Wednesday, May 20, 2026

كتابة الابحاث

ملاحظات أساسية عند كتابة الأبحاث
1- ظبط حجم الخط 14 Simplified Arabic بالنسبة للكتابة العربي و Times new Roman في الكتابة الانجليزي.
2- المسافات بين الخطوط 1 في العربي على الخط اللي عملناه و1.5 في الانجليزي.
3- العناوين بتكون 16 Bold والعناوين الفرعية 14 Bold  وممكن نستخدم Underline لو في اكتر من عنوان فرعي.
4- العربي لازم الصفحة تكون Right to Left والانجليزي Left to right 
5- هنعمل Justify  للفقرات عشان يبقى في محاذاة من الاطراف.
6- لو عايز تعمل مسافة قبل كل فقرة ممكن تضغط Tab قبل كل فقرة بس تلتزم بيها في في كل البحث.
7- هنسيب مقاس الورقة A4 والهوامش على الوضع الافتراضي لحد ما نخلص والكلية بتحدد الشكل النهائي للرسالة وسهل تغيرها بعد كده، والأشهر انك بتسيب ٤ سم في الأعلي و٣ سم في الأسفل و٣.٥ سم في جانب التجليد (يمين للبحوث العربية ويسار للبحوث الاجنبيه) و٢.٥ في الجانب الأخر. 
8- نخلي بالنا من المسافات الزيادة في ناس ايديها فرطة في المسافات بتعمل مسافات ملهاش لازمة.
9- علامات الترقيم كلها لازم تبقى لازقة في اخر كلمة مفيش قبلها مسافة والمسافة بتكون بعدها.
10- الأقواس في مسافة قبلها واللي جوة القوس لازق في الكلام زي كده (مثال).
11- النقطة في اخر الفقرة بتكون لازقة في اخر كلمة مفيش مسافة قبلها.
12- المراجع اسهل حاجة انك تعمل ALT+CTRL+F وبتنزل من غير أقواس وبتكون متسلسلة تلقائي يعني لو رحلت في صفحة تانية بتاخد رقم 1 عادي.
13- متحطش الأقواس بتاعة المراجع بايدك بعد ما بتخلص في برامج أو اكواد بتحطها كلها مرة واحدة وتظبط تنسيقها.
14- الجداول مبتتحركش بالماوس عشان بتبوظ كفاية سطر فاضي قبليها وسطر فاضي بعديها وممكن نتحكم في حجم المسافة عادي.
15- نخلي بالنا من الهمزات الكلمة اللي انت عارف انها بهمزة اعملها لو مش عارف ممكن تشوفها على جوجل واهم حاجة تكتبها في كل البحث بنفس الطريقة عشان لو هتراجع بعد كده ممكن تتعدل الكلمة في البحث كله مرة واحدة.
16- لو هتحط صور اعملها فراغ كام سطر كده على حسب مقاسها وخليها In front of text هتقدر تتحكم فيها وتحطها في المكان اللي انت عايزه.
17- لو في رسومات بيانية Charts هتتعمل في الاكسيل وبعدين ننقلها في الورد ده اسهل.
بالتوفيق للجميع

Tuesday, April 14, 2026

Configure cisco air-cap3602i-a-k9 Access Point

 

To configure your Aironet 3602i from scratch, we will wipe any existing settings and build the Bridge-Group Virtual Interface (BVI) architecture.

In this scenario:

  • VLAN 1 (Native): Management (AP gets its IP here).

  • VLAN 10: User Traffic (SSID: Private_Net).

  • Hidden SSID: We will use the guest-mode command (or rather, the absence of it) to hide the SSID.


Phase 1: Global Setup & Security

Enter configuration mode and define the encryption for the user VLAN.

Code snippet
enable
configure terminal

# Enable password encryption and basic security
service password-encryption
hostname AP-3602

# Define the SSID
dot11 ssid Private_Net
   vlan 10
   authentication open 
   authentication key-management wpa version 2
   wpa-psk ascii 0 YourSecretKey123
   # Do NOT enter 'guest-mode' here; this keeps the SSID hidden

Phase 2: Wired Interface (GigabitEthernet0)

We must split the physical Ethernet port into sub-interfaces that match the switch's trunk tags.

Code snippet
# Management / Native VLAN
interface GigabitEthernet0.1
 encapsulation dot1Q 1 native
 bridge-group 1

# User Data VLAN
interface GigabitEthernet0.10
 encapsulation dot1Q 10
 bridge-group 10
 exit

Phase 3: Radio Interfaces (Dot11Radio)

You must apply the configuration to both the 2.4GHz (Radio0) and 5GHz (Radio1) radios for full coverage.

Code snippet
# --- 2.4GHz Radio Configuration ---
interface Dot11Radio0
 encryption vlan 10 mode ciphers aes-ccm
 ssid Private_Net
 no shutdown

interface Dot11Radio0.1
 encapsulation dot1Q 1 native
 bridge-group 1

interface Dot11Radio0.10
 encapsulation dot1Q 10
 bridge-group 10

# --- 5GHz Radio Configuration ---
interface Dot11Radio1
 encryption vlan 10 mode ciphers aes-ccm
 ssid Private_Net
 no shutdown

interface Dot11Radio1.1
 encapsulation dot1Q 1 native
 bridge-group 1

interface Dot11Radio1.10
 encapsulation dot1Q 10
 bridge-group 10
 exit

Phase 4: Management IP & Gateway

This is where you assign the static identity to the AP. The IP lives on BVI1, which links to Bridge-group 1.

Code snippet
interface BVI1
 ip address 192.168.1.50 255.255.255.0
 no shutdown
 exit

# Set gateway so you can manage it from other subnets
ip default-gateway 192.168.1.1

Phase 5: Finalizing

Verify that the SSIDs are active and save your work.

Code snippet
# Check that the SSID is up (it should not show 'G' for Guest/Broadcast)
show dot11 bssid

# Save the config
write memory

Important Checklist

  1. Switch Side: Ensure your switchport is configured as:

    • switchport mode trunk

    • switchport trunk native vlan 1

  2. Hidden SSID Note: Since the SSID is hidden, you will need to manually type "Private_Net" into your devices to connect the first time.

  3. WPA Settings: Ensure you used encryption vlan 10 mode ciphers aes-ccm on the physical radio interfaces, or the WPA2 handshake will fail.

Sunday, February 22, 2026

switch password recovery

 

To remove the admin password on a
Cisco Catalyst 3850, boot the switch into recovery mode by holding the Mode button for 12 seconds until the LED turns amber. Then, use the SWITCH_IGNORE_STARTUP_CFG=1 command in the switch: prompt to bypass the configuration, allowing you to reconfigure the password without losing existing settings.
Step-by-Step Password Recovery Process:
  1. Connect to Console: Connect your computer to the switch console port.
  2. Power Cycle & Mode Button: Unplug the power, then plug it back in while holding the Mode button on the front panel.
  3. Enter ROMMON: Keep holding for 10-15 seconds until the status LED turns amber and you see the switch: prompt.
  4. Initialize Flash: Type flash_init and press Enter.
  5. Ignore Config: Type SWITCH_IGNORE_STARTUP_CFG=1 and press Enter.
  6. Boot System: Type boot and press Enter.
  7. Enter Privilege Mode: Once booted (skipping config), type enable to enter privileged EXEC mode.
  8. Load Configuration: Rename the old config to make it the running config: copy flash:config.text system:running-config.
  9. Change Password: Enter global configuration mode (conf t) and set a new password: username [name] privilege 15 secret [new_password].
  10. Disable Ignore Flag: Disable the ignore startup config setting: no switch: SWITCH_IGNORE_STARTUP_CFG=1 or conf t, system ignore startupconfig.
  11. Save Configuration: Save the new configuration with write memory.

Thursday, October 2, 2025

Fiber cable colours

هل تساءلت يومًا كيف يميز الفنيون والمهندسون بين مئات شعيرات الفايبر الدقيقة داخل كابل واحد؟ السر يكمن في نظام دقيق وموحد عالميًا يُعرف بـ "كود الألوان" (Color Code) وفقًا للمعيار (TIA-598).
​هذا النظام هو أساس الدقة في أعمال التركيب، اللحام، والصيانة، وتجاهله يعني حدوث أخطاء فادحة في الشبكة.
​أولًا: كود ألوان الشعيرات (Fibers):
يتم ترتيب أول 12 شعيرة داخل كل أنبوب (Tube) بالترتيب التالي:
​🔵 أزرق (Blue)
​🟠 برتقالي (Orange)
​🟢 أخضر (Green)
​🟤 بني (Brown)
​⚪ رمادي (Slate)
​⚪ أبيض (White)
​🔴 أحمر (Red)
​⚫ أسود (Black)
​🟡 أصفر (Yellow)
​🟣 بنفسجي (Violet)
​🌸 وردي (Rose)
​💧 سماوي (Aqua)
​ثانيًا: كود ألوان الأنابيب (Buffer Tubes):
عندما يحتوي الكابل على أكثر من 12 شعيرة، يتم تجميعها في أنابيب (Tubes). هذه الأنابيب تتبع نفس كود الألوان السابق لسهولة التمييز بين المجموعات.
​ثالثًا: كود ألوان الغلاف الخارجي للكابل (Cable Jacket):
لون الغلاف الخارجي للكابل يساعد في تحديد نوع الفايبر المستخدم:
​أصفر 🟡: كابلات Single-Mode (SMF).
​برتقالي 🟠: كابلات Multi-Mode (MMF) من نوع OM1 و OM2.
​سماوي/تركواز 💧: كابلات Multi-Mode (MMF) من نوع OM3 و OM4.
​أسود ⚫: غالبًا للكابلات الخارجية (Outdoor) لمقاومتها لأشعة الشمس والعوامل الجوية.
​الدقة في التفاصيل هي ما يميز الشبكة الناجحة. في NSP، نعتمد على أعلى معايير الجودة والدقة في كل مشاريعنا.
فية سؤال هنا سمعت عن الكود الفرنسي 
​#NSP_Egypt #FiberOptics #ColorCode #Telecommunications #Networking #Technology
#فايبر_اوبتكس #الياف_ضوئية #هندسة_اتصالات #شبكات

Wednesday, August 27, 2025

MS-SQL CPU limit

 ALTER RESOURCE GOVERNOR RECONFIGURE;

CREATE RESOURCE POOL pMAX_CPU_65
WITH (MAX_CPU_PERCENT = 65);
GO


CREATE WORKLOAD GROUP gMAX_CPU_65
USING pMAX_CPU_65;
GO


CREATE FUNCTION dbo.ClassifierFunction() RETURNS sysname
WITH SCHEMABINDING
AS
BEGIN
    DECLARE @workload_group_name AS sysname;
    IF (SUSER_NAME() = 'Permanent')
        SET @workload_group_name = 'gMAX_CPU_65';
    ELSE
        SET @workload_group_name = 'default';
    RETURN @workload_group_name;
END;
GO

Wednesday, June 25, 2025

GPO Folder redirection

 

Configure Folder Redirection using Group Policy

Folder Redirection allows administrators to redirect folder paths to a new location, either locally or on a network share. Using Group Policy, you can configure these locations under Windows Settings in the Group Policy Management Console (GPMC). The path is <Group Policy Object Name>\User Configuration\Policies\Windows Settings\Folder Redirection.

To learn more about Folder Redirection, see Folder Redirection, Offline Files, and Roaming User Profiles overview.

Which folders can you redirect?

You can use the GPMC to redirect the following folders:

  • AppData/Roaming

  • Contacts

  • Desktop

  • Documents

  • Downloads

  • Favorites

  • Links

  • Music

  • Pictures

  • Saved Games

  • Searches

  • Start Menu

  • Videos

Types of Folder Redirection

You can configure Folder Redirection to either redirect all users' folders to a single location or assign different locations based on users' security group memberships. The following table summarizes the types of folder redirection.

You can choose between the following settings:

  • Basic—Redirect everyone's folder to the same location. This setting enables you to redirect everyone's folder to the same location and is applied to all users included in the Group Policy Object. For this setting, you have the following options in specifying a target folder location:

    • Create a folder for each user under the root path. This option creates a folder in the form \\server\share\User Account Name\Folder Name. Each user has a unique path for their redirected folder.
  • Redirect to the following location. This option uses an explicit path for the redirection location. If an explicit path is used, it can cause multiple users to share the same path for the redirected folder. Consider using environment variables in the path to create a unique path for each user.

  • Redirect to the local user profile location. This option moves the location of the folder to the local user profile under the Users folder.

  • Advanced—Specify locations for various user groups. This setting enables you to specify redirection behavior for the folder based on the security group memberships for the GPO.

  • Not configured. This option is the default setting. This setting specifies that policy-based folder redirection was removed for that GPO. All folders are redirected to the local user profile location or remain where they're based on the redirection options selected. No changes are made to the current folder location.

Prerequisites for Folder Redirection

To configure Folder Redirection using Group Policy, you must meet the following prerequisites:

  • An Active Directory Domain Services (AD DS) domain, with client computers joined to the domain. There are no forest or domain functional-level requirements or schema requirements.

  • Permission in AD DS to create and link Group Policy Objects (GPOs) in the domain or organizational unit (OU) where the users are located.

  • Client computers running Windows or Windows Server.

  • A computer with the Group Policy Management Console installed.

Configuring Folder Redirection

To configure Folder Redirection using Group Policy, follow these steps:

  1. Select the Start button, type Group Policy Management, open Group Policy Management from the best match list.

  2. In the console tree, expand the domain or organizational unit (OU) where you want to create or edit the GPO.

  3. Perform one of the following actions:

    1. To create a new Group Policy Object (GPO) that specifies which users should perform background synchronization on metered networks, right-click the appropriate domain or organizational unit (OU), and then select Create a GPO in this domain, and link it here.

    OR

    1. To edit an existing GPO that specifies which users should perform background synchronization on metered networks, right-click the appropriate GPO, and then select Edit.
  4. In the Group Policy Management Editor policy navigation tree, expand User Configuration > Policies > Windows Settings > Folder Redirection.

  5. Right-click the folder you want to redirect, and then select Properties.

  6. On the Target tab, select the option that you want to use for the redirection target.

  7. Select the target location for the folder redirection, as described in Types of Folder Redirection.

  8. If necessary, enter the path for the target location. The path can be a local folder or a network share. The path must be in the form \\server\share\FolderName.

  9. Select OK to save the settings.

  10. Repeat the steps for each folder that you want to redirect.

To force the GPO to be applied, run the 'gpupdate /force' command on the client computers or wait for the next Group Policy refresh interval.

Configuring other settings for the redirected folder

In the Settings tab in the Properties box for a folder, you can enable the following settings.

  • Grant the user exclusive rights. This setting is enabled by default and is a recommended setting. This setting specifies that the administrator and other users don't have permissions to access this folder.

  • Move the contents of <FolderName> to the new location. This setting moves all the data the user has in the local folder to the shared folder on the network.

    Caution

    Moving all data can take a large amount of time, depending on the speed of the connection and volume of data. The time to move all data could be significant if both locations are remote. You might also notice a delay when pinning and unpinning files in remote locations, as the file needs to sync between the cache and the file share.

  • Policy Removal. The following table summarizes the behavior of redirected folders and their contents when the GPO no longer applies, based on your selections for policy removal. The following policy removal options are available in the Settings tab, under Policy Removal.

Policy removal option Selected setting Result
Redirect the folder back to the user profile location when policy is removed1 Enabled - The folder returns to its user profile location.
- The contents are copied, not moved, back to the user profile location.
- The contents aren't deleted from the redirected location.
- The user continues to have access to the contents, but only on the local computer.
Leave the folder in the new location when policy is removed Enabled - The folder remains at its redirected location.
- The contents remain at the redirected location.
- The user continues to have access to the contents at the redirected folder.

1 Moving all data back to the user profile can take a large amount of time, depending on the speed of the connection and volume of data. The time to move all data could be significant if both locations are remote. You might also notice a delay when pinning and unpinning files in remote locations, as the file needs to sync between the cache and the file share.

You can also use the GPMC to configure the following Folder Redirection policy settings:

  • Use localized subfolder names when redirecting Start and My Documents. This policy is located in the following paths: Computer Configuration\Policies\Administrative Templates\System\Folder Redirection, or User Configuration\Policies\Administrative Templates\System\Folder Redirection.

  • Do not automatically make redirected folders available offline. This policy is located in the following path: User Configuration\Policies\Administrative Templates\System\Folder Redirection.

Specify the location of folders in a user profile

You can use Group Policy to specify another location (in other words, "redirect" the location) for folders within user profiles. You can redirect folders either to one location for everyone or to different locations based on the security group membership of users. You can also configure other settings for the redirected folder. The settings that you can configure include:

  • Granting exclusive user rights to the folder.
  • Moving the contents of the folder to the new location.
  • Applying redirection policy to earlier Windows operating systems.
  • Specifying system behavior if the policy is removed.

 

Source:

 https://learn.microsoft.com/en-us/windows-server/storage/folder-redirection/folder-redirection-using-group-policy 

--------------------------

 

ISSUE:

VERDE offers built-in document redirection functionality in the virtual desktop (guest), by default the Windows "Document" folder will automatically be redirected to the virtual desktop D: drive. Some customers may need to redirect the Windows “Documents” to a shared network drive. The information below gives Windows administrators information on how to proceed.

 

SOLUTION:

1. Set the NTFS permissions

Create the folder in the desired location (i.e. X:\usershare)

From the new folder properties, disable inheritance of permissions from the parent and remove all inherited permissions by clicking the appropriate button.

One entry will already be in the DACL: Local Administrators.

  1. Alter Local Administrators: Full Control: This folder, subfolders and files.
  2. Alter or Add SYSTEM: Full Control: This folder, subfolder and files.
  3. Alter or Add CREATOR OWNER: Full Control: This folder, subfolders and files.
  4. Add Authenticated Users: List folder / read data, Create folders / append data: This folder only.
  5. Add Domain Admins: Full Control: This folder, subfolders and files.
  6. Click OK.

These permissions enable users to create their redirected folder in the root folder, but restrict the ability to browse the contents of other folders. Best practice dictates that you should allow the redirected folder locations to create themselves as users log on.

 

2. Create the share and add share permissions

Share the root folder created earlier as \\SERVER\usershare (or if you want to hide it, \\SERVER\usershare$\)

Adjust the share permissions as follows:

  1. Remove Everyone.
  2. Grant Authenticated Users Full Control.
  3. Grant Domain Admins Full Control (Not necessary but useful for completeness).

3. Configure the Group Policy Object (GPO)

  1. Open the Group Policy Manager.
  2. Create a new GPO or edit an existing one.
  3. Open User Configuration > Policies > Windows Settings > Folder Redirection.
  4. Right-click Documents and click Properties.
  5. Choose Basic - Redirect everyone's folder to the same location.
  6. Under Target folder location choose Create a folder for each user under the root path.
  7. Set the Root Path: to  \\SERVER\usershare. 
  8. As the path is entered, an example location is displayed to show how the folders will be created as users log on.
  9. On the Settings tab, uncheck Grant the user exclusive rights to Documents.
  10. Under Policy Removal, select your preferred option depending on your requirements.
  11. Link the GPO at the appropriate OU.

Once the user logs in (for example:juser) then the following folders (in bold) will be created on the shared drive c:\usershare\juser\Documents and “Documents” that used to redirect to \\host\Shares\Documents (default) will be redirected to \\SERVER\usershare\<user>\Documents.

Source:

 https://support.ncomputing.com/portal/en/kb/articles/folder-redirection-changing-the-windows-documents-to-a-network-drive

-----------------------

 

 

Monday, June 2, 2025

Active Directory count

 (Get-ADUser -Filter *).Count
(Get-ADComputer -Filter *).Count
(Get-ADGroup -Filter *).Count

$ADUser = (Get-ADUser -Filter *).Count
$ADGroup = (Get-ADGroup -Filter *).Count
$ADComputer = (Get-ADComputer -Filter *).Count
$ADObjects = $ADUser + $ADGroup + $ADComputer
$ADObjects

Count for specific OU:

(Get-ADUser -Filter * -SearchBase "OU=Users,DC=example,DC=com").Count
 

كتابة الابحاث

ملاحظات أساسية عند كتابة الأبحاث 1- ظبط حجم الخط 14 Simplified Arabic بالنسبة للكتابة العربي و Times new Roman في الكتابة الانجليزي. 2- المس...