Risolvere il NO_PUBKEY 85A3D26506C4AE2A

Se aggiungere il repository Mozilla in debian Testing (mozilla.debian.net) potrebbe capitarvi che durante l'aggiornamento con APT vi appaia un errore tipo:

W: GPG error: http://mozilla.debian.net experimental Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 85A3D26506C4AE2A

Per risolvere questo problema bisogna installare prima il debian-keyring

# apt-get install debian-keyring

dopo eseguire questi 2 comandi:

# gpg --keyserver keys.gnupg.net --recv-key 06C4AE2A

# gpg -a --export 06C4AE2A | apt-key add -

Soluzione PT Activity 3.6.1:Packet Tracer Skills Integration Challenge

La soluzione all'esercizio PT Activity 3.6.1:Packet Tracer Skills Integration Challenge (modulo WAN) realizzata da me. Commenti e suggerimenti sono graditi.



Task 1: Configure PPP with CHAP Between Devices
HQ#config t
HQ(config)#username ISP password cisco
HQ(config)#interface s0/0/1
HQ(config-if)#encapsulation ppp
HQ(config-if)#ppp authentication chap
HQ(config-if)#ip address 209.165.201.2 255.255.255.252
HQ(config-if)#no sh
HQ(config-if)#exit

Task 2: Configure Full Mesh Frame Relay
HQ(config)#interface s0/0/0
HQ(config-if)#ip address 10.0.0.1 255.255.255.248
HQ(config-if)#encapsulation frame-relay
HQ(config-if)#frame-relay map ip 10.0.0.2 102 broadcast
HQ(config-if)#frame-relay map ip 10.0.0.3 103 broadcast
HQ(config-if)#frame-relay map ip 10.0.0.4 104 broadcast ietf
HQ(config-if)#frame-relay lmi-type ansi
HQ(config-if)#no sh

WEST#conf t
WEST(config)#interface s0/0/0
WEST(config-if)#ip address 10.0.0.2 255.255.255.248
WEST(config-if)#encapsulation frame-relay
WEST(config-if)#frame-relay map ip 10.0.0.1 201 broadcast
WEST(config-if)#frame-relay map ip 10.0.0.3 203 broadcast
WEST(config-if)#frame-relay map ip 10.0.0.4 204 broadcast ietf
WEST(config-if)#frame-relay lmi-type ansi
WEST(config-if)#no sh

SOUTH#conf t
SOUTH(config)#interface s0/0/0
SOUTH(config-if)#ip address 10.0.0.3 255.255.255.248
SOUTH(config-if)#encapsulation frame-relay
SOUTH(config-if)#frame-relay map ip 10.0.0.1 301 broadcast
SOUTH(config-if)#frame-relay map ip 10.0.0.2 302 broadcast
SOUTH(config-if)#frame-relay map ip 10.0.0.4 304 broadcast ietf
SOUTH(config-if)#frame-relay lmi-type ansi
SOUTH(config-if)#no sh

EAST#conf t
EAST(config)#interface s0/0/0
EAST(config-if)#ip address 10.0.0.4 255.255.255.248
EAST(config-if)#encapsulation frame-relay ietf
EAST(config-if)#frame-relay map ip 10.0.0.1 401 broadcast cisco
EAST(config-if)#frame-relay map ip 10.0.0.2 402 broadcast cisco
EAST(config-if)#frame-relay map ip 10.0.0.3 403 broadcast cisco
EAST(config-if)#frame-relay lmi-type ansi
EAST(config-if)#no sh

Task 3: Configure Static and Default Routing
HQ#conf t
HQ(config)#ip route 10.1.100.0 255.255.255.0 10.0.0.2
HQ(config)#ip route 10.1.10.0 255.255.255.0 10.0.0.3
HQ(config)#ip route 10.1.20.0 255.255.255.0 10.0.0.3
HQ(config)#ip route 10.1.30.0 255.255.255.0 10.0.0.3
HQ(config)#ip route 10.1.99.0 255.255.255.0 10.0.0.3
HQ(config)#ip route 10.1.200.0 255.255.255.0 10.0.0.4
HQ(config)#ip route 0.0.0.0 0.0.0.0 s0/0/1

WEST#conf t
WEST(config)#ip route 10.1.10.0 255.255.255.0 10.0.0.3
WEST(config)#ip route 10.1.20.0 255.255.255.0 10.0.0.3
WEST(config)#ip route 10.1.30.0 255.255.255.0 10.0.0.3
WEST(config)#ip route 10.1.99.0 255.255.255.0 10.0.0.3
WEST(config)#ip route 10.1.200.0 255.255.255.0 10.0.0.4
WEST(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1

SOUTH#conf t
SOUTH(config)#ip route 10.1.100.0 255.255.255.0 10.0.0.2
SOUTH(config)#ip route 10.1.200.0 255.255.255.0 10.0.0.4
SOUTH(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1

EAST#conf t
EAST(config)#ip route 10.1.100.0 255.255.255.0 10.0.0.2
EAST(config)#ip route 10.1.10.0 255.255.255.0 10.0.0.3
EAST(config)#ip route 10.1.20.0 255.255.255.0 10.0.0.3
EAST(config)#ip route 10.1.30.0 255.255.255.0 10.0.0.3
EAST(config)#ip route 10.1.99.0 255.255.255.0 10.0.0.3
EAST(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1

Task 4: Configure and Test Inter-VLAN Routing
SOUTH#conf t
SOUTH(config)#interface fa0/0
SOUTH(config-if)#no sh
SOUTH(config-if)#exit
SOUTH(config)#interface fa0/0.10
SOUTH(config-subif)#encapsulation dot1Q 10
SOUTH(config-subif)#ip address 10.1.10.1 255.255.255.0
SOUTH(config-subif)#exit
SOUTH(config)#interface fa0/0.20
SOUTH(config-subif)#encapsulation dot1Q 20
SOUTH(config-subif)#ip address 10.1.20.1 255.255.255.0
SOUTH(config-subif)#exit
SOUTH(config)#interface fa0/0.30
SOUTH(config-subif)#encapsulation dot1Q 30
SOUTH(config-subif)#ip address 10.1.30.1 255.255.255.0
SOUTH(config-subif)#exit
SOUTH(config)#interface fa0/0.99
SOUTH(config-subif)#encapsulation dot1Q 99 native
SOUTH(config-subif)#ip address 10.1.99.1 255.255.255.0
SOUTH(config-subif)#exit

Task 5: Configure VTP and Trunking on the Switches
S1#conf t
S1(config)#vtp mode server
S1(config)#vtp domain CCNA
S1(config)#vtp password cisco

S2#conf t
S2(config)#vtp mode client
S2(config)#vtp domain CCNA
S2(config)#vtp password cisco

S3#conf t
S3(config)#vtp mode client
S3(config)#vtp domain CCNA
S3(config)#vtp password cisco

S1(config)#interface fa0/1
S1(config-if)#switchport mode trunk
S1(config-if)#switchport native vlan 99
S1(config-if)#exit

S1(config)#interface fa0/2
S1(config-if)#switchport mode trunk
S1(config-if)#switchport native vlan 99
S1(config-if)#exit

S1(config)#interface fa0/3
S1(config-if)#switchport mode trunk
S1(config-if)#switchport native vlan 99
S1(config-if)#exit

S1(config)#interface fa0/4
S1(config-if)#switchport mode trunk
S1(config-if)#switchport native vlan 99
S1(config-if)#exit

S1(config)#interface fa0/5
S1(config-if)#switchport mode trunk
S1(config-if)#switchport native vlan 99
S1(config-if)#exit

S2(config)#interface fa0/1
S2(config-if)#switchport mode trunk
S2(config-if)#switchport native vlan 99
S2(config-if)#exit

S2(config)#interface fa0/2
S2(config-if)#switchport mode trunk
S2(config-if)#switchport native vlan 99
S2(config-if)#exit

S2(config)#interface fa0/3
S2(config-if)#switchport mode trunk
S2(config-if)#switchport native vlan 99
S2(config-if)#exit

S2(config)#interface fa0/4
S2(config-if)#switchport mode trunk
S2(config-if)#switchport native vlan 99
S2(config-if)#exit

S3(config)#interface fa0/1
S3(config-if)#switchport mode trunk
S3(config-if)#switchport native vlan 99
S3(config-if)#exit

S3(config)#interface fa0/2
S3(config-if)#switchport mode trunk
S3(config-if)#switchport native vlan 99
S3(config-if)#exit

S3(config)#interface fa0/3
S3(config-if)#switchport mode trunk
S3(config-if)#switchport native vlan 99
S3(config-if)#exit

S3(config)#interface fa0/4
S3(config-if)#switchport mode trunk
S3(config-if)#switchport native vlan 99
S3(config-if)#exit

Task 6: Configure VLANs on the Switch
S1#conf t
S1(config)#vlan 10
S1(config-vlan)#name Faculty/Staff
S1(config-vlan)#vlan 20
S1(config-vlan)#name Students
S1(config-vlan)#vlan 30
S1(config-vlan)#name Guest(Default)
S1(config-vlan)#vlan 99
S1(config-vlan)#name Management&Native

Task 7: Configure and Verify VLAN 99
S1(config)#interface vlan 99
S1(config-if)#ip address 10.1.99.11 255.255.255.0
S1(config-if)#exit
S1(config)#ip default-gateway 10.1.99.1

S2(config)#interface vlan 99
S2(config-if)#ip address 10.1.99.12 255.255.255.0
S2(config-if)#exit
S2(config)#ip default-gateway 10.1.99.1

S3(config)#interface vlan 99
S3(config-if)#ip address 10.1.99.13 255.255.255.0
S3(config-if)#exit
S3(config)#ip default-gateway 10.1.99.1

Task 8: Configure S1 as Root for All Spanning Trees
S1(config)#spanning-tree vlan 1,10,20,30,99 priority 4096

Task 9: Assign Ports to VLANS
S2(config-if)#interface range f0/6 – 10
S2(config-if-range)#switchport mode access
S2(config-if-range)#switchport access vlan 10

S2(config-if)#interface range f0/11 – 15
S2(config-if-range)#switchport mode access
S2(config-if-range)#switchport access vlan 20

S2(config-if)#interface range f0/16 – 20
S2(config-if-range)#switchport mode access
S2(config-if-range)#switchport access vlan 30
S2(config-if-range)#exit

S2(config)#interface range f0/21 – 24
S2(config-if-range)#sh
S2(config-if-range)#exit

S2(config)#interface range g1/1 – 2
S2(config-if-range)#sh
S2(config-if-range)#exit

Root Motorola Xoom + ClockWorkMod windows mode

Non sono responsabile di eventuali danni al vostro Tablet. Quindi a vostro rischio e pericolo.

In questa guida vi spiegherò come eseguire il root e installare la clockworkmod.
su motorola xoom.

I requisiti sono:
- Motorola Xoom
- MicroSD
- universal root scaricabile qui.
- Recovery Tiamat RC4 (cwm) scaricabile qui.
- ADB e fastbook abilitati

Installare prima la Java JDK a questo link:

Poi scaricare ed installare la JDK Android a questo link:
java SE > JDK

da premettere che adb e fastbook devono essere nella stessa cartella, quindi se non la trovate copiare il file fastboot.exe (su windows 7 64bit fastbook.exe si trova in C:\Program Files (x86)\Android\android-sdk\tools) nella cartella dove è situato adb (su windows 7 64bit fastbook si trova in C:\Program Files (x86)\Android\android-sdk\platform-tools)

Iniziamo:
collegare il Motorola Xoom a PC con il debug attivo
per attivare il debug, andare su Settings>Applications>Development
e spuntare su USB debugging

Eseguiamo l’unlock del Motorola Xoom
adb reboot bootloader
fastboot oem unlock
fastboot reboot

flashare la recovery:
copiamo il file flash recovery recovery-Tiamat-R4c-100611-1150-cwm.img in C:\Program Files (x86)\Android\android-sdk\platform-tools

adb reboot bootloader
fastboot flash recovery recovery-Tiamat-R4c-100611-1150-cwm.img
fastboot reboot

Al riavvio riconnettete nuovamente lo Xoom al pc e digitate:
adb reboot recovery

Lo Xoom si riavviera’ in modalita recovery CWM e da ora potete flashare la Universal root caricata precedentemente sulla SD.

Per caricare qualsiasi ROM, andare in modalità recovery e poi:
“install zip from sdcard” -> “Choose zip from sdcard”
(ricordatevi di fare un wipe prima di flashare, se richiesto)

Controllare la temperatura del PC

In questo articolo spiegherò come installare lm-sensors e le relative applet per tenere sotto controllo le temperature del vostro pc (hard disk , cpu ecc…).

L’installazione inizia installando lm-sensors:
# apt-get install lm-sensors

fatto ciò procediamo all’installazione degli applet:
# apt-get install sensors-applet

Finita l’installazione del sensors-applet il software rivolgerà delle domande che sono:
start on boot (si/no)
consiglio di selezionare si

Interface to listen on:
127.0.0.1

lasciare così com’è.

Port to listen on:
7634

anche qui lasciare così com’è.

Una volta completata l’installazione di sensors-applet procedere alla configurazione dei sensori:
# sensors-detect

tutte le domande che verranno poste rispondere si (serve per cercare i sensori).
alla domanda:

To load everything that is needed, add this to /etc/modules:

#—-cut here—-
# Chip drivers
coretemp
#—-cut here—-

If you have some drivers built into your kernel, the list above will
contain too many modules. Skip the appropriate ones!

Do you want to add these lines automatically to /etc/modules? (yes/NO)
Consiglio di rispondere YES.

Abbiamo finito. Ora sul pannello superiore di gnome selezionare aggiungi al pannello e dalla lista selezionare Hardware sensors monitor.