Unix and KILL command

Nice explanation : link1.
Some additional info : link2.

SIG=SIGNAL – a signal is the means Linux uses for sending information between processes or between the kernel and a process.

This is most important (to me) :
0 SIGNULL Null Check access to pid
1 SIGHUP Hangup Terminate; can be trapped
2 SIGINT Interrupt Terminate; can be trapped
3 SIGQUIT Quit Terminate with core dump; can be trapped
9 SIGKILL Kill Forced termination; cannot be trapped (forced terminate)

15 SIGTERM Terminate Terminate; can be trapped (not forced terminate)
24 SIGSTOP Stop Pause the process; cannot be trapped
25 SIGTSTP Terminal stop Pause the process; can be trapped
26 SIGCONT Continue Run a stopped process

I use “-9” a lot ๐Ÿ˜‰
If as a process PID you put “0” (no quotation marks) all processes on server will be killed, except some special system ones.
If you use “-3”, it leaves a data “dump” in the log of the killed process, or it creates a file with name “core” which will have in it a memory image of the process when it received a kill signal.

How to see supported signals on the system :
#kill -l
General syntax :

What is “trap” for : Trap will allow us to trap some or all of these signals, and perform operations on the trapped signal (There might be situations when you don’t want users of your scripts to exit untimely using keyboard abort sequences, for example because input has to be provided or cleanup has to be done. The trap statement catches these sequences and can be programmed to execute a list of commands upon catching those signals).

Posted in Linux, Unix | Tagged | Comments Off on Unix and KILL command

How to get rid of the POP SUGAR pop-ups

1. Using Control Panel do the uninstall for :
AlllCheapPeruiCe 5.2, YoubeAdBlocker 1.2, TheBlooccker 1.3, Video Player, Plus-HD 1.3, BetterSurf,
CouponMeApp, TubeAdblOCkER, BLoCkTheADApp 3.2, WatchItAdBlocake, Media Player 1.1, Savings Bull, Start Savin, Websteroids, ScorpionSaver, HD-Plus 3.5, Media Watch, Re-Markit, Remarkable, SupTab, Key-Find uninstaller, Feven Pro 1.2, HD-Plus, HD-Professional-HQ, Quick Share i bilo koje sumnjive programe koji su skoro instalirani.

2. Evict unwanted pop-ups from browsers ( in my case Chrome 62.0.3202.94/64 and FireFox)
Go to Settings/Advanced Settings to “Return to factory settings”, and return it as it was, or turn off these add-ons :
a.Click the menu icon “โ‰ก” at the top right of the browser window, choose “Tools” and choose “Extensions” to open a new “Options” tab.
b. Uncheck “Enabled” to disable an extension, or click “Remove” to delete it completely.
c. Enter “chrome://plugins/” in Chrome’s address bar to view plugins that add compatibility and functionality, such as Apple QuickTime or Adobe Flash,
d. Click the “Disable” link under the plugin you want to disable.

3. Let some anti-addware tool run, like AdwCleaner (link). It is a fresh tool, so it should get all the “nasties”.
Take care, since when it works it closes ALL the windows, and needs a restart.


4. Also, for future, put some add-blocker in browser (link).

Posted in WIN | Tagged , | Comments Off on How to get rid of the POP SUGAR pop-ups

Crochet 77 : evening blanket

My mother liked my green blanket so much, that she wanted one too, for evening TV watching.
This one is made from granny squares, in red (since my mother loves red).
So far this is it :

Posted in Relaxation | Tagged , , , | Comments Off on Crochet 77 : evening blanket

Crochet 76 : “hanging” cap

I had some wool with which I had no idea what to do, so :

I crocheted it so that it has a pattern ๐Ÿ™‚

And look from above :

Posted in Relaxation | Tagged , | Comments Off on Crochet 76 : “hanging” cap

How to chase phantoms in Red Hat 5 Linux

1. #last
root pts/1 10.xxx1 Mon Oct 30 08:32 still logged in
root pts/3 10.xxx2 Wed Oct 25 10:27 – 15:51 (05:23)
root pts/2 10.xxx3 Wed Oct 25 08:50 – 11:23 (1+02:33)
root pts/1 10.xxx4 Wed Oct 25 08:45 – 11:23 (1+02:38)
root pts/1 10.xxx5 Tue Oct 10 09:40 – 09:41 (00:00)
It gives a list of the last logons on system, with date and time. It takes data from /var/log/wtmp
2. Logs – OF COURSE!!
/var/log folder
messages – operating system messages
xferlog ili vsftpd.log – FTP server logs
podfolder /var/log/http – Apache server logs
ntp.log – NTP server logs (sync)
3. # who -a
Aug 18 09:22 565 id=si term=0 exit=0
system boot Aug 18 09:22
run-level 5 Aug 18 09:22 last=S
Aug 18 09:22 3053 id=l5 term=0 exit=0
LOGIN tty1 Aug 18 09:22 5794 id=1
LOGIN tty2 Aug 18 09:22 5809 id=2
Aug 18 09:22 5810 id=3
LOGIN tty4 Aug 18 09:22 5834 id=4
LOGIN tty5 Aug 18 09:22 5835 id=5
LOGIN tty6 Aug 18 09:22 5840 id=6
Aug 18 09:22 5841 id=x
root + pts/1 Oct 30 08:32 . 11621 (10.xxx)
pts/2 Oct 26 11:23 26517 id=ts/2 term=0 exit=0
pts/3 Oct 25 15:51 3866 id=ts/3 term=0 exit=0
Quite a few things, last system reboot, who is on system (+ in front), dead processes, run level, init processes…..
4. # dmesg
Last kernel messages.
5. # uptime
09:58:01 up 73 days, 1:32, 1 user, load average: 0.19, 0.08, 0.02
How long since last restart.

Posted in Linux | Tagged , , , | Comments Off on How to chase phantoms in Red Hat 5 Linux

Crochet 75 : little blanket

You know when you sit in the evening reading, or watching TV, and you feel a little nippy? Not a lot, just a little…..
Well for my comfort, and since I LOVE green color, I have made me a green blanket ๐Ÿ˜‰

Posted in Relaxation | Tagged , , | Comments Off on Crochet 75 : little blanket

“Mice” with eggplant

I had three eggplants in my fridge, that have been there for the last 10 days, so decided their time has come ๐Ÿ˜‰
I peeled them, cut them into little cubes (05cmx0,5cmx0,5cm), and salted them. I left them for about 20 min to let up the water.
I mixed 2 (whole) eggs, salt, parsley, dill, celery, flower (about 8 full soup spoons), sole garlic (powdered) and added my de-watered eggplant cubes.
Gently homogenize the mix, then fry them in a lot of oil (that is why I call them “mice”, since some of them have little “tails”) :

Posted in Kitchen | Tagged | Comments Off on “Mice” with eggplant

Problem : “system out of memory” – solved!!!!

This appears on WIN 2003/32 SP2 SE, where there is a limit on RAM memory of 4G, so it should see all, not only part of it….. (link)
I added another 2G RAM, but the problem persists, so I started in-depth checking.
How to check the current state :
1. msinfo32.exe
Command should be typed into the Start/”Run” window.
The problem is the difference between these two values :
Total Physical Memory 4,095.21 MB
Available Physical Memory 2.98 GB
2. Using Task manager :
It gives the difference too :

3. My Computer/System Properties/tab “General”, as you can see, system sees all 4G RAM-a

How to (maybe) solve the problem :
1. Taster Start/”msconfig.exe” go to “BOOT.INI”, and check “MAXMEM”. It should NOT be checked :

2. Check the state of the TEMP folder :
Go to Start and into window “Run” type %temp%
This will open your “TEMP” folder. Check for old files.

3. Clean up your “C” partition :
Start/Run/cleanmngr :

Select the whole of “C” partition, and clean it up.
Good link.
3. Changing of the boot.ini file, with restart :
Right-click My Computer and select Properties, click the Advanced tab.
In the Startup and Recovery area, click Settings.
In the System startup area, click Edit. This will open the Windows boot.ini file in Notepad.
In the [Operating Systems] section, add the following switches to the end of the startup line that includes the /fastdetect switch: /3GB
Save the changes and close Notepad.
Click OK two times to close the open dialog boxes, and then restart the computer for the change to take effect.
I have taken this from here : link
Note : this has solved my problem ๐Ÿ™‚

Note : restart the IIS and the problem will get solved, but it may (will) appear again ๐Ÿ™‚

Some good links :
This is for WIN 7, but the principle is the same : link1
If it is WIN 2003 and MS SQL (which is bnot the case with me) : link2

Posted in WIN | Tagged , | Comments Off on Problem : “system out of memory” – solved!!!!

MCSA 70-411 part 1

So, the second part is next.
Abbreviations are aplenty :
AD CS โ€“ Active Directory certificate services, issues and manages public key infrastructure (PKI) certificates
AD FS โ€“ active directory federation services
ADSI โ€“ Active Directory service interfaces
ANI โ€“ automatic number identification (caller ID)
API โ€“ application programming interface
BGP โ€“ border gateway protocol
BMR โ€“ bare metal restore
BYOD โ€“ bring your own device
CBCP โ€“ callback control protocol
DAC โ€“ dynamic access control
DCS โ€“ data collector set
DFS โ€“ distributed file system
DFSR โ€“ distributed file system replication
DISM – Deployment Image Servicing and Management
DOL โ€“ deleted object lifetime
DRA โ€“ data recovery agent
DSL โ€“ digital subscriber line
DSC โ€“ data collector set
DUN โ€“ dial-up networking
EAP โ€“ extensible authentication protocol
EAP-TLS – extensible authentication protocol, transport layer security
EFS – encrypted file system
FSR โ€“ file replication service
FSRM โ€“ file server resource manager
GPMC โ€“ group policy management console โ€“ may be used to refresh Group Policy settings immediately.
GPO โ€“ group policy object
HRA โ€“ health registration authority
IKEv2 – Internet Key Exchange version 2, a VPN protocol
IPSec โ€“ Internet protocol security
ISDN โ€“ integrated services digital network
L2TP โ€“ layer 2 tunneling protocol, NO encryption, NO authentication
LCP โ€“ link control protocol
LDAP – The Lightweight Directory Access Protocol directory service protocol that runs directly over the TCP/IP stack. It provides a mechanism used to connect to, search, and modify Internet directories.
MPPE โ€“ Microsoft point to point encryption
MTU โ€“ maximum transmission unit
MSU – Microsoft Standalone Update Package
NAP โ€“ network access protection
NAT โ€“ network address translation, translates one network address to another
NIC โ€“ network interface
NPS โ€“ network policy server, Microsoft RADIUS and RADIUS proxy server in WIN 2012 R2, enforces NAP
NTLM โ€“ Microsoft authentication protocol, less secure than Kerberos
PAP โ€“ password authentication protocol
POTS โ€“ plain old telephone service
PPP โ€“ point-to-point protocol, used for dial-up connections, uses serial link
PPPOE โ€“ Point-to-point protocol over Ethernet
PPTP – point to point tunneling protocol (does NOT use sertificates or pre-shared keys)
PSO โ€“ password setting object, fine-grained password policies
RADIUS โ€“ remote authentication dial-in user service, allows authentication for RAS clients and routers
RAS โ€“ remote access services (?)
RIP โ€“ routing information protocol for IPv4
RODC โ€“ read-only domain controller
RR โ€“ resource records (in DNS)
RRAS โ€“ routing and remote access services
SACL โ€“ system access control list
SID โ€“ security identifier
SHA โ€“ system health agents, works for NAP
SHV โ€“ system health validator, works for NAP
SPN โ€“ service principal name
SSID โ€“ service set identifier, wireless network name
SSO โ€“ single sign-on
SSTS โ€“ secure socket tunneling protocol
TLS โ€“ Tombstone Lifetime
TPM โ€“ trusted platform module, chip in newer computers used to store a BitLocker key
UPN โ€“ user principal name
WAP โ€“ wireless access point
WDS โ€“ Windows deployment services
WEP โ€“ wired equivalent privacy
WPA โ€“ Wi-Fi protected access
WPA2 โ€“ Wi-Fi protected access, version 2
WSUS โ€“ Windows server update services
.ZAP file โ€“ zero administration package is a text file, which allows the publishing of an application to a user on a Microsoft Windows system. For applications for which a .MSI file does not exist. It is used in Active Directory Domains and is installed using a Group Policy.

Posted in WIN | Tagged , | Comments Off on MCSA 70-411 part 1

Crochet 74 : dreamcatchers

I joลก jedan, plavi i sladak ๐Ÿ™‚

Posted in Relaxation | Tagged , | Comments Off on Crochet 74 : dreamcatchers