Configure software RAID-1 and Test data Recovery

If you are working as a Linux system Admin then i hope you are aware of software raid configuration.But if you are working as an storage Engineer or planning your career for a storage engineer then raid configuration will be part of your daily life.You must be good with software raid configuration,raid management,handling faulty disk and adding new disk to array.Here in this tutorial i am going to show you how to configure software RAID-1 and how to remove faulty devices,how to check faulty devices in raid,how to add new devices in a raid array.Overall this tutorial will show complete step to create,manage,add,remove,backup software raid using command line in Redhat enterprise Linux.

If you are interested in such a lab just watch this video till end and you will learn all above mentioned things.

Steps to create and configure software raid-1:


step1: create partitions of same size.
step2: update the partition table using partprobe command.
step3: don't forget to change the partition id to raid type
step4:create raid using mdadm command.
step5:create a folder
step6:format the created raid partition using mkfs.ext3
step7:Mount the raid device and it is ready to use.
step7:you can make a permanent entry of raid device inside /etc/fstab file.


How to write,compile and run java program on Redhat Enterprise Linux 4/5/6

As a java programmer or as a Linux System Admin or a Linux or java Programming student you may need to face a situation where you need to run a java program on a Linux Machine.If you are searching for this,if you want to write,compile or run a java program on Linux then this tutorial is for you.watch the tutorial till end and follow the steps as it is mentioned in Video.

What i have done in this Tutorial?

  1. I have written a basic java program.
  2. Then i have installed java compiler using yum.
  3. Then i compile the java program.
  4. After that i assign execute permission to java program.
  5. Then finally run the created java program

Benefits of Learning JAVA on Linux:

If you are already a java programmer then I hope you already know that importance of Linux for a Java Programmer.
But if you are new to JAVA Field you must know that almost every MNC Company want basic knowledge of Linux From a JAVA Developer.Now a days JAVA is primary language to develope Android Tools and You will be happy to know that Android is build on Linux Kernel,so it function,work and behave like Linux.

So Even if You want to be a a Good Android App developer JAVA on Linux will help you a lot.

Multiple Area OSPF configuration:cisco packet tracer Lab

This is an example lab on cisco packet tracer simulation software showing multi area  OSPF configuration. I hope you guys know how to configure OSPF Routing protocol if you don't then you can read my articles on OSPF configuration.But here this article or this tutorial is completely dedicated to multiple area ospf routing configuration in few simple steps.If you want to learn this configuration watch the video till end.


Television Configuration: Cisco Packet Tracer Lab

This i an example lab showing how to configure and manage Television in Cisco Packet Tracer.Like other devices we need to learn how to configure or how TV are configured and managed.Thats why cisco had integrated T.V inside its simulation software named cisco packet tracer and this lab is all about demonstration of use and connection of tv in cisco packet tracer.

This is an example lab showing Television configuration and its working process inside cisco packet tracer.


Learn how to Backup and Restore cisco Router Configuration using TFTP SERVER

Being a Network Engineer or Network Admin you always need to take backup of your Router Configuration so that in case of Power Failure or Any other Problems you can't loss your configuration.here in this tutorial i have shown you how to take backup of your Cisco router configuration and i have also mentioned how to restore it back when you need it from a TFTP server.If you want to learn it watch the video till end.This is an example cisco packet tracer Lab showing how to take backup of Cisco router configuration using tftp server.

Each and every company whether it's a small IT firm or a big IT company everyone used to keep backups of there routers and whenever they need it they restore it backup.

How to upgrade or degrade Cisco Router IOS using TFTP server

While working as a Network Admin or as a networking students you must know how to upgrade or degrade a Cisco router IOS using TFTP Server or FTP server.Here in this tutorial i have mentioned how to upgrade or degrade cisco router IOS using TFTP server.Every Network Admin need to know how to upgrade or degrade router ios according to there requirement.

If you want to learn IOS Upgrade and IOS Degrade watch this video till end.


How to Upgrade or degrade cisco switch IOS using tftp server

Suppose you are working as a network engineer and you  want to upgrade or degrade your cisco switch IOS for some reasons how will you do this? This article will be the answer of your question or you can say solution of this problem.In this tutorial i have mentioned step wise tutorial showing you how to upgrade or degrade a cisco switch IOS using TFTP Server. If you want to learn it completely watch the video till end and if you like it must share and like it to support us.

How to add Google Analytics to Blogger

Today we are going to discuss about connecting your blogspot sites or blog with your google Analytics Account so that you can know more about your visitors locations and there interest. You can easily know what your readers want to study more.Google Analytics tool will help you bring more traffic to your site by analyzing the choice of readers and demands.

How to create sitemap for your blogspot website

For every blogger it is an important task to have a list of all his/her articles showing at a page show that there viewers or readers can easily see and find there topics of interest.And to do so he/she must know how to create a sitemap page which will automatically do all these task for him.Here in this tutorial i will show you how to create an archive page or sitemap page for your all blog posts.

This is a blogger tutorial for students who want to create blog and to earn money.



Telnet Proxy configuration in redhat enterprise linux

As we all know telnet is a remote login program.Using telnet one can login to a remote machine located in different place or different country,but then server can know the client machine ip and he or she can be traced.What it mean? It means you are no Anonymous anymore.So what to do to be anonymous? what is the method to hide your ip? Answer for all these question is to configure a telnet proxy machine or telnet proxy server or chain of telnet proxy server.



CHAT Server configuration in Redhat Enterprise Linux

If two Linux users want to communicate or chat with each other they can communicate without any third party server just by configuring chat server and chat client on Linux Machine.I have designed this tutorial for chat server configuration and for that i have used Redhat Enterprise Linux Server.


Step1:Install required package for chat server.


#yum install telnet*


Step2: Configure Telnet Server.



Step3:Open port using nc command line tool.



Step4:On client side get connected with telnet command on open port.



For example if server machine has open port 8888 and server ip address is 192.168.0.100 Then client machine have to type below command to connect with server open for chat connection.
$ telnet 192.168.0.100 8888

If you have any problem regarding chat server configuration on Linux machine you have to just simply watch the entire video and your doubt will be clear.



Yum configuration on RHEL 7

If you are a linux user or  working as a linux system admin, then you must know how to configure Yum  on RHEL 7.And if your company is working on other version of Linux like RHEL5 RHEL6 or RHEL4 then you also have to  know how to configure yum on rhel4 rhel5 and rhel6 Machine.
I have already uploaded s many videos on yum server configuration so if you are new to Linux and yum you must watch my previous videos on my youtube channel slashrootdotin first.


Antivirus Installation and Hard Disk Scanning in Linux


This is a Antivirus installation configuration and Antivirus scanning Tutorial on Red Hat Enterprise Linux.In this tutorial you will find the method to install Antivirus in Linux and we will also learn how to scan system files in Linux and how to update the avg anitivirus in Red Hat Enterprise Linux.

Antivirus in linux installation and configuration Tutorial.



How safe Linux is without any Antivirus?

When we are talking about Linux and at the same time we are talking about Antivirus you find it very uncommon Topic. It's uncommon because many people think that Linux is already Secure and there is no need of any Antivirus software or Anti-malware or Rootkit Scanning Tool for Linux Like Operating system But trust me this is completely a mith and nothing else that Linux is Completely secure.Trust Me Nothing Is Completely safe or secure.


 Then Why People say Linux is SAFE COMPUTING?


When we say we mean system security or computer security.safe computing or safe system whether it is windows or Linux is Like safe Sex.You have to practice it to avoid infection.

IS Antivirus Installation is Tough on Linux?

Every 6 out of 10 people ask me the same question.They want to know that whether installation and configuration of Antivirus program on Linx is a difficult task or it can be easily done like Windows operating system.
Antivirus installation and configuration in Linux is a s simple as you think.It is just a frame of mind that people think installation of anything inside linux is like mining gold, but it's not so. herein this article i will focus on AVG Antivirus configuration for Redhat enterprise Linux.This will be a Complete tutorial on avg antivirus installation and configuration with scanning in Linux machine for safe system.

IS it a nice Decision to HAVE an Antivirus Program for Linux Machine?


Ofcourse Yes!
Nothing is completely Secure,everything needs more attention and more security in Today's Digital world. The more Security is the More safe environment.
Lesser the Security chances of Hacking will be Maximum.So if you are not using an Antivirus on your Linux Machine then you are providing an opportunity to hackers or crackers to destroy your data your pc.


Hacking Linux password and securing Linux Password using Linux Grub security

Every Linus user whether  basic users or linux system admin they must face a problem regarding linux password.sometimes someone forget sometimes some other reasons.That's why in this tutorial we will learn how to hack linux password specially RHEL5 RHEL6 CentOS5 and CentOS6 and at the same time we will also learn to secure Linux Password using Linux Grub Security.This tutorial is also about Root user password Recovery in Linux. We will also learn what to do when you forget your Linux Root password.We will see method to break or bypass Linux Password at Boot Time.


VPN configuration on cisco Router (A cisco packet tracer lab)

VPN configuration on cisco Router (A cisco packet tracer lab)

This is a cisco packet tracer lab showing vpn configuration on cisco router.If you are a ccna ccnp or ccna security student you must have idea about how to configure and manage vpn services over cisco router.

This is an example lab showing vpn configuration on router using cisco packet tracer software.
I have created this tutorial in three parts to minimize the length of each videos.

If you want to learn about vpn configuration you must have to watch all these three videos which i have published on my youtube channel SLASHROOTDOTIN.





How to Crack Break or Bypasss Cisco router Password a cisco packet tracer Lab

How to Crack Break or Bypasss Cisco router Password a cisco packet tracer Lab.
This is a cisco packet tracer Lab showing how to crack cisco router password or how to hack cisco router password.

Configure Cisco Router as a Terminal server in cisco packet Tracer

Cisco Packet Tracer Lab configuring a cisco router as Terminal server.

This tutorial is all about how to configure terminal server on cisco router and how to manage and use terminal server configured on router.Configurea nd manage cisco router to used as a access server.


Top 50 things every ethical hackers must know about it.

Here you will come to know the top 50 topics which every ethical hackers should know.These are not only important ethical hacking tips or topics must compulsory topics for all cyber security experts and hackers or system security specialist.



To be an Ethical Hacker you must have idea about Windows and Linux Operating System.

You must be expert in Backup and Recovey in both Windows and linux platform.

You must of sound Knowledge of Mobile Technology and android Security Essentials.

You must be good in Firewall configuration on windows and Linux Both.

You must be good in SELinux Configuration.

You must have Server configuration and Server Security Knowledge.

You must have Good Knowledge Networking.And when i am talking about networking i mean you must be expert in routing and switching along with wireless communication and wireless security.

You must have idea about all networking devices including network firewall.

If you have network security knowledge that will be bonus.

Virtualization technology helps you to sharpen your skills and practice ethical hacking labs.

Storage management helps you to manage and handle data properly.

You must have basic programming knowledge of html,css,javascript and php.

You also have basic idea of how to write compile and run c,c++,java,python,perl and ruby programming on Linux platform.

configure your Windows machine as Yum Server

Yum server configuration in windows8.this tutorial is all about configuration of Yum server on a windows machine and the Linux Machines will be used as yum client.

FreeRADIUS Server installation and configuration on Redhat enterprise Linux

Here we are going to install and configure FreeRadius server on RHEL5 machine. You can say this tutorial is all about FreeRADIUS Server installation and configuration on Redhat enterprise Linux.
So what we will learn in this tutorial?

FreeRadius Server configuration in RedHat Enterprise Linux 5. FreeRadius Server configuration in CentOS5 FreeRadius Server configuration in Linux Machine. How to install and Use radius Server for authentication on a Linux Machine. setting up free radius server on RHEL5 machine or centos5 for AAA system. installation of free Radius server on RHEL5 using yum package management. Installation of free radius server on Linux configuring yum server. Linux machine as Free Radius Server.
FreeRADIUS SERVER CONFIGURATION


Which is best among wordpress Drupal and Blogspot for earning Online Money

Which is best among wordpress Drupal and Blogspot for earning Online Money.
 Which platform is better among wordpress and Blogspot.
Which is better between wordpress and Drupal and why?
Which will generates more revenue from ads among blogspot ,Drupal and wordpress?
 You can find your answer in this video.

This tutorial is all about online earning platform for blogger.after reading this article or watching the video you will be able to decide that as a blogger which platform will brings more revenue for you. Or you can say which is the best platform for earning online money.


Complete Blogger Tutorial on Blogspot,wordpress,Drupal and web hosting

Complete Blogger Tutorial on Blogspot,wordpress,Drupal and web hosting.
Learn wordpress Hosting Drupal hosting Joomla Hosting oscommerce hosting.
Also learn blogspot platform for blogging.
Learn how to use free hosting and free domain.














Blogger tutorial

LINUX BASICS TRAINING FOR FREE ON SLASHROOTDOTIN YOUTUBE CHANNEL

LINUX BASICS TRAINING FOR FREE ON SLASHROOTDOTIN YOUTUBE CHANNEL By Satish Tiwary

SYSTEM SECURITY FREE TRAINING ON SLASHROOTDOTIN YOUTUBE CHANNEL BY SATISH TIWARY

SYSTEM SECURITY FREE TRAINING ON SLASHROOTDOTIN YOUTUBE CHANNEL BY SATISH TIWARY

If you are a Linux system admin or a Linux student this playlist of my youtube channel will help you to build your career in System security Filed.

If you are working as a Network Engineer or Network Administrator you must read this article.

Network security related Terms and Topics Tutorial.

Free CCNA Tutorial for Networking Students and Computer Science Students.

If you are RHCE certified or you are interested in RHCSS Training you can get RHCSS Tutorial for free.For free Tutorial you must read my below article.

FREE RHCSS TUTORIAL ON SLASHROOTDOTIN.

RAID and LVM COMPLETE TRAINING FOR FREE ON SLASHROOTDOTIN YOUTUBE CHANNEL

RAID and LVM  COMPLETE TRAINING FOR FREE ON SLASHROOTDOTIN YOUTUBE CHANNEL

CCNA FRESH BATCH IS STARTING at ETHICAL HACKING TUITION CENTER JAIPUR

CCNA FRESH BATCH IS STARTING FROM MONDAY AT 6 PM at ethical hacking tuition center Jaipur

Training head satish tiwary

Course Duration 45 Days   

 CCNA Course Fees:Rs9000

 Total Test Papers:3  2 lab Test and 1 Theory Test Paper

This course will make you able to configure and manage Cisco router and switch well and also make you capable of configuring Wi-Fi devices.
During CCNA Training our main focus will be on Routing and Switching But we also include Windows Networking and Linux Networking Lab in this Module.

Training Certificate From SLASHROOT IT SOLUTIONS PRIVATE LIMITED

You can contact Satish Tiwary(Ethical hacking Tuition center jaipur)
Cyber Security Expert
Network Security specialist and Trainer for ccna ccnp ccna-security linux ethical-hacking ipv6 cloud-computing

Digital Marketing Training in Jaipur at ETHICAL HACKING TUITION CENTER

Course Syllabus : Digital Marketing

 Digital Marketing Training in Jaipur at ETHICAL HACKING TUITION CENTER

Module1.Basics of Websites & Digital Marketing


Fundamental of Digital Marketing : Concept, Scope,Areas to Explore
HTML Basic Tags
Builiding Websites on Weebly, Wordpress & Blogger

Module 2.SEO - On Page Optimization


Broken links,Backlinks
W3 Errors
Keyword research & optimization
Heading Tag Optimization : Reporting, Suggestion and Implementing
Backlinks
Titles & Meta Descriptions
 Website Content Optimization
Meta & Title Tags Adjustment
XLM Site Map Setup
Robot.txt Validation
Google Analytics and Webmaster Tool Setup
SERP - rankings on google
Plugins Installation and Monitoring
Heading Tag Optimization : Reporting, Suggestion and Implementing
Duplicate Content Reporting
Duplicate Content Rewording/ re writing using seo target keywords
Plugings & Internal Linking
Permalinks Optimization :Reporting, Suggestion and Implementing

Module3.SEO : Off-Site Optimization


 Submission to Major Search Engines
Submission to Major Online Directories
 Submission to Country Wise Directories
Social Media Bookmarking
Article Submission
PDF,PPT, Image Submission
Blog Commeting
Guest Blogging
Blog Submission
Classified Ad Submission


Module 4.Paid Advertising : Email Marketing, FB Marketing & Google Adwords


Facebook Marketing : Ad Plan, Ad Setup With banner Images, Monitering & Reporting( 1 Ad : Website Conservsion, Apps Installation , Promote Page Etc)
Google Adwords : Search Ads Type : Keyword Research,
1 Campaign, 2 Adgroups, 5 Ads. Display Ads : 2 Banner Graphics keyword Research, 1 Ad Group, 2 Ads.
Email Marketing : Content Writing as per Offers, services & Discounts, Custome Template Building, HTML Conversion, Use of Emailing Software : Account Creation, Creating Customer List, Sending Emails
Module 4.Social Media Optimization

FACEBOOK: Custom Graphics and Setting Profile with about/ hours and other information of business: For your Social Media Account : facebook business page
Google business profile & Page: with custom graphics and setting up profile with proper information
 Twitter business profile & Page: with custom graphics and setting up profile with proper information
Pinterest : making account, creating 5 boards, entering board description with keyword rcih descriptions, pinning 5 images to begin with, so 1 each in each board
Instagram: creating account and updating profile

You tube optimisation, creating account/ channel if you don’t have one, optimise the channel description and other work as per you tube channel checklist
Linked in prfile creation, optimisation

Social Media Content Creation and Posting : 5 Social Media Platform: 2 post for each platform and 1 Image Post and 1 interesting post found related to the business you are in on web and shared on your page each day. Along with :Commenting, Follows, Likes, Shares,
Youtube Optimization
Pinterst Posting , pinning, re pinning,


Module 5: Reporting and Monitoring

SEO REPORT/plan
Initial website ranking and evaluation report
Analytics report and webmaster report
Adword Report, Fb Insight
Marketing Media Audit Report
SERP Report
Competitor Analysis Report (Media Audit Report)

Trainer Profile


Ms SATISH TIWARY


Tutor Interaction
Classroom Training

100 Web Vulnerabilities you should know as a Web application Penetration Tester

100 Web Vulnerabilities you should know as a Web application Penetration Tester If you are working as web application penetration testing en...