Monday, March 29, 2010

How To Install Ubuntu

Installing Ubuntu


Firstly you configure your BIOS setting boot by CD ROM.
After this you put Ubuntu CD into CD-ROM.



Once your BIOS is configured to boot from CD first, if you have Ubuntu in the drive, you should see this screen. Select your language.




If you have at least 512 MB of RAM, you may want to select Try Ubuntu without any change to your computer,
If you have only 256 MB or 384 MB of RAM, you should select Install Ubuntu. This will give you the same installation screens you see below, but you won't have the rest of the Ubuntu live session running as well.

If you have less than 256 MB of RAM, you should use the Alternate CD to install Ubuntu, or do a barebones installation.



After that, you should see a progress bar as the CD prepares to launch the installer.



Click the Install on the desktop to begin the installation.

Answer the questions as best you can. Most of them should be self-explanatory.




By default, the installer will give you the option to install Ubuntu side by side with whatever operating system is currently on your computer. You can choose that if you want to set up a dual-boot, but as I stated before, the safest dual-boot is probably with Wubi, unless you know what you're doing (in which case you shouldn't be looking at this guide).

For simplicity's sake, you should select Use the entire disk. Or, if you don't want to erase your entire drive, click Quit and then boot back into Windows and set up a dual-boot using Wubi.

If you are concerned about ever having to reinstall Ubuntu, but you want to make sure your user settings and files are preserved, check out these details on creating a separate /home partition during this part of the installation.




More straightforward questions.








Wait for the installation to finish. This part generally takes 10 to 30 minutes, depending on the speed of your computer.



After the installation is done, you have the option to keep using your live session of Ubuntu or to reboot and start using the installed version of Ubuntu.

After you reboot, don't be alarmed if you see some text boot messages. Just wait for Ubuntu to load..



And then after you log in, your Ubuntu will be ready for you to use!!!!!!!!

Tuesday, March 23, 2010

How To Install FTP

HOW TO INSTALL FTP

So before we can create FTP sites we first have to install the FTP service on our IIS machine.

Begin by opening Add or Remove Programs in Control Panel and selecting Add/Remove Windows Components.




Click Details and select the checkbox for Internet Information Services




Click Details and select the checkbox for File Transfer Protocol (FTP) Services



Click OK twice and then Next to install the FTP service. During installation you''ll need to insert your Windows Server 2003 product CD or browse to a network distribution point where the Windows Server 2003 setup files are located. Click Finish when the wizard is don

Friday, March 19, 2010

How to restart or shutdown remote machine

If you can ping this machine from other computer and you have administrators rights on that machine you may use windows utility.

On a computer that has connection to the server which needs to be restarted or shutdown go to Start -> Run and type shutdown -i





This window will show up. Press Add and type either IP or DNS of remote server.

Select shutdown or restart and press OK. That 's it. For your convenience you may run from command line constanct ping (ping servername -t) when the server actually stopped to respond to pings and when it started again.

Alternatively you can go to command prompt (start -> run -> cmd) on your workstation and Type
shutdown -r -m \\x.x.x.x
Replace x.x.x.x with the IP address or computer name of the remote machine. -r option is for restart, don't use -r if want to just shut down the system.

How To create Domain 2003









Method:---

Click Start:- Run:...





Then Go to Run:-----

Type "dcpromo" and click "OK


You will see the first window of the wizard. As it suggests, I suggest reading the help associated with Active Directory. After this, click "Next"






Click "Next" on the compatibility window, and in the next window keep the default option of "Domain Controller for a new domain" selected, and click "Next"



In this tutorial we will create a domain in a new forest, because it is the first DC, so keep that option selected





Now we have to think of a name for our domain. If you own a web domain like "visualwin.com", you can use it, but it isn't suggested because computers inside of your domain may not be able to reach the company website. Active Directory domains don't need to be "real" domains like the one above - they can be anything you wish. So here I will create "TEST Domain"




Now in order to keep things simple, we will use the first part of our domain ("TEST"), which is the default selection, as the NetBIOS name of the domain


The next dialog suggests storing the AD database and log on separate hard disks, and so do I, but for this tutorial I'll just keep the defaults







The SYSVOL folder is a public share, where things like .MSI software packages can be kept when you will distribute packages (as I said, AD has a lot of different features). Once again, I will keep the default selection but it can be changed if you wish to use the space of another drive

Now we will get a message that basically says that you will need a DNS server in order for everything to work the way we want it (i.e., our "visualwin.testdomain" to be reachable). As I mentioned earlier, we will install the DNS server on this machine as well, but it can be installed elsewhere. So keep the default selection of "Install and configure", and click "Next"





Because, after all, this is a Windows Server 2003 tutorial website, we'll assume there are no pre-Windows 2000 servers that will be accessing this domain, so keep the default of "Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems" and click "Next"





The restore mode password is the single password that all administrators hope to never use, however they should also never forget it because this is the single password that might save a failed server. Make sure it's easy to remember but difficult to guess

Now we will see a summary of what will happen. Make sure it's all correct because changing it afterwards can prove to be difficult




After the previous next was clicked, the actual process occurs. This can take several minutes. It's likely that you will be prompted for your Windows Server 2003 CD (for DNS) so have it handy



If your computer has a dynamically assigned address (from DHCP) you will be prompted to give it a static IP address. Click ok, and then in the Local Area Connection properties, click "Internet Protocol (TCP/IP)" and then "Properties"


In the next window select "Use the following IP address" and select the information that you will use for your domain (and 127.0.0.1 for the primary DNS, because your computer will host DNS. I still suggest setting up an alternate as well.) Click "OK" and then "Close" on the next window



And after a while you will see


Wednesday, March 17, 2010

OECD INDIA INVESTMENT

Executive Summary


India has made tremendous progress in building a policy environment to encourage investment. As a result, the country’s economy is growing more rapidly and FDI inflows have accelerated impressively. However, investment remains insufficient to meet India’s needs, particularly in infrastructure. Current efforts to strengthen and liberalise the regulatory framework for investment need to be intensified and India’s well-developed economic legislation implemented at an accelerated pace both at national level and right across India’s states and union territories.


India has made tremendous progress in promoting investment



India has made impressive strides in building a policy environment to encourage both domestic and foreign investment, in particular to attract foreign direct investment (FDI) and facilitate outward investment, as evidenced in this study. This progress is an integral part of the market-oriented reforms which have since 1991 set the scene for a shift to a consistently higher rate of real annual GDP growth than the country has experienced in its recent history.
The “licence raj” has been largely dismantled. Restrictions on large-scale investment have been greatly relaxed. Many sectors formerly reserved to the public sector have been opened up to private enterprise. Import substitution and protectionism have been replaced by an open trade regime. Sectoral restrictions on FDI have been progressively removed and foreign ownership ceilings steadily raised. FDI approval procedures have been greatly liberalised. Foreign exchange restrictions related to investment have been relaxed. Experimental economic zones such as the Special Economic Zones have been established to test investment liberalisation measures.
At the same time, other elements of the business environment that have an impact on investment have improved. The legal framework for intellectual property rights (IPR) protection has been greatly developed in the past two decades and enforcement has been strengthened. A non-discriminatory Competition Act is being gradually put into effect. India’s tax system now treats foreign-owned companies on a par with domestic firms. The corporate

governance framework has improved, taking advantage of international
norms. The government is striving to increase investment in human capital. These reforms are expected to last. India has a history of democracy and the rule of law which provides a firm basis for the development of a sound legislative and regulatory environment for investment, incorporating good practices from other jurisdictions, generally on the basis of internationally¬recognised standards.
As a result, India’s FDI inflows have accelerated sharply in recent years (until the current economic crisis). FDI inflows have grown from relatively insignificant levels in the early 1990s to magnitudes now greater than most developing countries. These inflows have begun to play an important role in providing employment, diversifying consumer choice and adding competitive stimulus to domestic investment.
India’s outward investment, which has grown apace with its inward investment during the 2000s, is also contributing to India’s role as a major player in the world economy. Indian companies are active in M&As in OECD countries as well as greenfield investment in developing countries. This role is also evidenced by India’s increasingly active investment treaty practice.


To meet India’s investment needs, remaining challenges need to be addressed
India needs more investment, especially in infrastructure and manufacturing



However, India’s investment needs remain massive, especially in view of the country’s inadequate infrastructure, which imposes restraints both on improvements in living conditions and on productivity growth. Also, while India’s exports of services, including those of the IT sector, are highly successful, and the country has continued to export labour services, its export manufacturing is far below potential, given India’s resource endowment, particularly its vast labour force. This is a reflection of the under-representation of the manufacturing sector in the economy as a whole.
At the same time, the growth rate of employment has lagged behind the overall economic growth rate and obstacles remain to the expansion of activity and therefore employment in the formal sector. More investment can promote employment growth and so help raise the incomes of India’s poorest families.

Investment restrictions may be holding back productivity growth



Although the policy framework for FDI in India has been greatly liberalised since 1991, it remains restrictive in comparison with a majority of OECD countries, as shown by the OECD’s FDI Restrictiveness Index. Many of the current FDI restrictions in place apply to relatively low-productivity sectors where growth could be accelerated by the enhanced productivity that would benefit from increased foreign investment, for example in banking, insurance and especially retail distribution, where the influx of FDI could help raise incomes in the agricultural sector while increasing choice and lowering living costs for consumers.

Implementation gaps need to be narrowed to reduce regional income disparities…


While both economic growth and investment have been impressive since 1991, regional inequalities have not only persisted but have generally been aggravated as a result of economic reform. This trend needs to be reversed if the government is to reach its goal of achieving pro-poor growth and reducing inequality. Poorer and slower-growth states may begin to catch up with their richer neighbours by accelerating implementation of policies adopted at the central level to promote investment. For example, while the central government has reduced the number of approvals needed for new investment, there remains a need to streamline administrative procedures at the state level.

… and improve the nationwide investment environment



At the same time, there appears to be some potential for narrowing implementation gaps at the central level. For example, while great progress has been made in IPR protection, the capacity of the judicial system to handle such cases in a timely manner remains insufficient, and although a Competition Law was passed in 2002, the resulting Competition Commission only became operational in mid-2009.

Monday, March 15, 2010

Interview Question of Windows ‘N’ Answer Bank

Interview Question ‘N’ Answer Bank


Q.1 What is the latest Service Pack for Exchange 2000?

Ans : Service Pack 3.

Q.2 What are the versions of ISA servers and their service packs?

Ans : ISA Server 2000 SP1
ISA Server 2004 SP1

Q.3 What are the core services that run a ISA server?

Ans : Microsoft ISA Server Control
Microsoft Web Proxy

Q.4 What is the function of the .edb and .stm files in Exchange 2000?

Ans: .edb files :-




Q.5 What is the core function of the Active directory Connector in Exchange 2000?

Ans: The ADC is the service that lets you perform directory synchronization between the Exchange Server 5.5 DS and AD. The ADC uses connection agreements (CAs) to define individual configurations for replication.

Q.6 What is the SRS service in Exchange 2000?

Ans : The SRS is an Exchange 2000 service that allows integration with Exchange Server 5.5 sites. The SRS runs on an Exchange 2000 server but presents itself as an Exchange Server 5.5 DS to other Exchange Server 5.5 servers. You can use the SRS only if you're running Exchange 2000 in mixed mode.

The SRS in Intrasite Replication :-

Figure 1.



Figure 1 shows an Exchange Server 5.5 site (i.e., a site that contains only Exchange Server 5.5 servers) with a CA homed against one of the servers, S4. The CA to the AD is well defined because it has a valid source of Exchange Server 5.5 directory information. The ADC obtains information from the Exchange Server 5.5 DS on server S4.
But what happens when you upgrade the server S4 from Exchange Server 5.5 to Exchange 2000? Upgrading compromises the integrity of the CA because S4 doesn't have an Exchange Server 5.5 DS (because Exchange 2000 uses AD), and the CA becomes unusable. Your only option is to rehome the Exchange Server 5.5 end of the CA to another server (e.g., server S5). This action would reestablish the integrity of the CA, but you would need to rehome this CA when you subsequently upgrade server S5 to Exchange 2000. This rehoming activity could repeat itself for some time unless you initially homed your CA against a server that you knew would be the last one in the site you migrate to Exchange 2000.
Retaining CA integrity. Let's assume that server S4 is the first Exchange Server 5.5 server in the site you're upgrading to Exchange 2000. This assumption satisfies one of the rules for enabling the SRS: You're upgrading the first server in the site. When you perform the upgrade in this situation, the SRS (which is the Exchange Server 5.5 DS in disguise) becomes active. And because the SRS takes part in Exchange Server 5.5 directory replication just like any other Exchange Server 5.5 service, it has a valid view of the Exchange Server 5.5 directory in its SRS database.
Figure 2.

Figure 2 shows the SRS active on S4.
Because the SRS is active on server S4, you can retain the existing CA that is homed against S4. Because the SRS is there, you have a valid source of Exchange Server 5.5 directory information, so you don't need to manually rehome the CA. Having one server that you know can always provide a source of Exchange Server 5.5 directory information is a big plus.
When you home a CA against a regular Exchange Server 5.5 server, you must bind the Exchange Server 5.5 end of the CA against the Lightweight Directory Access Protocol (LDAP) of the Exchange Server 5.5 DS. The ADC uses LDAP to access the Exchange Server 5.5 DS. By default, the Exchange Server 5.5 LDAP listens on port 389, but you can enable LDAP on another port (e.g., if you're running an Exchange Server 5.5 server on a Windows 2000 domain controller). AD on a Win2K domain controller also listens on port 389, and as Win2K is starting up, it seizes control of port 389 before the Exchange Server 5.5 DS can get to it.
The SRS behaves similarly. The SRS runs only on a Win2K system, and this system might be a domain controller. A CA always wants to connect to a source of Exchange Server 5.5 directory information over LDAP. To avoid confusion, the Exchange engineering team designed the SRS so that it offers its LDAP service from port 379. Therefore, if you had previously homed your CA against an Exchange Server 5.5 DS on port 389, you must modify the CA so that it now points to port 379 to get to the SRS DS. "More Tips for Using the Active Directory Connector," Reader to Reader, April 2000, explains how to change the LDAP port.
This modification requires only that you use the CA management tool to redirect the CA to a different port after the upgrade to Exchange 2000. However, this modification is a small change to an existing CA, compared with rehoming the CA to an altogether different server.
Within an Exchange Server 5.5 site, an Exchange Server 5.5 server communicates with other Exchange Server 5.5 servers to keep the information in its DS consistent with the information in the other Exchange Server 5.5 servers' directories. This behavior is the essence of intrasite replication. The component responsible for controlling this process is the Knowledge Consistency Checker (KCC)—which is on every Exchange Server 5.5 server. The KCC maintains a table of all Exchange Server 5.5 servers that take part in the replication chain.
As you upgrade many Exchange Server 5.5 servers in the site to Exchange 2000, most servers won't have the SRS enabled. In these cases, the upgrade code removes the entry for each respective server from the KCC table. For example, for the systems you see in Figure 2 (presuming that they're not bridgehead servers), the code removes servers S1, S2, S3, and S5 from the Exchange Server 5.5 intrasite replication chain. (More precisely, the code removes the servers' directory service agent—DSA—object from the KCC table.) Removing the servers' DSA ensures that they no longer take part in Exchange Server 5.5 intrasite replication because they're no longer Exchange Server 5.5 servers. If the upgrade process didn't remove these DSA objects from the KCC table, you'd see many errors in the event log, signifying that Exchange Server 5.5 directory replication failed against the newly upgraded servers.
The SRS in Intersite Replication :-
When you upgrade an Exchange Server 5.5 directory replication bridgehead server to Exchange 2000, the bridgehead server must maintain a means for communicating site information to its Exchange Server 5.5 bridgehead replication partner. The SRS provides this means because it appears to the replication partner as an Exchange Server 5.5 DS to communicate with.
Figure 3.

Two Exchange Server 5.5 directory replication bridgehead servers (S9 and S1) communicating across a DRC.


When you upgrade server S1 from Exchange Server 5.5 to Exchange 2000, as Figure 4 shows, the SRS becomes indispensable because once again, it reduces the administrative effort associated with upgrading servers. Because the pure Exchange Server 5.5 site (i.e., Site B) has no CA, all site and topology information for Site B must come from traditional Exchange Server 5.5 directory replication.
In the absence of an SRS service, you need to rehome Exchange Server 5.5 DRCs onto different servers as you upgrade bridgehead servers from Exchange Server 5.5. In this example, upgrading server S1 to Exchange 2000 without an SRS service would require rehoming the DRC to another server in the site (e.g., S2).
Components of the SRS even optimize CAs and DRCs. If a CA becomes available to Site B, Exchange can deliver directory information into that site two ways: across a DRC and through a CA. Exchange Server 5.5 directory replication is object-based, whereas replication through a CA is attribute-based. Therefore, using CAs to provide directory information is more efficient than using DRCs because attribute-based replication involves less data on the wire. If you use a CA, as Figure 5 shows, the SRS disables the DRC between the two Exchange Server 5.5 sites and uses ADC-based replication instead.
You can see that, with respect to intersite replication, the SRS is a useful tool. Without it, the management of DRCs would increase administrative overhead. The SRS proves its worth just for managing CAs within a site, but coupled with managing connections between Exchange Server 5.5 bridgehead servers, it's essential.
Behind a Bridgehead Server Upgrade :-




When you upgrade server S1 to Exchange 2000, the Setup program modifies the existing local dir.edb database (i.e., the traditional Exchange Server 5.5 DS), copies the new executables for the SRS service from the installation CD-ROM, and creates several objects in AD's configuration-naming context. (The configuration-naming context contains all Exchange 2000 configuration information.)
Specifically, an instance of an object of class ms-Exch-Site-Replication-Service within the Exchange tree in the AD configuration-naming context represents the SRS. Figure 6 shows an example of a default SRS object, Microsoft DSA, from ADSI Edit. ADSI Edit, part of the Microsoft Windows 2000 Resource Kit, is a useful tool for looking at objects, attributes, and their values in AD.
In this case (i.e., when S1 is the first Exchange 2000 server in the site), the Setup process also creates a Configuration Connection Agreement (ConfigCA) between AD and the new SRS service installed locally. The SRS takes on the ownership of the DRC to server S9. Because the SRS object in AD has a legacyExchangeDN attribute of /o=/ou=/cn=/cn=Servers/cn=S1/cn=Microsoft DSA and is a mail-enabled object, the SRS becomes the destination for replication messages from server S9. In fact, you can use any transport (e.g., X.400, RPCs) to send mail to the SRS object. Figure 7 shows the value of the mail attribute of the SRS. As you can see, this attribute has an SMTP address (i.e., STOISDN-SRS@cpqcorp.com), which means that any other Exchange Server 5.5 DS can send directory information to it over an SMTP connector.
The SRS connects to bridgehead server S9 over a DRC and to AD through a ConfigCA. The ConfigCA is two-way, replicating configuration information for the Exchange Server 5.5 view of Site A from the SRS to AD and back-replicating information for administrative group A (the Exchange 2000 view of the site) from AD to the SRS.

Q.7 Where are the NTFRS transactions stored?
Ans : In the Ntfrs.jdb Jet database and in a set of log files in the default paths %SystemRoot%\Ntfrs\Jet\Log.

Q.8 What are the different MS Exchange server 5.5. files that are installed after running setup?
Ans : 1. Private Information Store ( C:\exchsrvr\MDBDATA)
2. Public Information Store (C:\exchsrvr\MDBDATA)
3. Information Store Logs (C:\exchsrvr\MDBDATA)
4. Directory Service (C:\exchsrvr\DSADATA)
5. Directory Service Logs (C:\exchsrvr\DSADATA)
6. MTA (C:\exchsrvr\MDBDATA)

Q.9 What are the core MS exchange 5.5 services/components?
Ans :- 1. Directory Service (DS) Microsoft Exchange Directory
2. Microsoft Exchange Event Service
3. Information Store (IS) Microsoft Exchange Information Store
4. Message Transfer Agent (MTA)Microsoft Exchange Message Transfer Agent
5. System Attendant (SA) Microsoft Exchange System Attendant.

Q.10 What is the latest Service Pack for Windows NT Server 4.0?
Ans : Service pack 6a

Q.11 What is the latest Service Pack for Windows 2000 Server?
Ans : Windows 2000 Service Pack 4

Q.12 What is the IIS version on Win2K servers?
Ans : IIS 5.0 On Windows 2000 Server
IIS 6.0 On Windows 2003 Server

Q.13 What is the TCP/IP port for A Global Catalogue Server (GC)?
Ans : Port 3268

Q.14 Explain the Active Directory Log files?
Ans : The key files are:
• ntds.dit
• edb.log
• res1.log
• res2.log
• edb.chk
When a change is made to the Win2K database, triggering a write operation, Win2K records the transaction in the log file (edb.log). Once written to the log file, the change is then written to the AD database. System performance determines how fast the system writes the data to the AD database from the log file. Any time the system is shut down, all transactions are saved to the database.
During the installation of AD, Windows creates two files: res1.log and res2.log. The initial size of each is 10MB. These files are used to ensure that changes can be written to disk should the system run out of free disk space. The checkpoint file (edb.chk) records transactions committed to the AD database (ntds.dit). During shutdown, a “shutdown” statement is written to the edb.chk file. Then, during a reboot, AD determines that all transactions in the edb.log file have been committed to the AD database. If, for some reason, the edb.chk file doesn’t exist on reboot or the shutdown statement isn’t present, AD will use the edb.log file to update the AD database.
The last file in our list of files to know is the AD database itself, ntds.dit. By default, the file is located in %systemroot%\NTDS, along with the other files we’ve discussed. During the installation of AD (by running DCpromo), you can specify that the log files and database files be installed in different locations, as shown in Figure 1.


Figure 1. The default locations for the Active Directory database and log files.


Q15.

Wednesday, March 3, 2010

Unix Interview questions

User
These questions will demonstrate whether the supplicant has had exposure to UNIX as an end-user. Does not imply that the user has any other skills, only that they've really used

UNIX.

___ List 10 UNIX Commands List 10 UNIX Commands

___ What is the most important UNIX command? Man

___ How do I create a directory? Mkdir

___ How do I find out what processes are running? ps, top

___ How do I exit Emacs/How do I exit vi? ^C^X for Emacs, :q for vi

___ What does the grep command do? searches files or streams for a regex

___ How do I stop a process? kill

Shell Programming

These questions test whether the supplicant has used basic shell programming constructs. If the person has been using the shell for ANY length of time, some knowledge of each of these will get picked up. These aren't really easy to pick up from books and answers may get fuzzy.

___ How do I test for the presence of a file in Bourne Shell? test -f

___ In a shell script, how do I print the scripts arguments? $@ $* or $1..$2..

___ How do you make a shell-script executable?chmod ___ script

___ What is the difference between ' ` and "? Protect, Process and Group

___ How do I connect processes, so stdout of one becomes stdin of another? pipes

___ How do I redirect stderr under a Bourne Shell? 2>

___ How do I determine the home directory of a user in a shell script? $HOME, ~, /etc/passwd
___ What is a regular expression? pattern matching language

___ Explain shell job control. fg,bg,&,^Z

___ Whats the differences between a Bourne and C-Shell? startup file, script syntax, etc..

___ How are new processes created? fork/exec

Basic (generic) Administration
These questions test whether the supplicant has done basic UNIX System Administration. Some questions (fsck) may not apply if the system architecture does not have an analogous construct (AIX). Sophistocated Help Desk personnel should be able to answer all of these. Since they all deal with day-to-day administration.

___ How do I find out who is logged into the system? who,w

___ What are the fields in the password file? user:pw:uid:gid:gcos:home:shell

___ What steps to setup a new user? /etc/passwd, home dir, permissions

___ What directory is typically used as scratchspace? /tmp

___ How do I stop a UNIX system? halt,init,shutdown

___ Name some top-level (under /) directories? (etc,bin,usr,var,tmp)

___ How do I install a new printer? lpadmin, /etc/printcap

___ What does fsck do? fixes filesystems (no AIX)

___ Explain the concept of virtual memory. Physmem, Swap, and paging.

___ What kind of permission would "chmod 755" yeild on a file?U = rwx, g/o rx

___ What is an "s" in a file's permission mean? setuid

___ What does a "b" as the first letter of a file's permissions mean? block special

___ How do I make a new disk available for files? mkpart/newpart,mkfs,mount (no AIX)

___ If I'm logged in as root, what command lets me "become" another user id? Su

___ What's the difference between "su" and "su -"?su - run's the user's login files
___ What command will tell me how busy the system is? (load average) top,sar,iostat,vmstat

___ How do I see what print jobs are pending? lpstat, lpc stat, etc..

___ How do I setup a printer? lpadmin, printcap, YMWV

___ What's the startup files for the C shell (or Bourne)? .login/.cshrc or .profile

___ What is /etc/aliases? mail aliases for systems
___ What's the current version of your OS? SunOS 5.x/2.x, HPUX ~10, AIX ~4, IRIX 5/6,etc..

Advanced Administration

These questions separate the men from the boys.
___ What is /etc/inittab? Startup sequence file

___ Where is the "main" mail configuration file for a system? sendmail.cf

___ What is the first process to start on a UNIX system, after the kernel? init

___ What is an inode? pointer to block of disk, referenced in a directory

___ What does the ipcs command do? shows status of System V IPC structures

___ What is the Changed time on an inode/file mean? Last time the inode was modified

___ What's an indirect block? Pointer to a list of blocks

___ What is an X Server? graphical display device, optional

___ What are two X Clients? xterm, xclock, netscape, CDE, etc...

___ What is RAID? Redundant Array of Independant Disks, striping, mirroring, etc..

___ How do I change the priority of a process?nice, renice, priocntl (SysV.4)

UNIX Network

These questions test whether the supplicant has used basic network commands. Note, this doesn't mean that he knows anything about how they work.

___ What is a web server? What is a web client? place with pages, netscape/msie

___ How can I copy a file from one system to another? ftp,rcp

___ What command lets me remotely log into another system? telnet,rsh

___ Give an example of a domain name? dcicorp.com, ford.com

___ Give an example of a host name? varies widely

Networking Administration

These questions test whether the supplicant has done basic network administration. Note, this doesn't mean that he may not know some networking tools (FTP,rcp, etc..) but has he set them up before, does he know how they work?
___ What is an IP address? 32-bit Internet Protocol ID Number
___ What is a subnet? logical/physical grouping of systems by IP/Subnet

___ What is a MAC accress? ID number burned into every ethernet card

___ What is a hub? common: same-subnet, same-collision domain ether connection

___ How do I test to see if a system is setup on the network correctly? Ping

___ How do I display the route table? netstat, route

___ What's in the inetd.conf file? Internet daemon info

___ What is DNS? heirarchical network naming system, Domain Naming System

___ What features of Anonymous FTP make it secure?chroot'ed environment

___ What is NSLOOKUP? tool for querying names/addresses in DNS

___ What are RPC's? Remote Procedure Calls

___ What is an A record? primary name->ip address mapping

___ What is an MX record? mail domain mapping record

___ What is NFS? Network File System
___ How do I setup a system as an NFS server? share,/etc/exports,sharetab, etc..

___ How do I setup a system as an NFS client? mount, mount tables

___ What is SMTP? Simple Mail Transport Protocol

___ What is traceroute? IP routing utility

___ How does traceroute work? declining TTL in IP header

Security

For those people that put "security" down, these two questions should be quite easy for UNIX "security" people.
___ What are shadow passwords? unreadable password files

___ What is an rhosts file? Why is it bad? Bezerkley trust, can be abused

___ Why are set-uid shell scripts a bad idea? unexpected shell expansion

___ What is SSH? Secure Shell

___ Explain (briefly) Kerberos? Ticket-based scheme for authentication

___ What is the problem with running fingerd(1)? Gratuituous information

___ Sendmail is currently at what version? 8.x. If they don't use sendmail, hooray

___ Who is CERT? What do they do? Computer Emergency Response Team, issue advisories

Perl

These indicate whether or not a person really has seen perl scripts before. Perl scripts can be easy to read, but if you write them, these questions are easy. Use the perl examination for further testing here.
___ What does the @ in a variable indicate? its an array

___ What's the current version of Perl? 4 or 5, prefer 5. 5.005 is MRV

___ What is a Hash? a key-data pair type of array variable

HR Questions

These general questions can be the toughest ones to get through. They might sound easy, but they require a lot of thought and preparation...