Skip to main content

Posts

Recover Data from Drive with Not initialized Disk Error

Having an Internal or External Hard Disk that you were using without any problem, but suddenly it is giving error that the disk is not initialized! In this situation you can not see any disk Drive in My Computer, but when you go to the Windows Disk Management utility, it is shown there with message “ You must initialize a Disk before Logical Disk Manager can access it “. I started getting this message on my 500 GB external Hard drive since it fell down the ground. I tried many data recovery software, but no recovery software was able to communicate with the faulty drive as the disk starts communication with the PC once it is initialized. Googling this initializing problem, i found it works some times but sometimes it even worsen the case. So i was not taking that risk and continued googling found a Magic Solution for my issue, the software called Partition Find and Mount What this tool does, Scans for the drive and the mounts it as a Normal Drive, and open Windows Explorer… After you ...

SCCM Error – The Microsoft Software License Terms have not been completely downloaded and cannot be accepted

This error message has been captured from the Log wsyncmgr.log in System Center Configuration Manage 2012 SP-01 installed on Windows Server 2012.The error occured while synchronizing updates from Microsoft, and the solution I found was to change some settings in Software Update Point, so compare your SCCM Settings as follows and try to sync updates once again. Set the proxy Server settings Correctly in Internet Explorer. Go to SCCM Site System properties (Administration >Site and Site System Roles> Site System) Check “Use a proxy server when synchronizing internet sourced information”. Leave “Use Credentials to connect to the proxy server” blank.

What is Localhost Loopback and 127.0.0.0

LocalHost Localhost is the standard hostname given to the address of the loopback network interface (usually 127.0.0.1). Simply LocalHost means this computer, the computer on which you are working.Localhost as a hostname translates to an IPv4 address in the 127.0.0.0/8 (loopback), usually 127.0.0.1, or ::1 in IPv6. LoopBack Loopback (loop-back) describes ways of routing electronic signals, digital data streams, or flows of items from their originating facility back to the source without intentional processing or modification. This is primarily a means of testing the transmission or transportation infrastructure. In TCP/IP a loopback device is a virtual network interface implemented in software only and not connected to any hardware, but which is fully integrated into the computer system’s internal network infrastructure. Any traffic that a computer program sends to the loopback interface is immediately received on the same interface. Correspondingly, the Internet Protocol (IP) specifi...

Best Practices for VLAN Design

Following these General Best practices when implementing VLANs can help to design and implement VLANs in a simple, secure and less troubleshooting-requiring Campus Network. For the Local VLANs model, it is usually recommended to have only one to three VLANs per access module and limit those VLANs to a couple of access switches and the distribution switches. Avoid using VLAN 1 as the “blackhole” for all unused ports. Use any other VLAN except 1 to assign all the unused ports to it. Try to always have separate voice VLANs, data VLANs, management VLANs, native VLANs, blackhole VLANs, and default VLANs (VLAN 1). In the local VLANs model, avoid VTP; it is feasible to use manually allowed VLANs in a network on trunks. For trunk ports, turn off DTP and configure it manually. Use IEEE 802.1Q rather than ISL because it has better support for QoS and is a standard protocol. Manually configure access ports that are not specifically intended for a trunk link. Prevent all data traffic from ...

Different Types of Spanning Tree Protocols, Defined Briefly

802.1D and its successor protocols provide loop resolution by managing the physical paths to given network segments. STP enables physical path redundancy while preventing the undesirable effects of active loops in the network. The first STP, called the DEC STP, was invented in 1985 by Radia Perlman at the Digital Equipment Corporation. In 1990, the IEEE published the first standard for the protocol as 802.1D based on the algorithm designed by Perlman. Subsequent versions were published in 1998 and 2004 incorporating various extensions.There are several varieties of STP: Common Spanning Tree (CST)  assumes one 802.1D spanning-tree instance for the entire bridged network, regardless of the number of VLANs. Because there is only one instance, the CPU and memory requirements for this version are lower than the others. However, because there is only one instance, there is only one root bridge and one tree. This means that traffic for a...

What is Secure Shell (SSH) and how to configure SSH in Cisco Devices

What is Secure Shell (SSH) Secure Shell is a protocol that can be used in the place of well known Telnet protocol to remotely connect to your Cisco Router or Switch. Telnet has long been used to manage network devices; however, Telnet traffic is sent in clear text. Anyone able to sniff that traffic would see your password and any other information sent during the Telnet session. Secure Shell (SSH) is a much more secure way to manage your routers and switches. It is a client/server protocol that encrypts the traffic in and out through the vty ports. Cisco routers and switches can act as SSH clients by default, but must be configured to be SSH servers. That is, they can use SSH when connecting to another device, but require configuration before allowing devices to connect via SSH to them. They also require some method of authenticating the client. This can be either a local username and password, or authentication with a AAA server (AAA is detailed in the next section). There ar...

%Port 443 is being used by system

Got stuck with this error on Cisco Cloud Services Router, CSR Version 03.16.04a.S. When configuring static NAT rule as per below CSR(config)#ip nat inside source static tcp 10.0.1.21 443 interface GigabitEthernet1 443 %Port 443 is being used by system Found some Work around while Googling and also a Cisco Bug with same error in Cisco Advanced Services Router. But nothing worked for me. Here is how i resolved the issue by my self disable the ip http secure service on router by following command CSR(Config)#no ip http secure-server Save Configurations and Reload the router After successful reload, enter you static NAT rule.