Installing Linux Integration Services v2.1 Hyper-V R2 On CentOS 5

When installed on a virtual machine that is running a supported Linux operating system, Linux Integration Services for Hyper-V provides the following functionality: Driver support for synthetic devices: Linux Integration Services supports the synthetic network controller and the synthetic storage controller that were developed specifically for Hyper-V. Fastpath Boot Support for Hyper-V: Boot devices now …

Read more

Hyper-v won’t start if you booted from Secondary disk on soft RAID1

You’re running a Hyper-V on a Server with 2 disks and using Windows Software RAID-1. Your primary disk fails and your windows crashes, but on the reboot you have an option to boot from a secondary “plex” disk. If you choose the secondary disk as it’s your only option to boot now, the boot configuration …

Read more

How To: Find .NET3 and .NET3.5 versions

If you are programming a web application for .NET Framework 3.0 or 3.5 you might be looking for the versions in IIS6 or IIS7. You ask where is ASP.NET3.0 or ASP.NET3.5 versions? The right answer, there is NO ASP.NET3.0 or ASP.NET3.5. There are 4 ASP.NET versions:ASP.NET1.0ASP.NET1.1ASP.NET2.0ASP.NET4.0 There are 6 .NET Framework versions so far:.NET Framework …

Read more

How To: Backup IIS7 ApplicationHost.config and Settings

Internet Information Services 7 (IIS7) doesn’t use metabase-like file from IIS6. Instead the settings and configuration are stored in schema files and applicationHost.config files. Since the configuration files are different, the old IIS6 tools will not be able to backup IIS7 settings. This is the new script that you can use to backup your IIS7 …

Read more

How To: Create a Self-signed SSL Certificate for II6

Self-signed certificate Self-Signed Certificate History (from Wikipedia) In cryptography and computer security, a self-signed certificate is an identity certificate that is signed by its own creator. That is, the person that created the certificate also signed off on its legitimacy. In typical public key infrastructure (PKI) arrangements, that a particular public key certificate is valid …

Read more