October 31, 2007

Cannot copy: path is too deep

Pernah dapat mesej error ini masa copy file antara host melalui network?

"Cannot copy file namafile.ext. path is too deep"

Google-google... macam2 penyelesaian yg ada. Antaranya tak configure WINS server, DFC dan lain2...

Situasinya macam ni. That pretty message prompted while I was copying a file from my pc to the server. It is Microsoft Windows 2003 Standard Server and my pc running on Microsoft Windows XP Professional SP2. The server has two NICs working and teamed into one network.

What I've done were (these are fail attempts):
1. Configure WINS Server.
2. Reset privilege to that particular folder.
3. Reset shared permission to that folder.
4. Restart the server.
5. Reconfigure the network.

Finally, when my head just about to explode, I found something not right. One of the NICs running on 100mbps which is supposed to be GigaBit. *tuuut*... who the *tuuuut* has done this? Then after I've change the speed to auto (it is forced to be 1000mbps at the network switch port), everything is going to be ok.

LDAP - Lightweight Directory Access Protocol

LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate intranet. LDAP is a "lightweight" (smaller amount of code) version of Directory Access Protocol (DAP), which is part of X.500, a standard for directory services in a network. LDAP is lighter because in its initial version it did not include security features. LDAP originated at the University of Michigan and has been endorsed by at least 40 companies. Netscape includes it in its latest Communicator suite of products. Microsoft includes it as part of what it calls Active Directory in a number of products including Outlook Express. Novell's NetWare Directory Services interoperates with LDAP. Cisco also supports it in its networking products.

In a network, a directory tells you where in the network something is located. On TCP/IP networks (including the Internet), the domain name system (DNS) is the directory system used to relate the domain name to a specific network address (a unique location on the network). However, you may not know the domain name. LDAP allows you to search for an individual without knowing where they're located (although additional information will help with the search).

An LDAP directory is organized in a simple "tree" hierarchy consisting of the following levels:

The root directory (the starting place or the source of the tree), which branches out to
Countries, each of which branches out to Organizations, which branch out to Organizational units (divisions, departments, and so forth), which branches out to (includes an entry for) Individuals (which includes people, files, and shared resources such as printers)
An LDAP directory can be distributed among many servers. Each server can have a replicated version of the total directory that is synchronized periodically. An LDAP server is called a Directory System Agent (DSA). An LDAP server that receives a request from a user takes responsibility for the request, passing it to other DSAs as necessary, but ensuring a single coordinated response for the user.

October 30, 2007

Internet Explorer security settings that you set with a Group Policy object are not propagated

Setelah beberapa hari memerah otak untuk menyelesaikan isu yang timbul, akhirnya sebahagian dari penyelesaian diperolehi di sini:

http://support.microsoft.com/default.aspx/kb/316702

Barang harus diingat, hanya sebahagian dari penyelesaian... huhuhuh
---------------------------------------------------------------------------------------

SYMPTOMS

Microsoft Internet Explorer security settings in an organizational unit Group Policy may not be applied to a user whose account is in the organizational unit. This behavior occurs after the user resets the security settings, logs off, and then logs on again.

CAUSE

This behavior occurs because Internet Explorer security settings in Group Policy that has not changed are not to be applied to a user, even if the user has changed the same security settings in the local browser. If you change the local security settings, the settings in the local registry are overwritten.

RESOLUTION

To resolve this behavior, force the Internet Explorer settings in a Group Policy to always rewrite the appropriate registry keys when the user logs on to the computer:
1.On a domain controller, open the Active Directory Users and Computers snap-in.
2.Right-click the domain name, and then click Properties.
3.Click the Group Policy tab, click the default domain policy, and then click Edit.
4.Expand Administrative Templates under Computer Configuration in the Tree pane.
5.Expand System under Administrative Templates, and then click Group Policy.
6.Click Internet Explorer Maintenance Policy Processing in the Policy pane.
7.Double-click Internet Explorer Maintenance Policy Processing to open the properties for Internet Explorer Maintenance Policy Processing.
8.Click Enable on the Policy tab, and then click Process, even if Group Policy objects have not changed.
9.Click OK to set the policy.
Note It takes approximately 45 minutes for this policy to propagate to all domain controllers and to all users. You can force the update on a user workstation if you type the following command at a command prompt on the user workstation:
secedit/refreshpolicy user_policy/enforce

MORE INFORMATION

Each Group Policy is identified by a 32-digit GUID. The default domain policy GUID always starts with "31B," and the default organizational unit policy starts with "6AC." To locate the GUID for any custom policy, right-click the container for the policy, and then click Properties. Click the Group Policy tab, click the policy, and then click Properties. The GUID is displayed on the General tab in the Unique Name box.

Each Group Policy is stored on the computer where it was created. For example, you may create the Group Policy setting in the %SystemRoot%\Sysvol\domain_name\Sysvol\Policies folder, where domain_name is the name of the domain. The folder is named as the GUID for that policy. There is an Adm folder, a machine folder, and a user folder. In the Adm folder, you can locate the Inetres.adm file. This is the file where the Internet Explorer settings are stored. You can open the file by using a text editor such as Notepad.

October 29, 2007

Spanning Tree Protocol (STP)

Where two bridges are used to interconnect the same two computer network segments, spanning tree is a protocol that allows the bridges to exchange information so that only one of them will handle a given message that is being sent between two computers within the network. The spanning tree protocol prevents the condition known as a bridge loop.

In a local area network (LAN) such as an Ethernet or Token Ring network, computers compete for the ability to use the shared telecommunications path at any given time. If too many computers try to send at the same time, the overall performance of the network can be affected, even to the point of bringing all traffic to a near halt. To make this possibility less likely, the local area network can be divided into two or more network segments with a device called a bridge connecting any two segments. Each message (called a frame) goes through the bridge before being sent to the intended destination. The bridge determines whether the message is for a destination within the same segment as the sender's or for the other segment, and forwards it accordingly. A bridge does nothing more than look at the destination address and, based on its understanding of the two segments (which computers are on which segments), forwards it on the right path (which means to the correct outgoing port). The benefit of network segmentation (and the bridge) is that the amount of competition for use of the network path is reduced by half (assuming each segment has the same number of computers) and the possibility of the network coming to a halt is significantly reduced.


Each bridge learns which computers are on which segment by sending any first-time message to both segments (this is known as flooding) and then noticing and recording the segment from which a computer replied to the message. Gradually, the bridge builds a picture for itself of which computers are in which segments. When a second and subsequent messages are sent, the bridge can use its table to determine which segment to forward it to. The approach of allowing the bridge to learn the network through experience is known as transparent bridging (meaning that bridging does not require setup by an administrator).

In order to build into a network, it is typical to add a second bridge between two segments as a backup in case the primary bridge fails. Both bridges need to continually understand the topography of the network, even though only one is actually forwarding messages. And both bridges need to have some way to understand which bridge is the primary one. To do this, they have a separate path connection just between the bridges in which they exchange information, using bridge protocol data units (BPDUs).

The program in each bridge that allows it to determine how to use the protocol is known as the spanning tree algorithm. The algorithm is specifically constructed to avoid bridge loops (multiple paths linking one segment to another, resulting in an infinite loop situation). The algorithm is responsible for a bridge using only the most efficient path when faced with multiple paths. If the best path fails, the algorithm recalculates the network and finds the next best route.

The spanning tree algorithm determines the network (which computer hosts are in which segment) and this data is exchanged using Bridge Protocol Data Units (BPDUs). It is broken down into two steps:

Step 1: The algorithm determines the best message a bridge can send by evaluating the configuration messages it has received and choosing the best option.

Step 2: Once it selects the top message for a particular bridge to send, it compares its choice with possible configuration messages from the non-root-connections it has. If the best option from step 1 isn't better than what it receives from the non-root-connections, it will prune that port.

The spanning tree protocol and algorithm were developed by a committe of the IEEE. Currently, the IEEE is attempting to institute enhancements to the spanning tree algorithm that will reduce network recovery time. The goal is to go from 30 to 60 seconds after a failure or change in link status to less than 10 seconds. The enhancement, called Rapid Reconfiguration or Fast Spanning Tree, would cut down on data loss and session timeouts when large, Ethernet networks recover after a topology change or a device failure

October 26, 2007

Ulang Tahun Anak-anakku


Pada 18 Oktober 2007 genap umur Nina 6 tahun.
Manakala Haziq pula sudah 2 tahun pada 25 Oktober.
Kebetulan masih hangat dengan sambutan hari raya, jadi... jemput sedara mara dan sahabat2 terdekat berkunjung pada 20 Oktober. Buat sekali je.. tak payah nak asing2...
Selamat ulangtahun anak-anakku. Semoga Tuhan memberkati hidup kita semua.

October 22, 2007

Lepas Hari Raya

Mood hari raya dah makin kurang. Tapi yang pasti sampai hujung bulan nanti mesti penuh dengan rumah terbuka. Rumah aku sentiasa terbuka, sapa2 nak datang silakan... tapi call le dulu ye.. mana tau aku takde kat rumah. Open house official, kalau ada rezeki.. adalah nanti...

Aku balik kampung ke Batu Pahat sehari sebelum raya. Keluar ke highway dari exit Bangi..... tu diaaaa...... kereta macam parking kat atas highway. Bayangkan le, dari bangi ke hentian nilai yang biasanya 15 minit tu, jadi satu jam setengah... kui kui kui...... aku keluar dari rumah dalam kul 5.30ptg, sampai kat hentian nilai time ngam2 buka puasa... mujurle dapat parking... eheheheh.. ini le penangan raya...

balik kg terus gi rumah nenek aku, sampai dalam kul 12 mlm...
rumah arwah ayah aku tadak apa dah.. yang tinggal peti sejuk dengan mesin basuh... so aku n famili stay kat rumah nenek aku... sekali anak aku yg kecik tak serasi la pulak, orang jawa kata tak 'kerasan'. sampai pukul 4 ke 5 pagi baru dia tido.. itu pun tak nyenyak... aku dengan wife aku pun sama la jugak berjaga.... huaaaaa.... ngantuk mata...

pagi2 dah kena bangun la pulak.. takkan nak pulun tido pulak kan.. walaupun ngantuk mata tak hingat punya.... pegi mesjid dengan anak bujang aku tu.. sembayang raya.. lepas tu jumpa la kawan2 aku yang satu kelas masa kecik dulu.... masing2 dah ada famili.... dah tua daaa....

balik kat rumah nenek aku, bersalam-salaman dan bermaafan-maafan la pulak.... lepas tu makan... tapi.. pebret aku takde la... aku sampai malam2 tu je nenek akau dah kobar kat aku,"Nenek tak buat burasak la mi... daun pisang nipah tak ada". Frust jugak la... tapi itu tak penting, yang penting aku miseh ada famili kat kampung... hehehehe

Lepas tu gi rumah kakak aku... adik2 aku semua lepak sini.... lepas tu gi pusara kedua orang tua... :( aku tunjuk kat anak2 aku tempat arwah atuk dengan nenek diorang bersemadi.... dengan arwah atuk aku sekali...

Kebetulan jugak mangsa2 kebakaran satu famili lima orang yang masuk paper aritu disemadikan kat tempat yang sama. Ada la satu deret kubur diorg kat situ. Siap pagar batu sekali...

Lepas tu gi rumah sedara-mara... pehhh.. hujan gila lebat pulak tu.. mujurle jalan semua dah elok...

Petangnya mak sedara aku dengan anak2 dan cucu2 dia sampai dari kota tinggi... malam tu, aku bawak keluar bekalan bunga api combine dengan yang diorang bawak... jadi la.. dam dam dum bunyi mercun... anak2 aku pun sakan la pulun.... kami ayah2 pun join sekali.... ahahahaha.. bukan apa, budak2 main kena dengan pengawasan orang tua....

memang meriah... hehehehe...

October 09, 2007

Salam Aidilfitri - 1428 H

Salam Aidilfitri untuk semua.
Harap maaf andai ada kesilapan.
Semoga Allah memberkati hidup kita semua.

Berhati-hati memandu atau menunggang motosikal. Jangan jadikan jalanraya tempat berlumba. Kalau berani masuk litar la...

Wassalam.

October 04, 2007

How can I configure TCP/IP settings from the Command Prompt?

In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe.

Netsh.exe is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh.exe also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer. Netsh.exe can also save a configuration script in a text file for archival purposes or to help you configure other servers.

Netsh.exe is available on Windows 2000, Windows XP and Windows Server 2003.

You can use the Netsh.exe tool to perform the following tasks:

  • Configure interfaces
  • Configure routing protocols
  • Configure filters
  • Configure routes
  • Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
  • Display the configuration of a currently running router on any computer
  • Use the scripting feature to run a collection of commands in batch mode against a specified router.

What can we do with Netsh.exe?

With Netsh.exe you can easily view your TCP/IP settings. Type the following command in a Command Prompt window (CMD.EXE):

>netsh interface ip show config

With Netsh.exe, you can easily configure your computer's IP address and other TCP/IP related settings. For example:

The following command configures the interface named Local Area Connection with the static IP address 192.168.0.100, the subnet mask of 255.255.255.0, and a default gateway of 192.168.0.1:

>netsh interface ip set address name="Local Area Connection" static 192.168.0.100 255.255.255.0 192.168.0.1 1

Netsh.exe can be also useful in certain scenarios such as when you have a portable computer that needs to be relocated between 2 or more office locations, while still maintaining a specific and static IP address configuration. With Netsh.exe, you can easily save and restore the appropriate network configuration.

First, connect your portable computer to location #1, and then manually configure the required settings (such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses).

Now, you need to export your current IP settings to a text file. Use the following command:

>netsh -c interface dump > c:\location1.txt

When you reach location #2, do the same thing, only keep the new settings to a different file:

>netsh -c interface dump > c:\location2.txt

You can go on with any other location you may need, but we'll keep it simple and only use 2 examples.

Now, whenever you need to quickly import your IP settings and change them between location #1 and location #2, just enter the following command in a Command Prompt window (CMD.EXE):

>netsh -f c:\location1.txt

or

>netsh -f c:\location2.txt

and so on.

You can also use the global EXEC switch instead of -F:

>netsh exec c:\location2.txt

Netsh.exe can also be used to configure your NIC to automatically obtain an IP address from a DHCP server:

>netsh interface ip set address "Local Area Connection" dhcp

Would you like to configure DNS and WINS addresses from the Command Prompt? You can. See this example for DNS:

>netsh interface ip set dns "Local Area Connection" static 192.168.0.200

and this one for WINS:

>netsh interface ip set wins "Local Area Connection" static 192.168.0.200

Or, if you want, you can configure your NIC to dynamically obtain it's DNS settings:

>netsh interface ip set dns "Local Area Connection" dhcp

As you now see, Netsh.exe has many features you might find useful, and that goes beyond saying even without looking into the other valuable options that exist in the command.

October 03, 2007

Keistimewaan Lailatulqadr

Allah Ta'ala telah berfirman di dalam surah Al-Qadr yang bermaksud:
"Sesungguhnya kami telah menurunkan (Al-Quran) pada malam al-Qadr dan apakah jalan yang menyebabkan engkau mengerti (kebesaran) lailatul qadar itu? Lailatul qadar itu lebih baik daripada seribu bulan. Pada malam itu para malaikat dan Jibril turun dengan keizinan tuhan mereka (Allah), untuk setiap urusan. Sejahteralah malam ini hingga terbit fajar".

Kebanyakan ulama' Islam menegaskan bahawa kemungkinan berlakunya lailatul qadar adalah pada salah satu daripada malam kesepuluh terakhir sama ada malam ganjil ataupun malam genap.

Yang tetap berlakunya malam lailatul qadar adalah didalam pengetahuan Allah jua. Sesiapa sahaja yang beribadah di malam hari bulan ramadhan, jika kebetulan dengan malam lailatul qadar, maka dikurniakan ganjaran pahala melebihi ganjaran pahala yang dikurniakan kepada mereka yang beribadah selama seribu bulan atau selama 83 tahun 4 bulan berbanding dengan malam yang lain-lain.

Rasulullah s.a.w. sendiri amat bersungguh-sungguh menghidupkan sepuluh malam terakhir daripada bulan ramadhan bersama-sama ahli keluarganya dengna beribadah, bertadharu', beristighfar dan bermunajat kehadrat Allah, memohon rahmat, keampunan dan keredhaanNya.

Walaupun Rasulullah s.a.w. seorang yang maksum, dijamin terpelihara daripada dosa dan noda bahkan dijamin syurga, namun baginda tetap berjaga malam untuk qiamullail, menahan diri daripada tidur kecuali untuk seketika sahaja. Orang yang tekun beribadah pada 10 malam yang terakhir daripada bulan ramadhan akan mendapat rahmat yang dijanjikan sama ada dapat atau tidak menemui apa-apa tanda. Kerana yang penting adalah sepertimana yang tersebut dalam hadis sohih riwayat Bukhari dan Muslim iaitu:

  • Menghayati malam tersebut dengan ibadah
  • Beriman dengan yakin bahawa malam lailatul qadar itu adalah benar dan dituntut menghayatinya dengan amal ibadah.
  • Amal ibadah itu dikerjakan kerana Allah semata-mata dengan mengharapkan rahmat dan keredhaanNya.

Selain tanda-tanda tersebut, para alim ulama' menyebut bahawa beberapa tanda-tanda lain bila berlaku malam lailatul qadar. Antaranya ialah :

  • Ada yang berkata orang yang menemui malam lailatul qadar akan melihat nur yang terang benderang disegenap tempat hingga keseluruhan ceruk yang gelap gelita.
  • Ada pula menyatakan bahawa kedengaran ucapan salam dan kata-kata yang lain daripada malaikat.
  • Ada juga yang melihat segala benda termasuk pohon-pohon kayu rebah sujud.
  • Ada yang berkata doa permohonannya makbul.

Cerita BukuMuka

Cari dalam cerita ini