How to get citrix receiver in ubuntu

Below is a small document help to install citrix receiver.

install-citrix-receiver-on-ubuntu

Advertisements

Offline method for Java installing

1. Go to the Manual download page

http://java.com/en/download/ie_manual.jsp
2. Click on Windows Offline.

java-offline
3. The File Download dialog box appears prompting you to run or save the download file

4.Click the Install  button to accept the license terms and to continue with the installation.

How to configure cluster quorum using as a share Windows 2008-12

Here is a document described,how to configure a cluster which quorum from a file share from a third server.

Windows 2008-12 cluster quorum using as file share

How to increase Terminal connections

Below the document show how to allow more connections using some registry tweaks

Terminal connections increase

 

Overview of TS Licensing
https://technet.microsoft.com/en-us/library/cc732346(v=ws.10).aspx

Configuring License Settings on a Terminal Server
https://technet.microsoft.com/en-us/library/cc754759(v=ws.10).aspx

UNLIMITED TERMINAL SERVICES CONNECTIONS IN WINDOWS TERMINAL SERVICES 2000 AND 2003
http://www.voo.ee/wp/?p=324

How to reset RDC client license on Windows 7?
http://superuser.com/questions/422455/how-to-reset-rdc-client-license-on-windows-7

How to reset the 90 temporary license with Terminal Server/Win2k
http://searchwindowsserver.techtarget.com/tip/How-to-reset-the-90-temporary-license-with-Terminal-Server-Win2k

How to Reset a 120-Day Terminal Server Timeout
http://www.ehow.com/how_7543547_reset-120day-terminal-server-timeout.html

Reset Terminal license on Windows 2008, 2008 R2 and 2012
http://heelpbook.altervista.org/2016/reset-terminal-license-on-windows-2008-2008-r2-and-2012/

Microsoft Baseline Security Analyzer (MBSA)

Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and less-secure security settings within Microsoft Windows, Windows components such as Internet Explorer, IIS web server, and products Microsoft SQL Server, and Microsoft Office macro settings. Security updates are determined by the current version of MBSA using the Windows Update Agent present on Windows computers since Windows 2000 Service Pack 3.

mbsa

Resize a Windows Azure VM’s Root/C Drive

Using this method you can work entirely with the disks in Azure.

https://social.msdn.microsoft.com/Forums/azure/en-US/122dffc9-158d-47d7-b928-d9be8a2bc902/providing-larger-vm-os-disk-sizes-local-to-azure-without-need-to-csupload-vhd?forum=WAVirtualMachinesforWindows

Configure Network Level Authentication for Remote Desktop Services Connections

Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
 It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
 It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
 The client computer must be using at least Remote Desktop Connection 6.0.
 The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol.
 The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.
Use the following procedure to configure Network Level Authentication for a connection.

Configure Network Level Authentication for Remote Desktop Services Connections

How to Activate or Renew Symate License

After your Symantec  trial expired what need to be do.Below the document shows how will activate or renew license.

How to Activate Symate License

License Types and Policy

SEP EE Licensing guide

Datasheet

symantec-endpoint-protection

Ping request and response messages

Ping “Packet InterNet Groper” (operates by sending Internet Control

Message Protocol (ICMP) echo request packets) is a network

administration software utility used to test the reachability of a

host on an Internet Protocol (IP) network and to measure the round-

trip time for messages sent from the originating host to a destination

computer and back.

Destination host unreachable: The device you are trying to PING is

down or is not operating on the network. This could also mean you will

have to recheck the settings on your device to make sure the host is

correctly configured and also check that the routing is working

properly because a route to the destination system could not be found.

If you are trying to PING something outside of your local network,

check if gateway address is correct.

Bad IP address: An invalid IP address was entered on the command

prompt line. The IP address must be written in a dotted decimal

format, for example 127.0.0.1. Check that the IP address is correct.

Destination net unreachable: The targeted gateway to the IP

address written in the command prompt window could not be reached.

Check your computer gateway to be correct and routing table to the IP

address.

Destination specified is invalid: An invalid address has been

written in the command prompt window. Make sure the format of the

address is correct and then try again.

Request timed out: The ping command has timed out because there

was no reply from the targeted device. First check if your TCP/IP

stack is functioning correctly by pinging 127.0.0.1 . This doesn’t

mean that your network card is working properly. Now ping your default

gateway and make sure you have connectivity. Ping the next hop after

the gateway or a device before our faulty device, like a router

interface. If you have connectivity this could mean our faulty device,

the one we get replies with “request timed out” from has a problem or

may be down and not the network channel to the device. If you get

reply from another device on the way, but not from the host we are

troubleshooting, this could also mean there is no route back to your

device. Note: Destination Net Unreachable will show the IP address of

the router that tried to route a packet but couldn’t find a valid

route.

TTL expired during reassembly: The TTL value defines the number of

maximum hops a packet may live inside a network without reaching its

destination, before being discarded. It’s actually the number of

routers a packet may pass through network to destination, before being

dropped. This means the TTL value was too small and it failed to

reassembly either at the destination or on the local machine. Use -i

parameter for PING command to increase TTL value.

TTL expired in transit: The TTL value defines the number of

maximum hops a packet may live inside a network without reaching its

destination, before being discarded. It’s actually the number of

routers a packet may pass through network to destination, before being

dropped. This means the TTL value was too small to reach the target

and it failed on the way by being dropped. Use -i parameter for PING

command to increase TTL value.

Hardware error: Ping your loop-back address 127.0.0.1 to verify

that your TCP stack is working properly. If you can ping this, check

the cable. Else you will have to troubleshoot the TCP stack and

network interface card.

 No resources: Means exactly what it says but it targets RAM memory

most of times. Close some applications like the ones you don’t need

right now and try again. If this fails, reboot your computer. Will

work after.

Microsoft Robocopy

Robocopy, or “Robust File Copy is an advanced copy utility with has the feature to automatically resume file transfer on error or network disruption, or recover from terminated file copying . It also can preserve all of the file properties and information, including date and time stamps, security access control lists (ACLs) and more while replicating the file.

Robocopy came built-in in Windows operating system such as Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Server with command line interface only.

Syntax
robocopy <Source> <Destination> [<File>[ …]] [<Options>]

Robocopy GUI really simplify the process,having many options consolidated in a graphical interface lets you specify your source and target paths.

For example, this tool is multithreaded, allowing you to create a Robocopy script, execute it, and begin creating another one while your first script is still running. It also allows you to save your scripts (even if you don’t actually execute them) so that you can create a library of common scripts or share them with your colleagues. And most importantly, Robocopy GUI allows you to save your default settings so you don’t have to start from scratch every time.

Synatax and parameter
https://technet.microsoft.com/en-us/library/cc733145.aspx

Userguide

Microsoft Robocopy GUI Users Guide

robocopy

references
https://technet.microsoft.com/en-us/library/cc733145.aspx

%d bloggers like this: