Featured »

March 2, 2022 – 2:00 pm

Books have been written on the subject of awk and sed. Here’s a small sample of commands I put together over the years that are useful for everyday system administration tasks. Most of these tasks …

Read the full story »
Networking

Unix and Linux network configuration. Multiple network interfaces. Bridged NICs. High-availability network configurations.

Applications

Reviews of latest Unix and Linux software. Helpful tips for application support admins. Automating application support.

Data

Disk partitioning, filesystems, directories, and files. Volume management, logical volumes, HA filesystems. Backups and disaster recovery.

Monitoring

Distributed server monitoring. Server performance and capacity planning. Monitoring applications, network status and user activity.

Commands & Shells

Cool Unix shell commands and options. Command-line tools and application. Things every Unix sysadmin needs to know.

Home » Archive by Category

Articles in Disaster Recovery

Backup Options for Raspberry Pi

October 3, 2020 – 8:16 am
IMG_5275

Just about every Raspberry Pi I used suffered the same fate: the micro SD card died. It is generally accepted that the expected lifespan of an SD card is around ten years of normal use.

Backing Up WSL Images

October 1, 2020 – 8:13 am
v7oe8qnrpcxhmu3bw4m0qrja3uz

Microsoft’s WSL is interesting. I’d go as far as to say that I like it. The mistake here would be to forget that your Linux image is running under Windows, with everything this entails. Making …

Home-Brew Ransomware Defense

October 1, 2020 – 8:10 am
3wve96qqllhu6wkgqmzmqgzo19q-2-gigapixel

The first well-known case of ransomware was documented in 1989. The so-called AIDS Trojan was delivered on a floppy disc; encrypted data; demanded $189.00 (nearly four hundred bucks in today’s money) as a “license fee”. …

Free Rescue CDs for Windows

October 5, 2013 – 11:32 am
cd_dvd_001

This is just a quick summary of the more popular rescue CDs out there. All of these are Unix-based bootable ISOs. Some are available as self-burning EXE files, which may be useful if you don’t …

System Recovery: Useful Tools

October 18, 2012 – 9:48 pm

The following is a brief collection of open-source and/or free tools I regularly use for various system recovery tasks. If the servers you work with have CD drives, I would recommend burning these images onto a CD or DVD. This would save you the trouble of messing with the boot options in the BIOS. More advanced versions of BIOS can mount remote ISO images and boot from those. In most cases, however, this approach requires using the dreaded Internet Explorer an requires Windows.

Don’t Be Afraid to Reboot Unix Servers

February 21, 2011 – 8:11 pm
hacker

Reboot your Unix servers after making any major changes to the production environment. Should an unexpected problem come up, it will be easier to deal with it when everything is still fresh in your mind and not six months down the road, when you have to do a reboot to replace a failed system board and suddenly discover that some application wouldn’t load, by which time you forgot all about this application and have to start with the first page of the admin guide.

Windows 7 Black Screen After Booting

October 5, 2010 – 4:07 am

I had to power-cycle my Windows 7 64-bit laptop. The bootup sequence looked normal and reached a point where I could see the black screen with the mouse cursor. After this stage my desktop would usually appears, but not this time. I could move the mouse and I could even establish a remote desktop connection to my laptop. But I could not log in. Every time it would reach the same point – the black screen with the mouse cursor – and it would stop.

How to Really Kill Computer Viruses

February 21, 2010 – 6:34 am

How do you know if your computer has a virus? Is it connected to the Internet? Then it has a virus. Many computer viruses and other malicious applications are very resilient and will actively resist any attempts to deactivate and remove them. Some viruses can even delete your antivirus application or prevent it from working properly. Many viruses cannot be effectively removed once they are loaded in memory and active.

Tips on dealing with the Bagle rootkit

May 26, 2008 – 5:51 pm
Computer Password Security

Normally I don’t concern myself with Windows- related matters. However, the infamous Bagle rootkit and its numerous variations deserve some attention even from Unix sysadmins. Bagle annoyed me and my customers long enough. Essentially, Bagle …

Resetting Root Password under Solaris

November 20, 2005 – 2:02 am
HP-Greets-IBM-2

The following document explains how to change an unknown root password on a Solaris system. Use this only for disaster recovery purposes. Please be sure to read the Notes section below if you run into …

Resetting Admin Passwords on Windows

November 20, 2005 – 2:01 am
windows keyboard

Resetting Local Administrator/User Passwords on Windows NT/2000/XP/2003
The following document explains how to change an unknown password for any local account (including Administrator) on a Windows NT/2000/XP/2003 system. Use this only for disaster recovery purposes.
Requirements:
1.Physical access …