how to speed up your computer

29.July. 2014  / Today I would like to share you how to speed up your computer .


Speed up computer performance is very cool article nowadays. You may face this problem when you use own computer from day to day. So today I have some trick to share you to make your computer faster than before process. Even though there are a lot of method to make it your computer better, but for me base on my own experience what I show you in my below video , it is very cool and reliable way. a


Cisco ASA Site-to-Site VPN

Cisco ASA training:  site-to-site VPN diagram


Cisco ASA Site-to-Site VPN sample.

Configurations

ASA01

object network net-local
subnet 192.168.101.0 255.255.255.0
object network net-remote
subnet 192.168.102.0 255.255.255.0
access-list outside_1_cryptomap permit ip 192.168.101.0 255.255.255.0 192.168.102.0 255.255.255.0
tunnel-group 192.168.0.12 type ipsec-l2l
tunnel-group 192.168.0.12 ipsec-attributes
pre-shared-key pass1234
isakmp keepalive threshold 10 retry 2
crypto isakmp enable outside
crypto isakmp policy 10 authentication pre-share
crypto isakmp policy 10 encrypt 3des
crypto isakmp policy 10 hash sha
crypto isakmp policy 10 group 2
crypto isakmp policy 10 lifetime 86400
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs group1
crypto map outside_map 1 set peer 192.168.0.12
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
nat (inside,outside) 1 source static net-local net-local destination static net-remote net-remote
route outside 0 0 192.168.0.1

ASA02

object network net-local
subnet 192.168.102.0 255.255.255.0
object network net-remote
subnet 192.168.101.0 255.255.255.0
access-list outside_1_cryptomap permit ip 192.168.102.0 255.255.255.0 192.168.101.0 255.255.255.0
tunnel-group 192.168.0.11 type ipsec-l2l
tunnel-group 192.168.0.11 ipsec-attributes
pre-shared-key pass1234
isakmp keepalive threshold 10 retry 2
crypto isakmp enable outside
crypto isakmp policy 10 authentication pre-share
crypto isakmp policy 10 encrypt 3des
crypto isakmp policy 10 hash sha
crypto isakmp policy 10 group 2
crypto isakmp policy 10 lifetime 86400
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs group1
crypto map outside_map 1 set peer 192.168.0.11
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
nat (inside,outside) 1 source static net-local net-local destination static net-remote net-remote
route outside 0 0 192.168.0.1

Restroring an IOS Image on a Cisco 2600 Router

Restroring an IOS Image on a Cisco 2600 Router


We recently had a classroom situation that required us to copy an IOS image to a router in rom monitor mode using TFTP. I hope you never have to do this, but if you do, it’s helpful to know how. We had copied a new IOS image onto the router which turned out to be corrupted. The old IOS image had already been erased, so the router had no IOS image available for its use. The router returned a rommon > prompt. By using the following series of commands, we were able to download a good IOS image from a TFTP server located at 10.16.0.13 and we were back up and running in about 15 minutes. This procedure uses the first LAN port (in our case ethernet 0/0) and can only be used for downloading a file. It cannot be used to upload a file from the router.
A tip: After you finish configuring the IP address and various related parameters, issue the sync command to copy the settings to NVRAM. That way, if you have to repeat the procedure, at least you won’t have to reenter all the settings.
You can see what settings are already in place by using the set command in ROM monitor mode.
Here’s a step-by-step guide to what you need to do:
rommon 10 > IP_ADDRESS=10.16.0.14
rommon 11 > IP_SUBNET_MASK=255.240.0.0
rommon 12 > DEFAULT_GATEWAY=10.16.0.1
rommon 13 > TFTP_SERVER=10.16.0.13
rommon 14 > TFTP_FILE=c2600-c-mz.123-3h.bin
rommon 15 > tftpdnld
IP_ADDRESS: 10.16.0.14
IP_SUBNET_MASK: 255.240.0.0
DEFAULT_GATEWAY: 10.16.0.1
TFTP_SERVER: 10.16.0.13
TFTP_FILE: c2600-c-mz.123-3h.bin
Invoke this command for disaster recovery only. WARNING: all existing data in all partitions on flash will be lost!Do you wish to continue? y/n: [n]: y
Receiving c2600-c-mz.123-3h.bin from 10.16.0.13..!!!!!!!!!!!!!!!!!!!!!!!!!!!!…File reception completed.
Copying file c2600-c-mz.123-3h.bin to flash.
Erasing flash at 0×607c0000program flash location 0×60440000
rommon 16 >reset[enter]

RESET ROOT PASSWORD OF RED HAT ENERPRISE LINUX 5.5

RESET ROOT PASSWORD OF RED HAT ENERPRISE LINUX
Red Hat Enterprise Linux is Linux-base operating system and All of Redhat official support and training. And certificate that most system administrator acquire is RHCE
Today I would like to show you how to reset the root password from RHEL 5.5. as below step :
To be able reset the root password , we Must enter single mode of RHEL 5.5
1.       Start up Red Hat Enterprise system.

 

2.  Then type letter “e” to edit the Grub loader


 3.   High light to second line as above image and type letter “e
 
4. Type number “1” at the end of the line as below images then enter

  

5.  After  enter, they will go one backward screen then type letter to “b   (below image)
6.  After boot , you will got single mode then type command “passwd” to change root password. 
7.   Done !!!! Enjoy