Search results for How to Perform System Boot and Shutdown Procedures for Solaris 10
 |
|
Post date: February 6, 2006, 07:02
Category: System
Views: 12072
Comments
|
Tutorial quote: System startup requires an understanding of the hardware and the operating system functions that are required to bring the system to a running state. This chapter discusses the operations that the system must perform from the time you power on the system until you receive a system logon prompt. In addition, it covers the steps required to properly shut down a system. After reading this chapter, you’ll understand how to boot the system from the OpenBoot programmable read-only memory (PROM) and what operations must take place to start up the kernel and Unix system processes. |
 |
|
Post date: September 28, 2008, 17:09
Category: System
Views: 4242
Comments
|
Tutorial quote: The Linux Kernel offers you something that allows you to recover your system from a crash or at the least lets you to perform a proper shutdown using the Magic SysRq Keys. The magic SysRq key is a select key combination in the Linux kernel which allows the user to perform various low level commands regardless of the system’s state using the SysRq key. It is often used to recover from freezes, or to reboot a computer without corrupting the filesystem. |
 |
|
Post date: March 16, 2010, 12:03
Category: System
Views: 11470
Comments
|
Tutorial quote: Under the Solaris 10 system – or the open Solaris as well, the service management have been upgraded, and there are great new tools to handle the sysadmin work on the services. |
 |
|
Post date: October 21, 2006, 04:10
Category: Security
Views: 7053
Comments
|
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.
|
 |
|
Post date: October 21, 2006, 04:10
Category: Security
Views: 7593
Comments
|
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.
|
 |
|
Post date: January 26, 2007, 06:01
Category: Software
Views: 9961
Comments
|
Tutorial quote: The strategy is to utilize as much of the Open Source and other free software bundled with Solaris 10 as possible and integrate Apache2, MySQL, PHP and SSL in a environment that can take full advantage of Solaris 10 zones, resource management and highly scaleable, secure System Administration. |
 |
|
Post date: April 13, 2005, 05:04
Category: Miscellaneous
Views: 4897
Comments
|
Tutorial quote: Solaris will exercise everything on a PC. I have seen machines run just fine with Windows for months and crash during a Solaris x86 install. The reason was always marginal parts/specs/timings/temperatures that were never pushed to the failure limits until Solaris x86 was installed. |
 |
|
Post date: April 12, 2005, 07:04
Category: Benchmarks
Views: 3777
Comments
|
Tutorial quote: I recently purchased a Western Digital 250GB/8M/7200RPM drive and wondered which journaling file system I should use. I currently use ext2 on my other, smaller hard drives. Upon reboot or unclean shutdown, e2fsck takes a while on drives only 40 and 60 gigabytes. Therefore I knew using a journaling file system would be my best bet. The question is: which is the best? In order to determine this I used common operations that Linux users may perform on a regular basis instead of using benchmark tools such as Bonnie or Iozone. I wanted a "real life" benchmark analysis. A quick analogy: Just because the Ethernet-Over-Power-Lines may advertise 10mbps (1.25MB/s), in real world tests, peak speed is only 5mbps (625KB/s). This is why I chose to run my own tests versus using hard drive benchmarking tools. |
 |
|
Post date: April 28, 2005, 02:04
Category: Security
Views: 5418
Comments
|
Tutorial quote: The "two man rule" (also sometimes called the "four eyes rule") has its origins in military protocol although for quite some time it has been welcomed into the stockpile of IT security controls used by organizations around the world. The "two man rule" specifies that there must be two individuals that must act in concert in order to perform some action. |
 |
|
Post date: April 1, 2006, 05:04
Category: Installing
Views: 3406
Comments
|
Tutorial quote: This tutorial was written to help set up a dual boot on a SATA drive but it will also work for PATA so continue forward and I will let you know if you need to skip something. In order to have a fully functional dual boot system it is preferred that Windows be loaded first. After that you can load Linux and easily dump the boot configuration on Windows NTLDR file (comparable to Linux boot file). |
|
|