Archive for November, 2009

Get Information About Your BIOS / Server Hardware From a Shell

November 17, 2009

dmidecode – Read biosdecode data in a human-readable format

Data provided by biosdecode is not in a human-readable format. You need to use dmidecode command for dumping a computer’s DMI (SMBIOS) table contents on screen. This table contains a description of the system’s hardware components, as well as other useful pieces of information such as serial numbers and BIOS revision. Thanks to this table, you can retrieve this information without having to probe for the actual hardware.
Task: Display information about IPMI Device

# dmidecode –type 38

You need to pass dmidecode following keywords:

* bios
* system
* baseboard
* chassis
* processor
* memory
* cache
* connector
* slot

All DMI types you need to use with dmidecode –type {Number}:
# Type Short Description
1 System
2 Base Board
3 Chassis
4 Processor
5 Memory Controller
6 Memory Module
7 Cache
8 Port Connector
9 System Slots
10 On Board Devices
11 OEM Strings
12 System Configuration Options
13 BIOS Language
14 Group Associations
15 System Event Log
16 Physical Memory Array
17 Memory Device
18 32-bit Memory Error
19 Memory Array Mapped Address
20 Memory Device Mapped Address
21 Built-in Pointing Device
22 Portable Battery
23 System Reset
24 Hardware Security
25 System Power Controls
26 Voltage Probe
27 Cooling Device
28 Temperature Probe
29 Electrical Current Probe
30 Out-of-band Remote Access
31 Boot Integrity Services
32 System Boot
33 64-bit Memory Error
34 Management Device
35 Management Device Component
36 Management Device Threshold Data
37 Memory Channel
38 IPMI Device
39 Power Supply

How to get detailed information about my Linux server hardware information?

A. You need to use tool called lshw to extract detailed information on the hardware configuration of the machine. It can report exact memory configuration, firmware version, main board configuration, CPU version and speed, cache configuration, bus speed, etc. on DMI-capable x86 or IA-64 systems and on some PowerPC machines.

It currently supports DMI (x86 and IA-64 only), OpenFirmware device tree (PowerPC only), PCI/AGP, CPUID (x86), IDE/ATA/ATAPI, PCMCIA (only tested on x86), SCSI and USB.


Configure Firefox To Use SSH SOCKS Proxy Tunnel

November 9, 2009

The following instructions need to be done AFTER your ssh client (i.e. PuTTY) has been configured to open a secure tunnel. Connecting through the tunnel with Firefox (or any other program) only works while the tunnel is actively open. This means you must stay logged in for the entire time you are browsing. For instructions on downloading and configuring PuTTY, click here.

To configure Firefox to work with the proxy follow these instructions:

1. Open FireFox.
2. Click ‘Tools’ at the top to pull down the Tools Menu.
3. From the menu, select ‘Options…’ at the very bottom. This opens the Options window.
4. Click ‘Advanced’ at the top right corner of the window.
5. Click the ‘Network’ tab.
6. Where it says ‘Configure how Firefox connects to the Internet’ click the ‘Settings…’ button. This opens the Connection Settings window.
7. Select ‘Manual proxy configuration:’.
8. Where it says ‘SOCKS Host:’ enter localhost into the box.
9. 9) Where it says ‘Port:’ enter 9853 into the box.
10. Click the ‘OK’ button.
11. Click the ‘OK’ button on the previous window.
12. In the browser location bar (the place where you type web addresses), type about:config and press Enter. This opens a different set of Firefox preferences.
13. Where it says ‘Filter:’ at the top, type network.proxy.socks. The list of preferences will automatically change to show your proxy preferences.
14. Highlight ‘network.proxy.socks_remote_dns’ by clicking it only once. Then, right-click it. This opens a small pull-down menu. Select ‘Toggle’ from the menu to change its value to ‘true’. This adds privacy by preventing DNS queries from leaking. This is the reason why Firefox is recommended over other browsers for using this service.
15. Close Firefox and restart it.
16. Go to a site like to check and make sure your IP address shows up as the proxy address and not your real IP.