 3.4 On CentOS 6 (MySQL)

1:05:00 AM |
A database needs to be able to receive information for storage and to deliver information on request. You’re likely to perform four types of task on your database: adding information, updating information, retrieving information and removing information.
Read more…

How To Create A New Database Using phpMyAdmin 3.4 (MySQL)

12:48:00 AM |
I this post, I explain how to create your new database on your local computer or on a Web hosting account. After you create a new database, you can add tables to it.
Read more…

How To Install phpMyAdmin 3.4 On CentOS 6

12:24:00 AM |
In my previous post, you knew how to set up your own website with Apache, MySQL and PHP on CentOS 6. Today, I’ll show you how to use phpMyAdmin 3.4 to manage your MySQL server. This software provides a user interface that greatly simplifies your interactions with MySQL.
Read more…

How To Organize Your Database (MySQL)

12:12:00 AM |
MySQL is an RDBMS (Relational Database Management System), which means that the data is organized into tables. You can establish relationships between the tables in the database. Here are the steps for organizing your data into tables:
Read more…

Setting Your Own Website On CentOS 6 (PHP 5 & MySQL 5)

11:11:00 PM |
If you’re setting up your own Web server from scratch, you have to install a Web server, PHP, and MySQL – as well as maintain, administer, and update the system yourself. Here are the general steps that lead to your dynamic Web site:
Read more…

How To Install CentOS 6 Step By Step

1:04:00 AM |
This guide will help you install CentOS 6 smoothly. There're some things that you  should notice before starting to install CentOS 6. First, your memory must be at least 384MB (no Desktop) or 512MB (Desktop).  Then you should enable PAE on your CPU. Now we start to install your Linux machine:
Read more…

Setting Up A Secure DNS Server On CentOS 5.6 (RHEL)

1:29:00 AM |
Domain Name Service is what translates websites name into an IP address so that the site may be accessed. This translation occurs when you are connecting to other systems on your network through their hostnames instead of their IP addresses. 
Read more…

How To Set Up FTP Server On CentOS 5.6 (RHEL)

4:27:00 AM |
File Transfer Protocol (FTP) is one of the easiest to use, and most convenient. To transfer a file using the FTP protocol, a user must log in to an FTP server, which can be done with credentials or anonymously. 
Read more…

Setting Up Squid Proxy Server On Linux (CentOS/RHEL)

11:06:00 AM |
A proxy server is a device that usually sits between a client and the destination the user is trying to reach. It can provide security, anonymity, and even protection for the client behind the proxy. Here, we look at how to set up a web proxy, define access control lists, and troubleshoot it.
Read more…

How To Setup A Secure Apache Web Server On Linux

2:38:00 AM |
Apache is a solid and stable web server that has been around for years. Apache can also be used to host multiple websites at a single time through the use of its virtual hosts feature. There is also an option to use SSL protocol, making websites safe and secure.
Read more…

Setting Up VNC Server On Linux (RHEL/CentOS)

12:48:00 AM |
The VNC server allows you to remote into the user’s system and view her desktop. With the end user’s desktop in view, you can more easily troubleshoot any issues she is having. Setting up a VNC serer isn’t hard at all.
Read more…

How To Secure SSH Connection

8:36:00 PM |
Secure your SSH connection is very important. I guess that you don’t want your password being hacked, right? There are some tips that can help you to have a securer connection. Here we go!
Read more…

Backup and Restore Linux OS

1:37:00 PM |
Backup your Linux OS is the first thing I want to do after installing my Linux machine and necessary softwares. You can install your OS again but it takes long time and effort to install all the stuffs in your machine. Now I start to backup and restore my Ubuntu 9.10. It’s the same to the other distributions.
Read more…

Working With Security Enhanced Linux (SELinux)

3:54:00 AM |
Security Enhanced Linux (SELinux) is another layer of security for the Linux OS. Instead of turning it off, however, you could use SELinux in “permissive” mode, which allows everything to function normally but logs warnings when actions or commands would have been blocked. 
Read more…

Managing Password Policies On Linux

3:18:00 AM |
There are a few different ways you can manage the password policies on you system.
Read more…

Configure NAT Server On Linux (CentOS/RHEL)

3:13:00 AM |
Network address translation (NAT) allows you to use a server as a gateway to a subnet, essentially controlling what goes in and out of your network. Suppose you have two network outside ( and inside ( You need to create a firewall rule to allow all your clients on the internal network to be able to communicate with the outside world.
Read more…

Basic Linux System Security

3:09:00 AM |
Understanding the basics of Linux security is the best method to keep your business from outside or inside attacks. 
Read more…

Auto Install Linux Over Network

11:09:00 AM |
Kickstart server enables you to install Linux over the network via the HTTP, FTP, or NFS protocols. I choose to use the HTTP protocol here because it was the quickest to setup and slightly easier than the other two protocols. 
Read more…

How To Upgrade The Linux Kernel

10:50:00 AM |
Linux is truly just the kernel. Red Hat and the other distributions in existence today are software and configuration files packaged with the Linux kernel to bring you an entire operating system. The kernel can be used to load new drivers, support new hardware, or even offer a custom kernel for individual needs.
Read more…

Monitor System Performance In Linux

5:47:00 AM |
Every time a program or command is run, a process is created for it. These processes are all unique and identified by the process identification (PID) that becomes allocated to it. Management of processes can help keep the system stable or help when the system becomes unstable. Here are some of the process management commands you use:
Read more…

Configure Windows And Linux Central Authentication With LDAP (Not Secure)

5:19:00 AM |
The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. This service allow you to store your users and passwords in a central location. Now, I will guide you how to setup network authentication with LDAP.
Read more…

Centralized Log Management In Linux (RHEL)

3:10:00 AM |
Whenever something goes wrong – and sometimes when things go right – on the system, a message is generated by the syslog service. In all seriousness, understanding system logging is important so that you can troubleshoot when something goes wrong. 
Read more…

Linux File & Folder Permission With Group Collaboration

6:26:00 AM |
Group Collaboration is an essential part of any system administrator who deals with users. Knowing file and directory permissions will allow you to let users work together. Here, we look at three key features:
Read more…

User And Group Management In Linux

6:22:00 AM |
In Red Hat, there are three different types of user accounts: root, normal user and system. The root account is the equivalent of the Administrator or Enterprise Admin account in the Windows world. You should never use this account because of the power of this account has. Ever!
Read more…

How To Install TeamViewer On Ubuntu

4:55:00 AM |
TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in front of it. Now I will show you how to install the newest version of TeamViewer on Ubuntu.
Read more…

Creating Your Own Repository From CentOS DVD

4:32:00 AM |
It’s common for system administrators to create their own repositories where they keep not only a copy of Red Hat (or CentOS) packages, but also their own custom software packages. Now I will guide you how to create a DVD repository from your CentOS DVD.
Read more…

How To Create Your Own RPM Package

3:27:00 AM |
A key skill for a system administrator is being able to deploy your own custom software. However, you first need to build an RPM package that contains your custom software. To build an RPM, you must do the following:
Read more…

Working With RPM In Linux

3:04:00 AM |
In Red Hat, the popular package used for installation usually have the .rpm extension and can be installed through different means. Before starting to install the package, let’s take a look at the naming convention used by the system to describe packages.
Read more…

Troubleshooting Network Connections In Linux

11:11:00 PM |
The key component to network troubleshooting is making sure that everything is working smoothly and that your network is functioning properly. There are quite a few commands that you can use when troubleshooting network problem.
Read more…

How To Set Up AutoMounter (AutoFS) In Linux

1:32:00 AM |
The benefit of this is that remote resources can be mounted automatically and without the need for the root user to perform the mount. This is done through the use of a special config file called maps. There are two key files to know when working with AutoFS:
Read more…

Quotas Management In Linux

1:17:00 AM |
A disk quota is a limit set by a system administrator that restricts certain aspects of file system usage on modern operating systems. The function of using disk quotas is to allocate limited disk space in a reasonable way.
Read more…

Permissions Management With Access Control Lists (ACLs) In Linux

12:57:00 AM |
Linux, like most operating systems, has a standard set of file permissions. Aside from there, it also has more refined set of permissions implemented through access control lists. Now we will find out how they are used to implement file system security for files, directories, and more.
Read more…

How To Secure Your Linux Hard Disk Partition With LUKs

11:57:00 AM |
Linux Unified Key Setup, or LUKs, is a disk encryption for Linux. LUKs uses block device encryption, which protects the system when it is off (particularly if the drive is removed or stolen). If you are using this method, you are required to enter a password. You will be promoted for this password every time the system boots to decrypt the partitions for use by the system. So do not lose this password! If you do, anything you have encrypted will be completely inaccessible.
Read more…

How To Convert CHM To PDF In Linux

5:42:00 AM |
I recently tried to convert CHM (Windows Help File) to PDF. There're many methods to achieve this. Now I give you an easiest way to make your PDF file from CHM using chm2pdf script.
Read more…

Working With File System (Ext2, Ext3 & Ext4) On Linux

4:00:00 AM |
After setting up the layout of the different disks for the system. Now to be able to use these disks, we need to create a file system for each one, mount it somewhere on the file hierarchy, and set it so that it will always be available when the system boots up.
Read more…

Hide Yourself On The Internet With “The Onion Router” - TOR

2:25:00 AM |
Onion Proxy Server allows users of the Tor network to make anonymous outgoing connections via TCP. The key advantage that Tor has over other anonymity networks is its application independence and that it works at the TCP stream level. Tor is truly an amazing advance in anonymous communications across the Internet.
Read more…

How To Create Swap Space / File on Linux

11:53:00 PM |
The system uses swap space as type of “virtual memory” for when your physical memory begins to run low. It does this by using piece of disk storage to swap files in and out of memory (hence, the term swap). This capability can be useful on systems that don’t have large amounts of physical memory or when your system is running something that become more intensive.
Read more…

Service Management on Linux (RHEL)

10:31:00 PM |
On any system it is important to manage the running services. Managing services enables you to ensure the stability and reliability that your system will offer. A service can range from something simple, such as providing your local system with the correct time, or something more complex, such as sharing a file system over the entire network for your users using NFS. 
Read more…

Working With Runlevels on Linux

5:05:00 AM |
When the system boots up, it queries for the default runlevel, which is defined in the /etc/inittab file. When that default runlevel is located, the system boots into that particular runlevel. The different runlevels are essentially “states,” which allow services to be started or stopped depending on the runlevel you are in. 
Read more…

Deploying "Windows 7 / Windows Server 2008" Through Network With OpenQRM 4.8

12:11:00 AM |
After my previous posts: "How To Install OpenQRM 4.8 on CentOS 5.6" and "Deploying Windows XP Through Network With OpenQRM 4.8". Now I introduce you how to deploy Windows 7 or Windows Server 2008 through Network.  
Read more…

How To Demote Windows Server 2008 Domain Controller

10:15:00 PM |
If you have some problems and want to demote your Windows Server 2008 Domain Controller, here is short and fast way to do it. I don't want to make it so complicated. Just follow the instruction and finish your demoting.
Read more…

Deploying Windows XP Through Network With OpenQRM 4.8

6:30:00 AM |
In my previous post, "How To Install OpenQRM 4.8 on CentOS 5.6" , you already knew how to install OpenQRM. Today, I will guide you how to deploy Windows XP through Network. That means after deploying, you won't need any hard drive in your machine anymore. Moreover, you just need a monitor with PoE function. 
Read more…

Fixed "Failed To Access The Usb Subsystem" - VirtualBox

2:22:00 AM |
"Failed to access the USB subsystem". It's a normal error ,When you first install VirtualBox into your Machine. The solution is very simple too, on your screen.
Read more…

Working With GRUB In Linux

5:36:00 AM |
The GRUB bootloader is broken down into different stages. The code contained on the master boot record (MBR) is considered GRUB stage 1. It loads GRUB stage 1.5, which tries to identify the file system type (optional), or it can call GRUB stage 2 directly. Stage 2 is what calls the kernel and loads it into memory. GRUB has its own format for looking through hard disks. The syntax of this format is:

(xdn[,m]) where xd is the drive, n is the number of the disk, and  m denotes the partition number.
Read more…

How To Install OpenQRM 4.8 On CentOS 5.6

11:31:00 PM |
openQRM is the next generation, open-source Data-center management platform. Its fully pluggable architecture focuses on automatic, rapid- and appliance-based deployment, monitoring, high-availability, cloud computing and especially on supporting and conforming multiple virtualization technologies. openQRM is a single-management console for the complete IT-infra structure and provides a well defined API which can be used to integrate third-party tools as additional plugins.
Read more…

Fixed "unknown filesystem type 'LVM2_member' " on Ubuntu

3:34:00 AM |
When trying to mount a physical disk from CentOS to Ubuntu, I got this problem "unknown filesystem type "LVM2_member". After a while, I find out the solution.
Read more…

Enable POP3 And Forwarding Setting In Yahoo! Mail Account

12:32:00 PM |
If you want to use POP3 or Forwarding function in Yahoo! Mail, you need to pay money. Now, you can play some tricks to enable these function for FREE with some simple steps.
Read more…

How To Copy Content of One Hard Disk To Another through Network

5:25:00 AM |
When installing openQRM, I did follow the instruction of the paper guide. However, the part of copying content from Windows hard disk to iSCSI LUN is too short and complicated. So I decide to try a new way. It's easy to transfer data from one to another using "nc" command.
Read more…

How To Disk Management Using Logical Volume Manager (LVM) on Linux

1:56:00 PM |
LVM is a form of advanced partition management. Working with LVM, however, is one of the more complex topics to understand the first time you deal with it. After you have some practice, you will find that LVM just makes life easier.
Read more…

Disk Management with Parted on Linux

1:44:00 PM |
This is useful for creating space for new operating systems, reorganizing disk usage, copying data on hard disks and disk imaging. Now, I will show you some tips to master it.
Read more…

How To Sync Data on Schedule (Windows Server 2008)

1:15:00 AM |
There's an automatic and simple way for you to auto synchronize data from one location to another place. You can use the function of Task Schedule in Windows Server 2008. First, I create a basic schedule that running daily at 8:40 pm with the parameter below.
Read more…

Fixed Domain Name Conflict With Website (Windows Server 2008 R2)

12:25:00 AM |
I recently created a Domain Controller. However, I forgot that it's the same with Website. So when users join to Domain. It cannot connect to real website while the others works well. I don't want to change the domain name of Domain Controller. It's not so good. I think!
Read more…

Network Design - Scenario 1

1:23:00 PM |
This is a small design for an office. There are more than 15 employees in different three rooms.
Read more…

Manually Edit Boot Menu on Ubuntu (Grub2)

4:30:00 AM |
Today, I'll give you an example how to manually edit your boot menu on Ubuntu. The image below is my currently boot list. It's a mess! So, I decided to delete some useless ones. 
Read more…

How To Change Boot Order on Ubuntu (Grub2)

3:05:00 AM |
Changing boot order and time default on Ubuntu is not hard as you thought. The first thing to do is check the order of boot menu in "/boot/grub/grub.cfg". They start from "0" value, so just memorize the position. The next thing to do is adjust file "/etc/default/grub" file.
Read more…

Using VNC with Terminal Server Client on Ubuntu

4:55:00 AM |
Terminal Server Client is already integrated in Ubuntu. However, the VNC function is gray-out. So you need to install manually.
Read more…

How To Schedule Windows Server 2003/2008 Shutdown or Restart Automatically

2:27:00 AM |
This guide will help you to create a Task Schedule to Shutdown or Restart Windows Server Automatically. First, you have to download PSshutdown from Microsoft. Then create a Task Schedule:
Read more…

How To Disable Password Complexity on Active Directory (Windows Server 2008)

5:35:00 AM |
Turning of this function is not as easy as Windows Server 2003. I'll brief to guide you have to conduct in no time.
Read more…

How To Set IP Address on Ubuntu

10:05:00 PM |
The first method is very simple. Just use command line:

sudo ifconfig eth0 netmask up

Read more…

How To Expand/Resize Hard Disk on VirtualBox or Linux

4:11:00 AM |
When trying Zimbra on CentOS, I got a problem that it requires at least 5GB on my hard disk. Instead of reinstall my Virtual Machine, I decided to expand my current hard disk. First, I plan to use Gparted Live CD to extend. However, Gparted is just useful for Windows or some Linux version that didn't use LVM. And the lastest one does not support LVM yet! So, I have to expand my hard disk by hand on CentOS.
Read more…

Fixed "Probling EDD (end = off to disable)" Error When Install RHEL 6.0 on VirtualBox

12:35:00 AM |
I got a strange error when trying install RHEL 6.0 on my VirtualBox: "Probling EDD (end = off to disable)". Although the default Memory is set to 512MB. The problem got fixed when I change the memory to 384MB or just change the....size of installation Windows. Not sure it's a kernel or Memory or...size problem. Hope this help!
Read more…

Simple Method To Create ISO Image From CD/DVD on Linux

9:54:00 PM |
This is a simple guide to help you create ISO image with some short commands in no time!
Read more…

How To Install Red Hat Enterprise Linux (RHEL) 6.0

1:54:00 PM |
This post guides you how to basically install RHEL 6.0. You can set 384M RAM. However, it's better if you choose 512M. 
Read more…

Manage Virtual Machines on VMware ESXi 4.1 with vCLI

1:07:00 AM |
Although it's hard for Linux Users to manage VMs on VMware Esxi, there're still some convenient tools for control it more easily.
Read more…

Install VMware vSphere Client 4.1 CLI on Linux (Ubuntu 10.4)

12:04:00 AM |
It is so sad that the graphic management VMware ESXi is not support Linux OS so today I will write about how to use vCLI on Linux.
Read more…

Failed to Use VMware vSphere Client 4.1 on Linux

3:21:00 AM |
After trying to install VMware vSphere Client 4.1 on Ubuntu 10.4, the final result is the same with I expected.

When I start to install using Wine, VMware require .Net Framework 3.5 SP1 for using. So, I continue to install .Net 3.5 through winetricks (you can reference here).
Read more…

Install Winetricks and .Net Framework 3.5 on Linux

4:27:00 AM |
1- Winetricks is a application which help to install library or part for Wine. The process to install is quite simple:
Read more…

Install VirtualBox on Ubuntu 10.4

2:34:00 AM |

The process of installing VirtualBox on Ubuntu is pretty easy.
Read more…

Basic Configuration for FortiGate 100A

2:26:00 AM |
Hôm qua ôm con Fortigate về cấu hình. Ngồi vật vã một hồi mới phát hiện là người ta đã quậy lung tung nên cũng mém...bó tay. FortiGate không tự động cấp DHCP khi kết nối với PC, đặt IP tĩnh theo hướng dẫn cũng không xi nhê. Lay hoay một hồi quyết định cắm dây mạng vào cổng Internal để cho Router tự cấp IP. Nhưng lại không biết IP của nó cấp là bao nhiêu >.<.
Read more…

Memory Limits for Windows Releases

4:45:00 AM |
Physical Memory Limits: Windows 7

Read more…

How to Fixe Any Computer And...Quietly Weep

10:39:00 PM |
Funny Pic!
Read more…

Would You live in a Cube?

2:20:00 AM |

Read more…

How to Limit IP Connections Using Iptables (Againt DDOS Attack)

6:45:00 AM |
Ví dụ 1: Câu lệnh sau sẽ giúp giới hạn tất cả kết nối (có hại) từ bất kỳ địa IP đến PC. Phương thức này có thể áp dụng chống lại DDOS attack.
Read more…

Pinic, Dinner and Coffee in District 7

12:47:00 PM |
Hôm nay giỗ tổ Hùng Vương mà không thấy ai làm đám giỗ hết nên tự mình đi chơi vậy :)

Thành viên: 2 nam (not gay!)
Thời gian: 3pm-7pm
Địa điểm: Lotte Mart --> Paragon (Quận 7)
Phương tiện: chân + dép

Read more…

Sử dụng ổ đĩa ảo trên Linux (CentOS)

11:57:00 PM |
Sử dụng ổ đĩa ảo trên Linux dễ dàng hơn trong Windows vì không cần phải cài đặt bất cứ chương trình hỗ trợ nào :)
Tất cả những gì bạn cần là một file ISO và một đường dẫn để mount vào.
Giả sử bạn có file ISO là WinXP.ISO đặt ở thư mục /home/

mkdir /media/drive_ao      # Tạo thư mục để mount ổ đĩa ảo vào
mount -t iso9660 /home/WinXP.ISO /media/drive_ao -o loop

Thế là xong, ổ ảo đã xuât hiện!!!!!!!
Read more…

Make a Donation