List of TCP and UDP port numbers This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half-duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. ProcDump Introduction ProcDump is a command-line utility whose primary purpose is monitoring an application for CPU spikes and generating crash dumps during a spike that an administrator or developer can use to determine the cause of the spike. ProcDump also includes hung window monitoring (using the same definition of a window hang that Windows and Task Manager use), unhandled exception monitoring and can generate dumps based on the values of system performance counters. It also can serve as a general process dump utility that you can embed in other scripts. Using ProcDump
Important Linux Port Numbers The following are the most important linux port numbers you should know if you are running a linux vps or dedicated server. Make sure that you dont block these services with your firewall. 21 => FTP 22 => SSH 23 => Telnet 25 => SMTP Mail Transfer 43 => WHOIS service 53 => name server (DNS) 80 => HTTP (Web server) 110 => POP protocol (for email) 995 => POP over SSL/TLS 9999 => Urchin 111 => rpcbind 953 => rndc 143 => IMAP Protocol (for email) 993 => IMAP Secure 443 => HTTP Secure (SSL for )
Revo Uninstaller Portable Revo Uninstaller is a powerful portable uninstall tool or utility that can do much more than just add/remove programs. It can be used to remove any unwanted software programs, applications and traces from your computer. Revo Uninstaller has the ability to scan a program's data before uninstalling and can then check for any remnants of the program after it has been uninstalled. In addition, a user can remove unnecessary files, folders and registry keys that may be left over after performing a standard uninstall. Q: What do you normally do if your software installation becomes corrupt or is broken? A: With Revo Uninstaller, you can scan for all the program's related data found on the PC and show found files, folders and registry entries so you can proceed to delete them.
Random Linux Tips: Making KDE4 Behave, Thwacking Those Weirdo U3 Partitions on USB Sticks Sometimes, we have little tips and tricks that make life easier – but don't quite take up a full article. So today I've bundled a few practices that many Linux.com readers might find helpful. You'll learn how to control window behavior in KDE4, and make Nepomuk and Strigi be useful; and remove those silly proprietary U3 partitions from USB sticks. Making KDE4 Behave KDE4 comes with eleventy-eight hundred and fifteen fancy special effects, and the one that are turned on by default seem rather random.
Wink - [Homepage] Here is a sample Flash tutorial created by Wink. Click the green arrow button to start viewing it. --------> This is a good example of how you can create tutorials in Wink, by capturing screenshots, mouse movements and specifying your own explanations with them. And all this in a standard Windows-based UI with drag-and-drop editing makes it very easy to create high quality tutorials/documentation. Configuring Vim right – items.sjbach.com I have spent a lot of time peering into a Vim window, and relatedly, a lot of time testing different configurations. These are the best non-standard options I’ve found or stolen from others over the years; listed below in order of descending usefulness — though I think everything in this article is worth skimming — is an omnium-gatherum of tips that should have value to anyone, no matter how they like to run Vim. That is, there is minimal editorializing.
BashGuide Commands and Arguments -> You are invited to make additions or modifications so long as you can keep them accurate. Please test any code samples you write. Best Vim Tips Here is a necessarily cryptic list of the Best Vim Tips. There is an updated version and a printer friendly version. Basic use <Esc> is the escape key or use <ctrl>[ sometimes written as <C-[> vimtutor : starts vim editing a copy of a tutorial file -- very good. i : insert mode. Linux Tutorial: How to create a password-protected folder « I HATE HATE!!! When I first wrote this post, I recommended the use of cfs. But that was a few years ago, and now I recommend truecrypt. cfs is fiddly, and is hard to get used to if you don’t use the command line interface much and don’t know how to RTFM. Whereas truecrypt has a nice graphic user interface, encrypts “on the fly”, and has a ton of other features that make it my fave encryption application. You can read all about it, and download it, at www.truecrypt.org.
A simple introduction to working with LVM Posted by Steve on Wed 28 Jun 2006 at 21:22 The logical volume manager allows you to create and manage the storage of your servers in a very useful manner; adding, removing, and resizing partitions on demand. Getting started with LVM can be a little confusing to newcomer so this guide intends to show the basics in a simple manner. Manual LVM configuration guide for Debian 6 Debian is one of a handful of Linux distributions with support for setting up LVM, the Linux Logical Volume Manager. LVM brings a level of flexibility to disk management on Linux that is not possible with the traditional disk partitioning scheme. If your favorite Linux distribution supports LVM, I’ll always recommend that you use it instead of the traditional disk partitioning scheme. There is no real downside to it.