Disable the system beep during the shutdown -h +time.

To disable the system beep during the shutdown -h +time, sysfinit has to be downloaded into your machine.

apt-get source sysvinit
vim sysvinit-2.88dsf/src/shutdown.c

then find a “void warn(int mins)” function and there change

wall(buf, 0); to /*wall(buf, 0);*/

then run ./configure make etc. or make a package. Also you can use this:

rmmod pcspeaker

Surely there is another way to off the beep which I do not know 😉

Enable a modern interface in the Webaccess GroupWise2012

To enable a modern interface in the Webaccess GW2012 for Android devices,
edit /var/opt/novell/groupwise/webaccess/webacc.cfg and change the “sample” to “mobile”.



SNMP installation and configuration.

This describe howto install and configure the SNMP on a RedHat or CentOS and Suse.

1. Installation
Run command yum for RH and Centos, for Suse use zypper and install net-snmp-utils

for RH/Centos use yum
root# yum install net-snmp-utils

for Suse use zypper:

root# zypper install net-snmp-utils

2. Configuration
Add the following lines to /etc/snmp/snmpd.conf

rocommunity public
syslocation "IT Department"
syscontact admin@somedomain.com

and then start the snmpd service

root# /etc/init.d/snmpd start

Do snmpwalk to make sure it is working

root# snmpwalk -v 1 -c public -O e

sample output:
SNMPv2-MIB::sysDescr.0 = STRING: Linux centos.somedomian.ie 2.6.18-274.el5 #1 SMP Fri Jul 22 04:49:12 EDT 2011 i686
SNMPv2-MIB::sysObjectID.0 = OID: NET-SNMP-MIB::netSnmpAgentOIDs.10
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (719265) 1:59:52.65

And finally, make sure snmpd starts next time you restart your machine.

root# chkconfig snmpd on

Tarballs benchmark – gz, bz2 and xz.

Directory used for this benchmark: test_tarball 189M in size. The directory contains /var/log files.

OS: Ubuntu 12.04LTS
CPU: Intel(R) Core(TM) i5-2410M CPU @ 2.30GHz
RAM: 2 x 4096MB DDR3 1333MHz
HDD: Hitachi HTS72323

tar cvzf tarball.tar.gz test_tarball/
Size of tar.gz tarball: 22M
Compression time: 0m3.926s

tar cvjf tarball.tar.bz2 test_tarball/
Size of tar.bz2 tarball: 19M
Compression time: 0m38.924s

tar cvJf tarball.tar.xz test_tarball/
Size of tar.xz tarball: 18M
Compression time: 0m57.988s

It seems that it does not make sense for use .xz tarball for small size files.

ConsoleOne – Unknown meaning for error number 0x6f.

The problem was that the login prompt comes up fine. I enter admin and the password, and then then returns: “Unknown meaning for error number 0x6f; Please call a Novell support provider”

Right now, it works. I have done quite a lot of config work on this box but I think it’s because IPV6 was enabled. Not absolutely sure but 99%. That was the last major change I made – ie disabling it.

SUSE/OES11 by default installs it.
Just simply type:
echo “alias net-pf-10 off” >> /etc/modprobe.conf.local
echo “alias ipv6 off” >> /etc/modprobe.conf.local


Edit /etc/sysctl.conf and add this line:
net.ipv6.conf.all.disable_ipv6 = 1


Edit /boot/grub/menu.lst with an editor and add the boot parameter


at the end of the respective line of the kernel-entries.

Also you can use address IP instead of a “tree” name, but this does not work with GroupWise.

Remote Desktop Protocol (RDP) server – Suse

Based on research work by the rdesktop project, xrdp uses the Remote Desktop Protocol to present a graphical login to a remote client. Xrdp can connect to a VNC server or another RDP server. To enable the xrdp you need to download and install the software xrdp RPMS,

Yast->Software->Software Managmen

and type xrdp in search tab and then install xrdp.

Also open the 3389 port on a firewall.

GoTo Yast's firewall module --> Allowed Services --> Select --> Remote Desktop Protocol --> Add.

The next step is to start the service.

If you want the service on permanently goto:

Yast --> System --> Services / Runlevels --> xrdp --> Enable

If you want the service occasionslly, enable it with sudo /usr/sbin/rcxrdp start
and turn it off with sudo /usr/sbin/rcxrdp stop

And then install on a remote machine Remmina, it is a remote desktop connection client able to display and control a remote desktop session. It supports multiple network protocols in an integrated and consistant user interface. Currently RDP, VNC, NX, XDMCP and SSH protocols are supported.

zypper install remmina


apt-get install remmina

Generating random password.

Handy way of generating random passwords is this:

root# echo `< /dev/urandom tr -dc A-Za-z0-9 | head -c8` here is an output: XjArHZxb


root# date | md5sum and here is an output: 711325e73eceea2a9899f2a6233ca045 -

also you can use the makepassword for generate a random password but before you do that you should install it onto your system, for example:

root# apt-get install makepasswd

Generating random password with makepasswd:

root# makepasswd and here is an output: 1of1CQRa

NTPQ command.

The ntpq utility program is used to monitor NTP daemon ntpd operations and determine performance. The program can be run either in interactive mode or controlled using command line arguments. Type the following command:

$ ntpq -pn ntp.4network.eu
remote refid st t when poll reach delay offset jitter
# 3 u 238 1024 377 185.977 0.415 7.099
- 2 u 42 1024 377 123.400 1.895 1.691
- 2 u 589 1024 377 124.355 5.031 1.320
* .GPS. 1 u 163 1024 377 12.422 0.175 3.552
- 2 u 286 1024 377 73.360 4.239 2.494
- .GPS. 1 u 824 1024 377 179.881 9.097 4.242
+ .ATOM. 1 u 917 1024 377 51.067 0.670 4.920
+ .ATOM. 1 u 312 1024 377 53.215 0.389 0.814
- 2 u 296 1024 377 30.870 5.167 2.027
+ .DCFp. 1 u 390 1024 377 66.069 2.353 2.582
- .PPS. 1 u 923 1024 377 11.893 2.986 4.136
# 2 u 484 1024 377 40.224 -6.111 3.703
# 2 u 926 1024 377 35.171 -3.976 3.364

Creating a new SSL certificates.

Creating a new SSL certificates:
1. If it is missing, you will have to create a new one key.
root# openssl genrsa -out filename.key 1024

2. Create a CSR
root# openssl req -new -key filename.key -out filename.csr

3. Remove pass-phrase from a keyIf you don’t have pass-phrase don’t do it.
One unfortunate side-effect of the pass-phrased private key is that Apache will ask for the pass-phrase each time the web server is started. It is possible to remove the Triple-DES encryption from the key, thereby no longer needing to type in a pass-phrase. If the private key is no longer encrypted, it is critical that this file only be readable by the root user! If your system is ever compromised and a third party obtains your unencrypted private key, the corresponding certificate will need to be revoked. With that being said, use the following command to remove the pass-phrase from the key:

cp filename.key filename.key.org
openssl rsa -in filename.key.org -out filename.key

4. Generating the certificate/Self-Signed certificate
root# openssl x509 -req -days 730 -in filename.csr -signkey filename.key -out filename.crt

5. Make it into the .pem format
root# cat filename.key filename.crt > filename.pem