Logout a remote desktop user from command line

Here’s a command line hack that you can use to figure out what sessions are connected to the server. Note that you could substitute the IP address for the server name.

query session /server:servername

 

 

 

Now we know that the session ID of the offending session is 2. We can use that in the next step, which is using the reset command to log off that user.

reset session [ID] /server:servername

 

This command won’t display any output, but when we run the query command again, we should see that the session has now been disconnected:


Hitachi VSP (or HPE XP) host mode options

When you create host group on Hitachi VSP (or HPE XP) series, you can use these best practices for most used operating systems.

For all operating systems:

  • If you have GAD ( or HA) you must enable 88(Port Consolidation) in Host Mode Options.

For Windows, host mode is  2C [Windows Extension]

  • Enable from host mod options:
    • 40 (V-VOL expansion),
    • 73 (Support Option for WS2012),
    • 105 (Task Set Full response in the event of I/O overload),
  •  If it is “Windows Cluster”, enable
    • 25 (Support SPC-3 behavior on Persistent Reservation)
  •  If you have GAD ( or HA) and server has HDLM, enable
    • 78 (The non-preferred path option)

For Vmware, host mode is  21 [VMware Extension]

  • Enable from host mod options:
    • 54 (VAAI) Support Option for the EXTENDED COPY command
    • 63 (VAAI) Support Option for vStorage APIs based on T10 standarts.

For Linux, host mode is  00 [Standart]

  • Enable from host mod options:
    •  68 Support Page Reclamation for Linux


Resim Küçült 1.0

Geçmişte(~2007)  C++ ve GTK kütüphaneleri yazdığım ama halen bazı işler için faydalı bulduğum ufak bir uygulamamı paylaşmak istedim.

Yüzlerce büyük boyutlu fotoğrafınız vardır ve siz bunları toplu olarak küçültüp daha rahat bir şekilde yüklemek ve ya sunmak için bir yardımcıya ihtiyaç duyduğunuzda bu uygulamanın çok yardımı olacaktır.

Tek yapmanız gereken küçültmek istediğiniz fotoğrafların olduğu “Kaynak Klasör”ü seçmek, ve bunların küçüldükten sonra yazılacağı “Hedef Klasör”ü seçmek, sadece boyut olarak yüksekliğini girmek olacaktır.

Read More


Find a specific user events in Windows Security Logs

Event searching in windows security logs is too difficult, because of there are too many events in a short time.

To overcome this issue we must use “Filer Current Log” in the action menu. But options in the filter windows is not enough, if you want to filter security event logs by User . (User option in Filter Window is useless for our concern)

So what can we do?

Read More


Disable trim, ,if quick format takes long time

If your storage and OS support trim, quick format can takes long time.

Furtermore, you can disable trim before format and activate it later.

For Windows:

Disable trim command:

fsutil behavior set disabledeletenotify 1

To enable again:

fsutil behavior set disabledeletenotify 0

Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-behavior

For Linux:

If you try format it with XFS, you can use -K option with mkfs.xfs, for example:

mkfs.xfs -f -K -L disk_label /dev/mapper/mpatha1

 

 


Advantages of using Commvault WorkFlow

 

I created too many important workflows on Commvault. The use cases where I used workflows are as follows:

  • Repetitive restore tests,
  • Conditional backup that makes some operations before it,
  • Create snapshots and mount snap disks to hosts from Hitachi, EMC, and HPE storages.
  • They have been working without problems for years. So, I would like to talk about the advantages of using a Workflow.

First of all, the biggest advantage is the central management. Usually, snap scripts are distributed on different folders in different management servers. You can find them in “Task Scheduler” or “Crontab” if you are a little bit clever and lucky. But, it is a big deal in some environments. Also, the second deal is to find related files and figure out connections. If you use Commvault Workflow, all authorized employees can find and change scripts easily. And, to understand and see the big picture is very easy. You need a little time ( maybe minutes) to understand. On the other hand, in normal scripts, it can take hours, maybe days.

Read More


Protect Commvault Disk Libraries from Ransomware

To protect disk libraries from Ramsomware, you can activate Ramsomware Protection on properties of Commvault Media agent

http://documentation.commvault.com/commvault/v11/article?p=features/disk_library/t_enable_ransomware_mediaagent.htm

Another important feature, you can get alert if commvault backed up encrypted ransomware files

http://documentation.commvault.com/commvault/v11/article?p=features/disk_library/r_ransomware_protection.htm