October 31, 2007
Cannot copy: path is too deep
"Cannot copy file namafile.ext. path is too deep"
Google-google... macam2 penyelesaian yg ada. Antaranya tak configure WINS server, DFC dan lain2...
Situasinya macam ni. That pretty message prompted while I was copying a file from my pc to the server. It is Microsoft Windows 2003 Standard Server and my pc running on Microsoft Windows XP Professional SP2. The server has two NICs working and teamed into one network.
What I've done were (these are fail attempts):
1. Configure WINS Server.
2. Reset privilege to that particular folder.
3. Reset shared permission to that folder.
4. Restart the server.
5. Reconfigure the network.
Finally, when my head just about to explode, I found something not right. One of the NICs running on 100mbps which is supposed to be GigaBit. *tuuut*... who the *tuuuut* has done this? Then after I've change the speed to auto (it is forced to be 1000mbps at the network switch port), everything is going to be ok.
LDAP - Lightweight Directory Access Protocol
In a network, a directory tells you where in the network something is located. On TCP/IP networks (including the Internet), the domain name system (DNS) is the directory system used to relate the domain name to a specific network address (a unique location on the network). However, you may not know the domain name. LDAP allows you to search for an individual without knowing where they're located (although additional information will help with the search).
An LDAP directory is organized in a simple "tree" hierarchy consisting of the following levels:
The root directory (the starting place or the source of the tree), which branches out to
Countries, each of which branches out to Organizations, which branch out to Organizational units (divisions, departments, and so forth), which branches out to (includes an entry for) Individuals (which includes people, files, and shared resources such as printers)
An LDAP directory can be distributed among many servers. Each server can have a replicated version of the total directory that is synchronized periodically. An LDAP server is called a Directory System Agent (DSA). An LDAP server that receives a request from a user takes responsibility for the request, passing it to other DSAs as necessary, but ensuring a single coordinated response for the user.
October 30, 2007
Internet Explorer security settings that you set with a Group Policy object are not propagated
http://support.microsoft.com/default.aspx/kb/316702
Barang harus diingat, hanya sebahagian dari penyelesaian... huhuhuh
---------------------------------------------------------------------------------------
SYMPTOMS
CAUSE
RESOLUTION
1. | On a domain controller, open the Active Directory Users and Computers snap-in. |
2. | Right-click the domain name, and then click Properties. |
3. | Click the Group Policy tab, click the default domain policy, and then click Edit. |
4. | Expand Administrative Templates under Computer Configuration in the Tree pane. |
5. | Expand System under Administrative Templates, and then click Group Policy. |
6. | Click Internet Explorer Maintenance Policy Processing in the Policy pane. |
7. | Double-click Internet Explorer Maintenance Policy Processing to open the properties for Internet Explorer Maintenance Policy Processing. |
8. | Click Enable on the Policy tab, and then click Process, even if Group Policy objects have not changed. |
9. | Click OK to set the policy. |
MORE INFORMATION
Each Group Policy is identified by a 32-digit GUID. The default domain policy GUID always starts with "31B," and the default organizational unit policy starts with "6AC." To locate the GUID for any custom policy, right-click the container for the policy, and then click Properties. Click the Group Policy tab, click the policy, and then click Properties. The GUID is displayed on the General tab in the Unique Name box.Each Group Policy is stored on the computer where it was created. For example, you may create the Group Policy setting in the %SystemRoot%\Sysvol\domain_name\Sysvol\Policies folder, where domain_name is the name of the domain. The folder is named as the GUID for that policy. There is an Adm folder, a machine folder, and a user folder. In the Adm folder, you can locate the Inetres.adm file. This is the file where the Internet Explorer settings are stored. You can open the file by using a text editor such as Notepad.
October 29, 2007
Spanning Tree Protocol (STP)
In a local area network (LAN) such as an Ethernet or Token Ring network, computers compete for the ability to use the shared telecommunications path at any given time. If too many computers try to send at the same time, the overall performance of the network can be affected, even to the point of bringing all traffic to a near halt. To make this possibility less likely, the local area network can be divided into two or more network segments with a device called a bridge connecting any two segments. Each message (called a frame) goes through the bridge before being sent to the intended destination. The bridge determines whether the message is for a destination within the same segment as the sender's or for the other segment, and forwards it accordingly. A bridge does nothing more than look at the destination address and, based on its understanding of the two segments (which computers are on which segments), forwards it on the right path (which means to the correct outgoing port). The benefit of network segmentation (and the bridge) is that the amount of competition for use of the network path is reduced by half (assuming each segment has the same number of computers) and the possibility of the network coming to a halt is significantly reduced.
Each bridge learns which computers are on which segment by sending any first-time message to both segments (this is known as flooding) and then noticing and recording the segment from which a computer replied to the message. Gradually, the bridge builds a picture for itself of which computers are in which segments. When a second and subsequent messages are sent, the bridge can use its table to determine which segment to forward it to. The approach of allowing the bridge to learn the network through experience is known as transparent bridging (meaning that bridging does not require setup by an administrator).
In order to build into a network, it is typical to add a second bridge between two segments as a backup in case the primary bridge fails. Both bridges need to continually understand the topography of the network, even though only one is actually forwarding messages. And both bridges need to have some way to understand which bridge is the primary one. To do this, they have a separate path connection just between the bridges in which they exchange information, using bridge protocol data units (BPDUs).
The program in each bridge that allows it to determine how to use the protocol is known as the spanning tree algorithm. The algorithm is specifically constructed to avoid bridge loops (multiple paths linking one segment to another, resulting in an infinite loop situation). The algorithm is responsible for a bridge using only the most efficient path when faced with multiple paths. If the best path fails, the algorithm recalculates the network and finds the next best route.
The spanning tree algorithm determines the network (which computer hosts are in which segment) and this data is exchanged using Bridge Protocol Data Units (BPDUs). It is broken down into two steps:
Step 1: The algorithm determines the best message a bridge can send by evaluating the configuration messages it has received and choosing the best option.
Step 2: Once it selects the top message for a particular bridge to send, it compares its choice with possible configuration messages from the non-root-connections it has. If the best option from step 1 isn't better than what it receives from the non-root-connections, it will prune that port.
The spanning tree protocol and algorithm were developed by a committe of the IEEE. Currently, the IEEE is attempting to institute enhancements to the spanning tree algorithm that will reduce network recovery time. The goal is to go from 30 to 60 seconds after a failure or change in link status to less than 10 seconds. The enhancement, called Rapid Reconfiguration or Fast Spanning Tree, would cut down on data loss and session timeouts when large, Ethernet networks recover after a topology change or a device failure
October 26, 2007
Ulang Tahun Anak-anakku
Pada 18 Oktober 2007 genap umur Nina 6 tahun.
Manakala Haziq pula sudah 2 tahun pada 25 Oktober.
Kebetulan masih hangat dengan sambutan hari raya, jadi... jemput sedara mara dan sahabat2 terdekat berkunjung pada 20 Oktober. Buat sekali je.. tak payah nak asing2...
Selamat ulangtahun anak-anakku. Semoga Tuhan memberkati hidup kita semua.
October 22, 2007
Lepas Hari Raya
Aku balik kampung ke Batu Pahat sehari sebelum raya. Keluar ke highway dari exit Bangi..... tu diaaaa...... kereta macam parking kat atas highway. Bayangkan le, dari bangi ke hentian nilai yang biasanya 15 minit tu, jadi satu jam setengah... kui kui kui...... aku keluar dari rumah dalam kul 5.30ptg, sampai kat hentian nilai time ngam2 buka puasa... mujurle dapat parking... eheheheh.. ini le penangan raya...
balik kg terus gi rumah nenek aku, sampai dalam kul 12 mlm...
rumah arwah ayah aku tadak apa dah.. yang tinggal peti sejuk dengan mesin basuh... so aku n famili stay kat rumah nenek aku... sekali anak aku yg kecik tak serasi la pulak, orang jawa kata tak 'kerasan'. sampai pukul 4 ke 5 pagi baru dia tido.. itu pun tak nyenyak... aku dengan wife aku pun sama la jugak berjaga.... huaaaaa.... ngantuk mata...
pagi2 dah kena bangun la pulak.. takkan nak pulun tido pulak kan.. walaupun ngantuk mata tak hingat punya.... pegi mesjid dengan anak bujang aku tu.. sembayang raya.. lepas tu jumpa la kawan2 aku yang satu kelas masa kecik dulu.... masing2 dah ada famili.... dah tua daaa....
balik kat rumah nenek aku, bersalam-salaman dan bermaafan-maafan la pulak.... lepas tu makan... tapi.. pebret aku takde la... aku sampai malam2 tu je nenek akau dah kobar kat aku,"Nenek tak buat burasak la mi... daun pisang nipah tak ada". Frust jugak la... tapi itu tak penting, yang penting aku miseh ada famili kat kampung... hehehehe
Lepas tu gi rumah kakak aku... adik2 aku semua lepak sini.... lepas tu gi pusara kedua orang tua... :( aku tunjuk kat anak2 aku tempat arwah atuk dengan nenek diorang bersemadi.... dengan arwah atuk aku sekali...
Kebetulan jugak mangsa2 kebakaran satu famili lima orang yang masuk paper aritu disemadikan kat tempat yang sama. Ada la satu deret kubur diorg kat situ. Siap pagar batu sekali...
Lepas tu gi rumah sedara-mara... pehhh.. hujan gila lebat pulak tu.. mujurle jalan semua dah elok...
Petangnya mak sedara aku dengan anak2 dan cucu2 dia sampai dari kota tinggi... malam tu, aku bawak keluar bekalan bunga api combine dengan yang diorang bawak... jadi la.. dam dam dum bunyi mercun... anak2 aku pun sakan la pulun.... kami ayah2 pun join sekali.... ahahahaha.. bukan apa, budak2 main kena dengan pengawasan orang tua....
memang meriah... hehehehe...
October 09, 2007
Salam Aidilfitri - 1428 H
October 04, 2007
How can I configure TCP/IP settings from the Command Prompt?
Netsh.exe is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh.exe also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer. Netsh.exe can also save a configuration script in a text file for archival purposes or to help you configure other servers.
Netsh.exe is available on Windows 2000, Windows XP and Windows Server 2003.
You can use the Netsh.exe tool to perform the following tasks:
- Configure interfaces
- Configure routing protocols
- Configure filters
- Configure routes
- Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
- Display the configuration of a currently running router on any computer
- Use the scripting feature to run a collection of commands in batch mode against a specified router.
What can we do with Netsh.exe?
With Netsh.exe you can easily view your TCP/IP settings. Type the following command in a Command Prompt window (CMD.EXE):
>netsh interface ip show config
With Netsh.exe, you can easily configure your computer's IP address and other TCP/IP related settings. For example:
The following command configures the interface named Local Area Connection with the static IP address 192.168.0.100, the subnet mask of 255.255.255.0, and a default gateway of 192.168.0.1:
>netsh interface ip set address name="Local Area Connection" static 192.168.0.100 255.255.255.0 192.168.0.1 1
Netsh.exe can be also useful in certain scenarios such as when you have a portable computer that needs to be relocated between 2 or more office locations, while still maintaining a specific and static IP address configuration. With Netsh.exe, you can easily save and restore the appropriate network configuration.
First, connect your portable computer to location #1, and then manually configure the required settings (such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses).
Now, you need to export your current IP settings to a text file. Use the following command:
>netsh -c interface dump > c:\location1.txt
When you reach location #2, do the same thing, only keep the new settings to a different file:
>netsh -c interface dump > c:\location2.txt
You can go on with any other location you may need, but we'll keep it simple and only use 2 examples.
Now, whenever you need to quickly import your IP settings and change them between location #1 and location #2, just enter the following command in a Command Prompt window (CMD.EXE):
>netsh -f c:\location1.txt
or
>netsh -f c:\location2.txt
and so on.
You can also use the global EXEC switch instead of -F:
>netsh exec c:\location2.txt
Netsh.exe can also be used to configure your NIC to automatically obtain an IP address from a DHCP server:
>netsh interface ip set address "Local Area Connection" dhcp
Would you like to configure DNS and WINS addresses from the Command Prompt? You can. See this example for DNS:
>netsh interface ip set dns "Local Area Connection" static 192.168.0.200
and this one for WINS:
>netsh interface ip set wins "Local Area Connection" static 192.168.0.200
Or, if you want, you can configure your NIC to dynamically obtain it's DNS settings:
>netsh interface ip set dns "Local Area Connection" dhcp
As you now see, Netsh.exe has many features you might find useful, and that goes beyond saying even without looking into the other valuable options that exist in the command.
October 03, 2007
Keistimewaan Lailatulqadr
"Sesungguhnya kami telah menurunkan (Al-Quran) pada malam al-Qadr dan apakah jalan yang menyebabkan engkau mengerti (kebesaran) lailatul qadar itu? Lailatul qadar itu lebih baik daripada seribu bulan. Pada malam itu para malaikat dan Jibril turun dengan keizinan tuhan mereka (Allah), untuk setiap urusan. Sejahteralah malam ini hingga terbit fajar".
Kebanyakan ulama' Islam menegaskan bahawa kemungkinan berlakunya lailatul qadar adalah pada salah satu daripada malam kesepuluh terakhir sama ada malam ganjil ataupun malam genap.
Yang tetap berlakunya malam lailatul qadar adalah didalam pengetahuan Allah jua. Sesiapa sahaja yang beribadah di malam hari bulan ramadhan, jika kebetulan dengan malam lailatul qadar, maka dikurniakan ganjaran pahala melebihi ganjaran pahala yang dikurniakan kepada mereka yang beribadah selama seribu bulan atau selama 83 tahun 4 bulan berbanding dengan malam yang lain-lain.
Rasulullah s.a.w. sendiri amat bersungguh-sungguh menghidupkan sepuluh malam terakhir daripada bulan ramadhan bersama-sama ahli keluarganya dengna beribadah, bertadharu', beristighfar dan bermunajat kehadrat Allah, memohon rahmat, keampunan dan keredhaanNya.
Walaupun Rasulullah s.a.w. seorang yang maksum, dijamin terpelihara daripada dosa dan noda bahkan dijamin syurga, namun baginda tetap berjaga malam untuk qiamullail, menahan diri daripada tidur kecuali untuk seketika sahaja. Orang yang tekun beribadah pada 10 malam yang terakhir daripada bulan ramadhan akan mendapat rahmat yang dijanjikan sama ada dapat atau tidak menemui apa-apa tanda. Kerana yang penting adalah sepertimana yang tersebut dalam hadis sohih riwayat Bukhari dan Muslim iaitu:
- Menghayati malam tersebut dengan ibadah
- Beriman dengan yakin bahawa malam lailatul qadar itu adalah benar dan dituntut menghayatinya dengan amal ibadah.
- Amal ibadah itu dikerjakan kerana Allah semata-mata dengan mengharapkan rahmat dan keredhaanNya.
Selain tanda-tanda tersebut, para alim ulama' menyebut bahawa beberapa tanda-tanda lain bila berlaku malam lailatul qadar. Antaranya ialah :
- Ada yang berkata orang yang menemui malam lailatul qadar akan melihat nur yang terang benderang disegenap tempat hingga keseluruhan ceruk yang gelap gelita.
- Ada pula menyatakan bahawa kedengaran ucapan salam dan kata-kata yang lain daripada malaikat.
- Ada juga yang melihat segala benda termasuk pohon-pohon kayu rebah sujud.
- Ada yang berkata doa permohonannya makbul.
Blog Archive
-
▼
2007
(62)
-
▼
October
(9)
- Cannot copy: path is too deep
- LDAP - Lightweight Directory Access Protocol
- Internet Explorer security settings that you set w...
- Spanning Tree Protocol (STP)
- Ulang Tahun Anak-anakku
- Lepas Hari Raya
- Salam Aidilfitri - 1428 H
- How can I configure TCP/IP settings from the Comma...
- Keistimewaan Lailatulqadr
-
▼
October
(9)
Labels
- Catatan perjalanan (55)
- haji 1432 (1)
- Lakaran (34)
- Layan Jiwang (3)
- Merapu kepunden paran sekeper (46)
- Non-Technical (38)
- Panduan Hidup (1)
- Technical (28)
- Tips (4)