(این کلام از جناب علامه جعفری نقل به مضمون است)

علامه محمد تقی جعفری (رحمه­الله­ علیه) می­فرمودند:عده­ ای از جامعه­ شناسان برتر دنیا در دانمارک جمع شده بودند تا پیرامون موضوع مهمی به بحث و تبادل نظر بپردازند. موضع این بود: «ارزش واقعی انسان به چیست».برای سنجش ارزش خیلی از موجودات معیار خاصی داریم. مثلا معیار ارزش طلا به وزن و عیار آن است. معیار ارزش بنزین به مقدار و کیفیت آن است. معیار ارزش پول پشتوانه­ی آن است. اما معیار ارزش انسان­ها در چیست.هر کدام از جامعه شناس­ها صحبت­ هایی داشتند و معیارهای خاصی را ارائه دادند.بعد گفتند: وقتی نوبت به بنده رسید گفتم : اگر می­خواهید بدانید یک انسان چقدر ارزش دارد ببینید به چه چیزی علاقه دارد و به چه چیزی عشق می­ورزد.کسی که عشقش یک آپارتمان دو طبقه است در واقع ارزشش به مقدار همان آپارتمان است.کسی که عشقش ماشینش است ارزشش به همان میزان است.اما کسی که عشقش خدای متعال است ارزشش به اندازه­ ی خداست.علامه فرمودند: من این مطلب را گفتم و پایین آمدم. وقتی جامعه شناس­ها صحبت­های مرا شنیدند برای چند دقیقه روی پای خود ایستادند و کف زدند.وقتی تشویق آن­ها تمام شد من دوباره بلند شدم و گفتم: عزیزان! این کلام از من نبود. بلکه از شخصی به نام علی (علیه­السلام) است. آن حضرت در نهج البلاغه می­فرمایند: «قِیمَةُ کُلِّ امْرِئٍ مَا یُحْسِنُهُ» / «ارزش هر انسانی به اندازه­ی چیزی است که دوست می­دارد».وقتی این کلام را گفتم دوباره به نشانه­ ی احترام به وجود مقدس امیرالمؤمنین علی (علیه­السلام) از جا بلند شدند و چند بار نام آن حضرت را بر زبان جاری کردند . . .حضرت علامه در ادامه می­فرمودند: عشق حلال به این است که انسان (مثلا) عاشق 50 میلیون تومان پول باشد. حال اگر به انسان بگویند: «آی!!! پنجاه میلیونی!!!» . چقدر بدش می­آید؟ در واقع می­فهمد که این حرف توهین در حق اوست. حالا که تکلیف عشق حلال اما دنیوی معلوم شد ببینید اگر کسی عشق به گناه و معصیت داشته باشد چقدر پست و بی­ ارزش است! اینجاست که ارزش «ثار الله» معلوم می­ شود. ثار الله اضافه­ ی تشریفی است . خونی که در واقع آنقدر شرافت و ارزش پیدا کرده که فقط با معیارهای الهی قابل ارزش گذاری است و ارزش آن به اندازه­ ی خدای متعال است.

+ نوشته شده توسط وحید قاسمی در شنبه بیست و پنجم شهریور ۱۳۹۱ و ساعت 12:40 |

You can convert Acronis True Image Home 2010 TIB file to Windows backup VHD file to be able to boot from it

This article applies to:

Introduction

Acronis True Image 2010 backup (TIB) files can be converted to Windows backup VHD files. There are several reasons why Acronis recommends doing this:

  • You can boot your machine from the converted VHD file to test if it is not corrupt and works fine;
  • You can boot from the converted VHD for testing purposes. For example, to install a new application and see if it runs fine;
  • You can keep the converted VHD file for emergency situations. For example, if your machine crashes and you need to get it up and running in no time, you can just boot from the VHD file.
  • In Windows 7, the VHD file can be mounted as an additional drive.

(!) If you are going to boot from the converted VHD file, it must contain either Windows 7 Ultimate or Windows 7 Enterprise Edition.

(!) If you are going to mount the VHD file in Windows 7, there can be non-system Windows partitions.

(!) Any changes you make to the booted or mounted VHD file are saved to it. If you boot from the VHD file and make changes to the data that was not backed up (e.g. delete a file from drive that was not backed up), these changes will affect your live system.

(!) File backup (as opposed to disk/partition backup) cannot be converted to VHD.

(!) You can only boot the same machine the backup of which was converted to VHD. Booting other machines from the same VHD files will fail.

(!) You cannot run the converted VHD file as a virtual machine.

Solution

  1. Run Acronis True Image Home 2010. Click Tools & Utilities -> Convert Acronis Backup:

  2. Select your Acronis True Image Home 2010 TIB file:

  3. Select the target location for the VHD file to which you are converting:

  4. Click Proceed:

  5. The operation will proceed to completion:

Now you have your VHD file.

More information

See also:

+ نوشته شده توسط وحید قاسمی در چهارشنبه هشتم شهریور ۱۳۹۱ و ساعت 10:12 |

Step-by-step instructions on how to convert a backup archive (.tib) to a virtual machine

This article applies to:

  • Acronis Backup & Recovery 10 Advanced Server
  • Acronis Backup & Recovery 10 Server for Windows (Standalone)
  • Acronis Backup & Recovery 10 Advanced Server - Small Business Server Edition
  • Acronis Backup & Recovery 10 Advanced Workstation
  • Acronis Backup & Recovery 10 Workstation (Standalone)
  • Acronis Backup & Recovery 10 Advanced Server - Virtual Edition

Introduction

You can convert a backup archive (.tib) of Acronis Backup & Recovery 10 to a virtual machine.

(!) This functionality is only available in Windows. It is not available under Acronis Bootable Media.

Conversion to virtual machine is supported for backups of the following operating systems:

  • Windows 2000
  • Windows XP Professional SP3 x32 and x64, Windows XP Home
  • Windows 2003 Server
  • Windows Vista (all editions)
  • Windows Server 2008 and 2008 R2 (all editions)
  • Windows 7

Solution

  1. Connect Acronis Management console to a machine where Acronis Agent for Windows, Acronis Agent for Hyper-V or Acronis Agent for ESX/ESXi is installed by clicking Manage this machine or Manage a remote machine:

  2. Do any of the following:
    • Click Recover to open the Recover data page:

    • Use the Navigation pane to navigate to the vault where the archive is stored. Select the archive and then select the disk or volume backup you want to convert. Click Convert to VM:

      (!) If you are connected to Acronis Management Server, option Convert to VM will not be available. Select Recover instead.

  3. In Data type, select Disks or Volumes depending on what you need to convert;
  4. In Content, select the disks to convert or the volumes with the Master Boot Records (MBR) of the corresponding disks:

  5. In Recover to, select New virtual machine:

  6. In VM server, select the type of the new virtual machine to be created or on which virtualization server to create the machine:

    See also Acronis Backup & Recovery 10: Limitations on Converting TIB to Citrix XenServer VHD;

  7. In VM name, enter the name for the new virtual machine;
  8. [Optionally] Review the Virtual machine settings and make changes if necessary. Here you can change the path to the new virtual machine;
  9. The same type of machines with the same name cannot be created in the same folder. Change either the VM name, or the path if you get an error message caused by identical names.
  10. Select the destination disk for each of the source disks or source volumes and MBRs;

    On a Microsoft Virtual PC, be sure to recover the disk or volume where the operating system's loader resides to the Hard disk 1. Otherwise the operating system will not boot. This cannot be fixed by changing the boot device order in BIOS, because a Virtual PC ignores these settings.

  11. In When to recover, specify when to start the recovery task;
  12. [Optionally] Review Recovery options and change the settings from the default ones, if need be. You can specify in Recovery options -> VM power management whether to start the new virtual machine automatically, after the recovery is completed. This option is available only when the new machine is created on a virtualization server;
  13. Click OK. If the recovery task is scheduled for the future, specify the credentials under which the task will run;
  14. You will be taken to the Backup plans and tasks view where you can examine the state and progress of the recovery task.

More information

See also:

+ نوشته شده توسط وحید قاسمی در چهارشنبه هشتم شهریور ۱۳۹۱ و ساعت 10:9 |


Wireless Router
Most of you might have enabled wireless encryption, which is only one of the 6 steps mentioned in this article to make your wireless network safe and secure from hackers.  The screenshots mentioned below are from Linksys wireless router. But, you’ll find similar options for all the 6 steps mentioned below in wireless routers from any other vendors.
 
Apart from these 6 steps to secure your wireless router, also make sure your wireless router firmware is up-to-date. Refer to our 4 easy steps to upgrade linksys wireless router firmware article for detailed instructions on how to upgrade your router firmware.

1. Enable Encryption

Let us start with the basics. Most of the wireless router has the encryption disabled by default. Make sure to enable either WPA or WPA2 wireless encryption.  Click on Wireless -> Wireless Security , to enable the encryption and assign a password as shown in Fig-1. Following are the different wireless encryption options available.

  • WEP (Wired Equivalent Protection) 64-bit and 128-bit: WEP is an old wireless encryption standard. Never use WEP encryption, which can be hacked within seconds.
  • WPA (Wi-Fi Protected Access): WPA-PSK is also refered as WPA-Personal. This is a new version of wireless encryption standard and more secure than WEP. Most of the wireless adapters on your laptop will  support WPA.
  • WPA2: This is the latest wireless encryption standard that provides the best encryption. Always use WPA2, if both your wireless router and laptop wireless adapter supports it.
Enable Encryption
Fig-1 Enable Wireless Encryption

2. Change the SSID name

SSID (Service Set Identifier) refers to the name of your wireless connection, that you see on the “Available Wireless Connections” list from your laptop while connecting.  Changing the wireless name itself doesn’t offer any protection, but usually discourages a hacker, as they know that you’ve taken some steps to secure your wireless connection. Click on Wireless -> Basic wireless settings -> Change the “Wireless Network Name (SSID):”, as shown in the Fig-2.

3. Disable SSID broadcast

You can avoid your wireless name from getting displayed on “Available Wireless Connections” on all your neighbors laptop. This can be done by instructing the wireless router not to broadcast the name to everybody. Once you’ve disabled the SSID broadcast, the first time when someone wants to connect to your wireless network, you need to provide the name to them. Click on Wireless -> Basic wireless settings -> Click on the Disable radio-button next to “Wireless SSID Broadcast”, as shown in Fig-2.

Disable SSID Broadcast
Fig-2: Change SSID Name and Disable Broadcast

4. Enable MAC filtering

Even after you have performed the above item#1 – #3, a very determined hacker may still get access to your network. The next security step is to allow wireless access only to your trusted laptops, by allowing wireless connection only to known MAC address. MAC (Media Access Control) address is an unique identifier attached to most network adapters. In this case, this should be the unique identifier of your laptop wireless adapter.  On Linux, do ifconfig from the command prompt to get wireless hardware address. On windows, do ipconfig /all from the command prompt to identify the MAC address as shown below.

C:>ipconfig /all
Ethernet adapter Wireless Network Connection:
Connection-specific DNS Suffix  . : socal.rr.com
Description . . . . . . . . . . . : Dell Wireless 1390 WLAN Mini-Card
Physical Address. . . . . . . . . : 00:1A:92:2B:70:B6

Click on Wireless -> Wireless MAC filter -> Click on Enable radio-button next to “Wireless MAC filter” -> Click on “Permit only PCs listed to access the wireless network” radio-button, as shown in Fig-3.

Enable MAC Filter
Fig-3 Enable Wireless MAC Filter



Click on Edit MAC filter list and add the MAC address of your laptop to this list. If you want to allow access to more than one laptop, add the MAC address of all the laptops to this list as shown in Fig-4 and click on “Save Settings”.

Add MAC Address List
Fig-4 Add MAC Address to the list

5. Change password for Web Access

The default password for wireless web access are the same for the specific model of a wireless router assigned by the manufacturer. Change the default password of the wireless router web access to a strong password. Follow The Ultimate Guide For Creating Strong Passwords to choose a strong password. Click on Administration -> Management, to change the password as shown in Fig-5 below.

Disable Wireless Web Access

Fig-5 Change password and disable wireless web access

6. Disable administrative access through web

As a final step, make sure to disable web administrative access through wireless. Once you do this, to make any configuration changes to the wireless router, you can always use ethernet cable connection from your laptop to configure the wireless.  Click on Administration -> Management -> Disable radio-button next to “Wireless Access Web”, as shown in Fig-5 above.
 
If you liked this article, please bookmark it on del.icio.us and Stumble It.

+ نوشته شده توسط وحید قاسمی در چهارشنبه هشتم شهریور ۱۳۹۱ و ساعت 8:57 |

As part of the contest we conducted recently, we got 130 comments from the geeky readers who choose their favorite system monitoring tools.

Based on this data, the top spot goes to..  drum roll please..

Nagios

If you are new to any of the top 5 tools mentioned here, please read the rest of the article to understand more about them.

Top 5 Best Free Network Monitoring Tool

Fig: Favorite System Monitoring Tool Voting Results

1. Nagios – Network Monitoring Software

Nagios System Monitoring Tools for Linux

Nagios won by a huge margin. This is not a suprise to lot of people, as Nagios is hands-down the best monitoring tool.  As you already know, I love Nagios and have been using it for a long time. I have also written several tutorials on Nagios (and many more to come).

Nagios Core 3 eBook is the only guide you’ll ever need to monitor everything, be proactive, and sleep well.

2. Cacti – Network Monitoring Software

Cacti Network Monitoring Tool for Unix

Cacti uses RRDtool for the network graphing solution. Using Caci you can monitor and graph – CPU Load, Network bandwidth utilization, network traffic monitor etc.,

Cacti also supports plugin architecture. Some admins like the powerful graphing feature provided by Cacti, they use both Nagios and Cacti in their environment as the network monitoring tools.

3. Top (and other top variations)

Unix top, ntop command for Network Monitoring

  • Top Command – Few of you have mentioned top command as your favorite monitoring tool :-)
  • ntop (Network Top) – Ntop is a free network monitoring software. ntop displays network usage information in a similar fashion to top command output. You can also create HTML output file (dump) of the network status using ntop.  Apart from the command line, you can also launch the web version of the ntop once you’ve started the ntopd service and visit http://{ip-address}:3000 from browser.
  • htop (interactive process viewer for Linux) – htop is similar to top command with few additional features. The main difference is that you can use mouse to interact with the htop command output.

4. Zabbix

Zabbix Open Source Infrastructure Monitoring Solution for Unix Platforms

Zabbiz is an open source monitoring solution with a commercial support provided by a company – Zabbix SIA, who primarily develops the software.  Zabbix requires a database to store the monitoring data. You can choose any DB of your choice – MySQL, PostgreSQL, Oracle, or SQLite.

Zabbix has the following three main modules:

  • Server (written in C)
  • Agents (written in C)
  • Frontend (PHP and Javascript)

Additional information about Zabbix:

5. Munin

Munin Network Badwidth Monitoring Platform Using Plugins

Similar to Cacti, Munin uses RRDTool to present the output in a pretty graph via web interface. The primary emphasis of Munin is on the plug and play architecture for it’s plugin. There are lot of plugins available for Munin, which will just work out-of-the box without lot of tweaking.

+ نوشته شده توسط وحید قاسمی در چهارشنبه هشتم شهریور ۱۳۹۱ و ساعت 8:54 |

As part of the contest that was conducted a while back, I got around 200 responses from the geeky readers who choose their favorite Linux distributions.

Based on this data, the top spot in the best Linux distribution list goes to…

Ubuntu

My personal favorite was Ubuntu for desktop (#1 in this list) and Red Hat for servers (#5 in this list).

If you are new to any of the distros listed in the top 5, read the rest of the article to understand little bit more about those distros and find out whether your favorite Linux distribution made it in the top 5.

Linux Distro Review

Fig: Favorite Linux Distribution Voting Results

1. Ubuntu

Ubuntu 8.04 LTS Desktop

Like most of you, Ubuntu is my #1 choice for desktop Linux. I use it both at home and work. Ubuntu is the #1 in the Linux desktop market and some use Ubuntu for the servers also. Ubuntu offers the following three editions.

  • Ubuntu Desktop Edition
  • Ubuntu Server Edition
  • Ubuntu Notebook Remix

Additional Details:

Refer to our Ubuntu Tips and Tricks article series.

2. Debian

Debian 4.0r8, or etch

Debian is also called as Debian GNU/Linux, as most of the basic OS tools comes from the GNU Project. Lot of other famous distributions are based on Debian, which includes our #1 distro Ubuntu and many others — such as Knoppix, Linspire, Damn Small Linux etc.,

Additional Details:

Read more about Debian Distribution at wikipedia.

3. Fedora

Fedora 10 Server Edition

Fedora is sponsored by Red Hat. If you are interested in experimenting with the the leading technologies, you should use fedora, as the release cycle is very short and fedora tends to include the latest technology software/packages in it’s distribution.

Additional Details:

Read more about Fedora Distribution at wikipedia.

4. CentOS

CentOS 5 Linux Distro

If your organization does not want to spend money on purchasing Red Hat support, but still want all the benefits of the red-hat distribution, this is obviously the best choice, as this is totally based on the red-hat enterprise Linux.

As you can imagine the Nort American Enterprise Linux vendor mentioned in the quote below is Red Hat.

From the CentOS website: CentOS 2, 3, and 4 are built from publically available open source SRPMS provided by a prominent North American Enterprise Linux vendor. CentOS is designed for people who need an enterprise class OS without the cost or support of the prominent North American Enterprise Linux vendor.

Additional Details:

Read more about CentOS Distribution at wikipedia

5. Red Hat

Linux Red Hat 4 Enterprise Linux for Server

This is my favorite server distribution.  If an organization doesn’t mind spending dollars on purchasing the red-hat support, this is always my #1 recommendation to any organization who runs mission critical applications.

On a side note, one of the reason I like Red Hat Linux for mission critical production application is that Red Hat tends to take some of the new features from Fedora, which is well tested by the community.

Additional Details:

Read more about Red Hat Distribution at wikipedia.

Awesome Linux Articles

Following are few awesome 15 examples articles that you might find helpful.

Note: To get high quality free Linux articles, subscribe to the geek stuff.


+ نوشته شده توسط وحید قاسمی در چهارشنبه هشتم شهریور ۱۳۹۱ و ساعت 8:52 |