Thursday, 24 January 2013

Schedule Automatic Backup


The automatic backup utility can be scheduled within Microsoft Scheduled Tasks. Microsoft Scheduled Tasks starts every time that you start Windows and runs in the background, and it starts the Caterease Automatic Backup according to the schedule that you specify within these instructions. The computer must be on for scheduled task to run at the specified time. The Caterease Automatic Backup utility can be run when people are using Caterease.

These steps must be performed on the Caterease server computer. You may need Administrator access to the computer to complete the steps below.

Microsoft Windows XP Professional

1 Click Start - All Programs – Accessories - System Tools - Scheduled Tasks.

2 Double-click “Add Scheduled Task” to start the Scheduled Task Wizard.

3 Click “Next”.

4 Click “Browse”.

5 Select your Caterease9\Program folder - by default, it will be located at C:\Program Files\Caterease9.

6 Select “CatereaseAutoBackup.exe”.

7 Click “Open”.

8 You are then prompted for when you would like to perform this task. We recommend choosing the Daily option.

9 Click “Next”, specify the information about the day and time to run the task, and then click “Next”.

Note: This varies depending on the selection that you made in the previous wizard dialog box. For example, if you chose Weekly, you must indicate the day of the week, the time, and if the task should run every week, every 2 weeks, every 3 weeks, and so on.

10 Type the name and password of the user who is associated with this task. Make sure that you choose a user with sufficient permissions to run the program. By default, the wizard selects the name of the user who is currently logged on.

11 Click “Next”.

12 Click “Finish”.

linux manual



When you read this manual, certain words are represented in different fonts, typefaces, sizes, and
weights. This highlighting is systematic; different words are represented in the same style to indicate
their inclusion in a speci c category. The types of words that are represented this way include the
following:

command
Linux commands (and other operating system commands, when used) are represented this way.
This style should indicate to you that you can type the word or phrase on the command line
and press [Enter] to invoke a command. Sometimes a command contains words that would be
displayed in a different style on their own (such as le names). In these cases, they are considered
to be part of the command, so the entire phrase is displayed as a command. For example:
Use the cat testfile command to view the contents of a le, named testfile, in the current
working directory.

file name
File names, directory names, paths, and RPM package names are represented this way. This style
should indicate that a particular le or directory exists by that name on your system. Examples:
The .bashrc le in your home directory contains bash shell de nitions and aliases for your own
use.
The /etc/fstab le contains information about different system devices and le systems.
Install the webalizer RPM if you want to use a Web server log le analysis program.

application
This style indicates that the program is an end-user application (as opposed to system software).
For example:
Use Mozilla to browse the Web.

[key]
A key on the keyboard is shown in this style. For example:
To use [Tab] completion, type in a character and then press the [Tab] key. Your terminal displays
the list of les in the directory that start with that letter.

[key]-[combination]
A combination of keystrokes is represented in this way. For example:
The [Ctrl]-[Alt]-[Backspace] key combination exits your graphical session and return you to the
graphical login screen or the console.

text found on a GUI interface
A title, word, or phrase found on a GUI interface screen or window is shown in this style. Text
shown in this style is being used to identify a particular GUI screen or an element on a GUI
screen (such as text associated with a checkbox or eld). Example:
Select the Require Password checkbox if you would like your screensaver to require a password
before stopping.

top level of a menu on a GUI screen or window
A word in this style indicates that the word is the top level of a pulldown menu. If you click on
the word on the GUI screen, the rest of the menu should appear. For example:
Under File on a GNOME terminal, the New Tab option allows you to open multiple shell
prompts in the same window.
If you need to type in a sequence of commands from a GUI menu, they are shown like the
following example:
Go to Main Menu Button (on the Panel) => Programming => Emacs to start the Emacs text
editor.
button on a GUI screen or window
This style indicates that the text can be found on a clickable button on a GUI screen. For example:
Click on the Back button to return to the webpage you last viewed.

computer output
Text in this style indicates text displayed to a shell prompt such as error messages and responses
to commands. For example:
The ls command displays the contents of a directory. For example:
Desktop about.html logs paulwesterberg.png
Mail backupfiles mail reports
The output returned in response to the command (in this case, the contents of the directory) is
shown in this style.

prompt
A prompt, which is a computer's way of signifying that it is ready for you to input something, is
shown in this style. Examples:
$
#
[stephen@maturin stephen]$
leopard login:

user input
Text that the user has to type, either on the command line, or into a text box on a GUI screen, is
displayed in this style. In the following example, text is displayed in this style:
To boot your system into the text based installation program, you must type in the text command
at the boot: prompt.

replaceable
Text used for examples, which is meant to be replaced with data provided by the user, is displayed
in this style. In the following example, <version-number> is displayed in this style:

      The directory for the kernel source is /usr/src/<version-number>/, where
<version-number> is the version of the kernel installed on this system.
Additionally, we use several different strategies to draw your attention to certain pieces of information.
In order of how critical the information is to your system, these items are marked as a note, tip,
important, caution, or warning. For example:

Note
Remember that Linux is case sensitive. In other words, a rose is not a ROSE is not a rOsE.

Tip
The directory /usr/share/doc/ contains additional documentation for packages installed on your
system.

Important
If you modify the DHCP con guration le, the changes do not take effect until you restart the DHCP
daemon.

Caution
Do not perform routine tasks as root — use a regular user account unless you need to use the root
account for system administration tasks.

Warning
Be careful to remove only the necessary Red Hat Enterprise Linux partitions. Removing other partitions
could result in data loss or a corrupted system environment.

Build your own network at home


From this article I am going to show you how to setup a network via LAN. Basic things required while building up a network are
§  LAN Cable with rj45 connectors
§  Computers between the networking is to be done.
RJ45 is basically called as Register Jacket. It is a piece of plastic bound with different types of wires in a particular and sequential range for the purpose of running of different applications. This jack helps to enable you to to ping with the other node.
Entire networking is based on the TCP/IP ports explained in my previous posts. Each computers should be provided with its individual IP address. IP address are basically classified in 3 types A, B, C
ranging from 1 to 255.  This range is as follows.
Class A-  0 to 127
Class B-  128 to 191
Class C- 192 to 223
A local area network gives networking features to the computers in close distance with each other in an office,school, building etc.However a LAN can be connected to many LANs based on a varied distance using telephone lines, radio waves.Here are some steps which can help you to built a network at your home on your own.
§  The first and the basic step before setting up a network is to check whether LAN drivers are successfully installed on both the computers.
§  Then you have to insert both the connectors on the respective computers rj45 ports.
§  Ones you are done with it, the next part is of assigning IP addresses.
§   Go to Start>Control panel>Network Connections>right click on Local Area Connection>properties> (TCP/IP)>properties.
§  click on Use the following IP address: the next step is to put IP addresses.
§  Remember you have to put IP addresses ranging from 1 to 254 only.
§  For instance you can put:
IP address: 192.168.1.1
subnet mask:255.255.255.0 (will appear by default)
Default gateway: put same as IP address.
ip settings
(done for the 1st pc)
Follow the same steps for the second PC bt here you Just have to change the IP address, for instance you can keep it 192.168.1.2 and the other two kept same.Save the settings for both the computer. To test whether the network is working fine you can go to cmd and type in “ping ip” without quotes. If you get a reply, then your network is setup successfully.
Pinging a Computer in my network
ipconfig command is used to get your ip address and other connection details.
Sharing is very important,  for a successful usage of documents between two computers. This process is very simple.
Just right click on the folder you want to share, go to sharing and security, and just allow the folder to be shared. Finish it, now you can access the folder on other computer from My Network Places else you also have a another trick to do it, as you have to go to StartMenu> Run and type there \ip of the computer on the network you want to access. When you type this command, it will eventually show you the shared files on the network. After this process you can access all the files shared on the network  just as shown in below pic.
sharing
Have fun sharing files and playing games.