05 January, 2013

Differences between Linux and Windows is directory structure

One of the most noticeable differences between Linux and Windows is the directory structure. Not only is the format different, but the logic of where to find things is different.

Introduction
In Windows, you use this format to access a directory D:\Folder\subfolder\file.txt
In Linux, this is the basic format /Folder/subfolder/file.txt

You'll notice that the slashes are forward slashes in Linux versus backslashes in Windows. Also, there is no drive name (C:, D:, etc.) in Linux.
At boot, the ‘root partition' is mounted at /. All files, folders, devices and drives are mounted under /. Though it is not apparent from this example, it is important to note that files and folders in Linux are case sensitive.
/Folder/subfolder/file.txt is not the same as /folder/subfolder/file.txt.

Linux Directory Structure Overview

The Directory Structure in Unix & Linux are a unified Directory Structure where in all the directories are unified under the "/" Root file system. Irrespective of where the File System is physically mounted all the directories are arranged hierarchically under the Root file system.

The Linux Directory Structure follows the "Filesystem Hierarchy Structure (FHS)" maintained by the Free Standards Group although most of the distributions sometimes tend to deviate from the standards.
Let’s have a quick stroll across the different directories under the Linux Filesystem Hierarchy Structure.

"/" Root
The Directory Structure starts with the Root file system "/" and is indeed the root directory for the whole structure.The partition where / (the root directory) will be located on a UNIX or UNIX-compatible system.

/boot
The /boot directory contains the Boot loader files including Grub or Lilo, the Kernel, initrd and system.map config files

/sys
This contains the Kernel, Firmware and system related files.

/sbin
Contains the essential System Binaries and System Administration tools essential for the system operation and performance.

/bin
Contains the essential binaries for users and those utilities that are required in single user mode. examples, include cat, ls, cp etc.

/lib
Contains the library files for all the binaries held in the /sbin & /bin directories.

/dev
The /dev directory contains the essential system files and drivers.

/etc
The /etc/directory contain essential System configuration files including /etc/hosts, /etc/resolv.conf, nsswitch.conf, defaults and network configuration files. These are mostly host specific system and application configuration files.

/home
All the user home directories are held under this directory with the exception of the root home directory which is kept under /root directory. This directory holds users files, personal settings like .profile etc.

/media
A generic mount point for removable media like CD-ROM, USB, Floppies etc.

/mnt
A generic mount point for temporary file systems. This comes handy particularly when troubleshooting from CDROM etc. wherein you might have to mount the Root file system and edit configurations.

/opt
A rarely used directory in Linux for Optional Software Packages. This is extensively used in UNIX OS like Sun Solaris where the software packages are installed.

/usr
A sub hierarchy to the root file system which is a User data directory. This contains user specific utilities and applications. You will again see a lot of important but not critical file systems are mounted. Here you would again find a bin, sbin & lib directory which contains non-critical user and system binaries and related libraries and a share directory. Also found here are the include directory with include files.

/usr/sbin
Contains Non-essential Non-critical system binaries and network utilities.

/usr/bin
Contains Non-Essential Non-critical command binaries for users.

/usr/lib
Library files for the binaries in /usr/bin & /usr/sbin directory.

/usr/share
A platform-independent shared data directory.

/usr/local
A sub hierarchy under the /usr directory which has Local System specific data including user and system binaries and their libraries.

/var
The /var directory is mostly mounted as a separate filesystem under the root where in all the variable content like logs, spool files for printers, crontab,at jobs, mail, running process, lock files etc. Care has to be taken in planning this file system and maintenance as this can fill up pretty quickly and when the FileSystem is full can cause system and application operational issues.

/tmp
A temporary file system which hold temporary files which are cleared at system reboot. There is also a /var/tmp directory which holds temporary files too. The only difference between the two is that /var/tmp directory holds files that are protected at system reboot. In other words, /var/tmp files are not flushed upon a reboot.
Then you have the virtual (psuedo) file system /proc which reside in the memory and is mounted under the Root holding kernel and process stats in text file formats.

04 January, 2013

Configuring Facebook Authentication in SharePoint 2010

Hi Guys ,

One of the most used login is Facebook . Nowadays almost everyone has a facebook account. So was checking if it possible to use the same as Authentication for the SharePoint site.

I have not yet tried this at my end Due to some Limitations However found this Step by Step Instructions very interesting and Helpful .

http://ovaismehboob.wordpress.com/2011/09/07/configuring-facebook-authentication-in-sharepoint-2010

 Thanks Ovais Mehboob .

Office Web apps Overview

Some important feature included in SharePoint 2010.

Microsoft Office Web Apps is the online companion to Office Word, Excel, PowerPoint and OneNote applications that enables users regardless of their location to access documents and edit documents. Users can view, share, and work on documents with others online across personal computers, mobile phones, and the Web. Office Web Apps is available to users through Windows Live and to business customers with Microsoft Office 2010 volume licensing and document management solutions based on Microsoft SharePoint 2010 Products.

Office Web Apps is tightly integrated with SharePoint 2010 Products. When you install Office Web Apps, the Office Web Apps Services are added to the list of SharePoint Services and the Office Web Apps Feature is added to the available SharePoint Features.

Office Web Apps services include the Word Viewing Service, PowerPoint Service, and Excel Calculation Services that are created and run within the context of SharePoint Services.

The Office Web Apps Feature and services integrate with SharePoint's robust enterprise content management capabilities to provide users the ability to access and work on your organization's documents from anywhere using a Web browser.

For More Detailed Information check the Below link .

http://technet.microsoft.com/en-us/library/ff431685(v=office.14).aspx

Resource Throttling in SharePoint 2010

A new feature in SharePoint Server 2010, resource throttling provides options for monitoring and throttling server resources and large lists for Web applications. This enables you to control resource utilization during peak usage and prevent user activity from negatively affecting server performance.

To enable resource throttling:
  1. On the General Settings Ribbon, select Resource Throttling.
  2. Enter values for the List View Threshold option. This limits queries within a list to guard against performance degradation with too many list items. In SharePoint Server 2010, a list can support up to 50 million items. Two thousand items in a view is the accepted performance limit in SharePoint Server 2010.If a list contains a large number of items, queries with too many results will be very slow. If a user attempts an action that would reach a throttle limit, a message appears listing alternative methods that will not affect performance.
  3. Allow or disallow object model override. This allows users with the appropriate permissions to programmatically override the List View Threshold setting for specific queries.
  4. Set the List View Threshold for auditors and administrators.
  5. Define the List View Lookup Threshold. The default of 8 generally works in new implementations. List view lookups can often go beyond six fields. In this event, you need to increase the limit.
  6. Define the List Unique Permission Threshold. This option is rarely changed.
  7. Turn Backward-Compatible Event Handlers on or off. By default, this is off. If you have a large amount of development work in SharePoint Server 2007 that leveraged event handlers for lists or libraries, you will want to turn this on. You should check with your developers if you are upgrading from SharePoint Server 2007.
  8. Configure HTTP Request Monitoring And Throttling. This changes the setting in IIS for all Web servers in the farm for this Web application.
  9. Define the Change Log constraints. Be careful not to reduce this too much because it will negatively affect servers that rely on history information for sites contained in the Web application.
  10. Click OK.
http://technet.microsoft.com/en-us/magazine/gg491393.aspx

Enable Anonymous Access in SharePoint 2010

 Its not difficult to configure anonymous access in MS SharePoint 2010. Not much different then SharePoint 2007 set up, the only difference is the GUI or the Ribbon.

1. Open the Central Administration, under Application Management, click on the Manage web applications .

 2. Select the site you want to enable anonymous access on and click on the Authentication Providers icon.

3. On the Authentication Providers pop-up window click on the Default zone.

4. Under Edit Authentication, check Enable anonymous access and click Save.

5. Going back to Web Application Management click on the Anonymous Policy icon.

6. Under Anonymous Access Restrictions select your Zone and set the Permissions to None – No policy and click Save

7. Now, web application will allow anonymous access to be set.

 After Which , navigate to your top level site collection for the web application.

Click the Site Actions > Site Settings. Under Users and Permissions click Site permissions

8. Under Permission Tools, Click Anonymous Access icon and set the permissions to Entire Web site and click OK

That’s all, If you followed these steps properly you should have now Anonymous Access enabled.