Remove Members from a vCenter Single Sign-On Group :

You can remove members from a vCenter Single Sign-On group from the vSphere Web Client. When you remove a member (user or group) from a local group, you do not delete the member from the system.

VMware-ESXi-kartook

Procedure:

  • Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single Sign-On administrator privileges.
  •  Browse to  “Administration > Single Sign-On > Users and Groups  “
  •  Select the  Groups tab and click the group.
  • In the list of group members, select the user or group that you want to remove and click the “Remove Member” icon.
  • Click ” OK “

Note :
The user is removed from the group, but is still available in the system.

{ 0 comments }

How to gnome-fall back at ubuntu 14.04 LTS

by kartook on July 7, 2014

How to gnome-fall back at ubuntu 14.04 LTS

The Classic, now called Flashback session was quite popular in old Ubuntu versions .Many People like to use this same as like old gnome .   Here is the way how to Install and tweak the GNOME Flashback Session in Ubuntu 14.04 LTS step by step .

Install the Flashback GNOME session. Run the command on your terminal

 

kartook@KLab-01:~$sudo apt-get install gnome-session-flashback

ScreenShoot :

fallback _kartook

 

 

After installation Logoff  and Select the Gnome Flashback on list

fallback1 _kartook

 

 

 

 

 

 

After selection you can find the default Ubuntu LTS 14.04 Icon to Gnome icon .

Enter your password and login .

 

fallback2 _kartook

 

 

 

 

 

 

After login you can find screen looks like old Ubuntu .

fallback 3_kartook

 

 

 

 

 

 

 

 

 

Here is full  view of my screen

FullScreen_ubuntu_14.04_kartook

 

 

 

 

{ 0 comments }

E-Book :Introducing Microsoft SQL Server 2014

July 3, 2014

E-Book :Introducing Microsoft SQL Server 2014 ( Free ) In this book, the authors explain how SQL Server 2014 incorporates in-memory technology to boost performance in online transactional processing (OLTP) and data-warehouse solutions. They also describe how it eases the […]

Read the full article →

How To Log Off of Server 2012 on RDP Session

July 3, 2014

Open Powershell and type PS C:\> PS C:\> logoff        

Read the full article →

India to see robust hiring activities Soon

June 30, 2014

  NEW DELHI: Indian employers are likely to step up their hiring activities over the next three months, especially with IT & ITes segment expected to go on a robust recruitment drive, says a report. The Employment Outlook Survey by […]

Read the full article →

HACKING ATM MACHINES

June 1, 2014

Criminals will not let any way to cheat an ATM machine out of its cash, as it’s one of the easiest way for them to get the hands on cash. ATM skimmers have now discovered a new and high-tech approach […]

Read the full article →

All you need to know about 5G

June 1, 2014

WHAT IS 5G? 5G is the short for fifth generation, a mobile broadband technology that is in the early stages of works and likely to be in place six to seven years from now. A 5G network will be able […]

Read the full article →

Cybersecurity is new challenge for countries globally

May 31, 2014

    WASHINGTON: It started with hactivists defacing websites and a e-mails pointing users to links that stole data. Soon, Ragnar Rattas and his team of Estonian computer security experts were battling the heaviest and most sophisticated cyberattacks they had […]

Read the full article →

Iranian hackers using fake Facebook accounts to spy on US leaders

May 30, 2014

BOSTON: In an unprecedented, three-year cyberespionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a cyberintelligence firm said.  ISight Partners, […]

Read the full article →

Face recognition to boost surveillance

September 4, 2013

  The US government is making progress on developing a surveillance system that would pair computers with video cameras to scan crowds and automatically identify people by their faces, according to newly disclosed documents and interviews with researchers working on […]

Read the full article →