Make sure this makes sense for you but I've started to block a lot of commercial Cloud services and easily accessible providers as they are a very high source of abusive traffic. The cost savings for a lot of organizations are huge, as you now have less bandwidth usage and less resource usage from garbage/bot/malicious traffic. This mainly works for when you can be reasonably sure that your audience has no business visiting your service(s) from freely accessible commercial IP ........
This is certainly a poor design, as you can read many seasoned admins who have updated their iDRAC only to have it killed. One possible cause is not by doing all the incremental updates, doing updates from an old iDRAC to one many revisions newer is a sure way to kill things, but even then there is no guarantee based on the amount of failures.
List of threads of people's dead iDRAC's:........
Are you getting this error when trying to connect to a site/domain/service and then you checked your router/nameserver's logs to see what's wrong?
You may see something like this:
named[3025898]: REFUSED unexpected RCODE resolving
This is not usually an error with named or bind, at least not on your end but NORMALLY this is an issue with the remote nameserver.
A lot of times this is a misconfigured remote nameserver. A classi........
If you have du, you may want to check your bill, as you can read about a longstanding issue with fraudulent charges showing up and many users claiming they did not subscribe or solicit those offers.
These don't normally show up on new accounts, but they seem to target established users and maybe even users they suspect are not watching their phone or bills, while they are on vacation.
These charges can frighteningly happen with 0 interaction from the user despite what........
In today’s digital landscape, finding a reliable and secure Virtual Private Server (VPS) or Virtual Dedicated Server (VDS) goes beyond just comparing specs and prices. With increasing concerns over data privacy, security breaches, and government surveillance, the wisdom of choosing your VPS/VDS provider based on juri........
Virtualbox is a very powerful tool, but for some use cases it is less than optimal.
Say you are in a work, lab or other environment where you are not alone on the physical network and there could be overlap of IPs, but you need all of your VMs to be contactable from your host, VMs need to communicate with each other, and VMs need internet.
NAT Network will give you VM to VM communication and internet, however, it is buggy and unstable. It also doesn't allow host to VM co........
Do you have access to some old Tesla GPUs and want to try them at home in your Desktop or old Server? Some people have wanted to try these units for gaming but keep in mind they have no video out port, they were only meant for AI applications such as Deep Learning.
The easiest way by far is to choose an AIservice that has everything ready to go, perhaps with a bunch of Docker or Kubernetes containers. This can be done with Cloud services like Google, Amazon and many........
If you've come here, don't be embarraassed, working in IT, this is the MOST common computer problem that almost everyone will encounter. The reason why I'm doing this post is because I've seen an increase from colleagues and admins having this problem and many times it's not even your fault. A common scenario is that someone acquires a new or used computer which they weren't given the password for. Fortunately Ihave a detailed list of all the options whether free or pa........
apt install software-properties-common
add-apt-repository ppa:deadsnakes/ppa
apt update
apt install python3-pip
apt install python3.7 curl gnupg python3.7-dev git
ln -s /usr/bin/python3.7 /usr/bin/python3
pip3 install numpy keras_preprocessing
curl https://bazel.build/bazel-release.pub.gpg | sudo apt-key add -
echo "deb [arch=amd64] http://storage.googleapis.com/bazel-apt stable jdk1.8" | sudo tee /etc/apt/sources.list.d/bazel........
This is sure simple if you follow the guide but it took a lot of hacking around to make this work on Debian/Ubuntu!
Now before you ask why bother running wine and python, the reason is because Python executables are NOT cross-platform. If you run pyinstaller in Linux, that binary will only run on Linux and the same if you do it in Windows. So it is preferable if you have a single environment that you can create Linux and Windows binaries from rather than running 2 separate........
SSH helps keep us secure in many ways, one of those is the host-key fingerprint which is unique. If you have been connecting to an SSH server that you've made no changes to and suddenly ssh warns that the key doesn't match then you have a problem.
But how about connecting to an existing server for the first time on a new machine or client?
A lot of new clients calculate it using an SHA256 hash but it is not as easy on your host machine to produce the sam........
If you get error messages like this it is usually because /var/run/sshd does not exist.
root@userbox:/# service sshd status
● ssh.service - OpenBSD Secure Shell server
Loaded: loaded (/lib/systemd/system/ssh.service; enabled; vendor preset: enab
Active: failed (Result: start-limit-hit) since Wed 2019-04-10 02:24:44 EDT; 1
Process: 511 ExecStartPre=/usr/sbin/sshd -t (code=exited, status=255)........
It is well known hackers, the NSA, CIA and other groups have created malware to secretly turn on your webcam and microphone on your phone, tv etc.. But fortunately on our computers and laptops we have some options.
Most webcams use the "uvcvideo" kernel module / driver. You can disable this in two ways on boot. I recommend both just as a failsafe.
Disable it on rc.local once your system boots automatically
Add the followi........
One simple way to keep your server public but almost impossible to hack via SSHis to disable password authentication over SSH. This means the only way in is via your own private key that only you should have.
Edit your /etc/ssh/sshd.conf file
Set this option
PasswordAuthentication no
Restart your SSH server.
service sshd restart
........
Check for crap in /var/lib/mysql like this
ls -al /var/lib/mysql/
total 20888
drwxr-xr-x 24 mysql mysql 4096 Oct 3 18:30 .
drwxr-xr-x 20 root root 4096 Oct 3 04:23 ..
-rw-rw-rw- 1 mysql mysql 11776 Oct 3 17:10 c:exp.exe
-rw-rw-rw- 1 mysql mysql 48128 Oct 3 17:10 c:exp1.exe........
This error is commonly due to Java security or TLS settings but there is a second issue with forwarded ports that also causes it.
1. Java Security/TLS Settings issue:
This article has the solution to change them all in Linux automatically
2. Port Forwarding Issue if your Avocent DSR is behind NAT/private IP........
whois in Linux is incredibly out of date and does not seem to recognize most new TLDs domains, but there is a quick and easy tip/hack/tweak for this.
An example of new TLD's site as .review .site .club
whois somesite.club
No whois server is known for this kind of object.
bash to the rescue
Now I did try to apply this in .bashrc but DONOT! Ithink the * wil........
170110 5:35:23 [Note] /usr/libexec/mysqld: Normal shutdown
170110 5:35:23 [Note] Event Scheduler: Purging the queue. 0 events
170110 5:35:23 InnoDB: Starting shutdown...
170110 5:35:24 InnoDB: Shutdown completed; log sequence number 0 12765401
170110 5:35:24 [Note] /usr/libexec/mysqld: Shutdown complete
170110 05:35:24 mysqld_safe mysqld from pid file /var/run/mysqld/mysqld.pid ended........
md127 issue, it should be /dev/md3 per mdadm.conf
Any time something is mounted as md127 it almost always means there is no entry for this mdadm array in the mdadm.conf in initramfs (which is separate from your actual /etc/mdadm.conf).
cat /etc/mdadm.conf
ARRAY /dev/md3 metadata=1.2 UUID=b6722845:381cc94e:7a2c5b5f:8e3b7c4f
The reason for this is something strange, most Linux OS's bizarrely always keep their own copy of /etc/mdadm.con........
Tired of checking iotop and seeing that your drbd partition is using 99.99% of io all the time and finding your drbd device performs slow in general?
This is especially an issue in versions of DRBD in the 8.3 tree in particular one documented case is on "8.3.13" but it likely applies to other devices.
The symptoms are that resyncing is fine and normal but any reasonable amount of activity is very slow and lagged and creates a high server load and con........
Fortunately the format is EATX so an EATX case will work and the screw layout is standard.
You will need to remove the HEX/TORX screws that are connecting the stock HP standoffs (meant to slide into an HP case).
XW9400 Motherboard Issues
Size: 12" x 13"
Proprietary Power Connector
Proprietary CPU Power Connector
Proprietary Memory Power Connector
Fan connectors are 4 pin so you will need some kind of adapter.........
This is very annoying and also hard for web developers who want to see how things look on Android. You may be fooled into thinking you have an unclosed bracket or incompatible code but this is the "text inflation feature" which I feel should be disabled by default. It works so inconsitently that one block of text will appear small while the other will be huge and is quite annoying.
The solution is simple
Settings ->Display and &q........
I was worried the server was hacked, I was logged in already as root but couldn't login to CPanel or a new SSHsession. I even reset the password from the shell and it did not work still.
The reason is CPanel Hulk, it detected a brute-force attack so it locked down the root account entirely even from the correct password. According to cPanel the best way around this is to whitelist your IP.........
I really am a Linux fan but my comments here may not show it. Although I'm quite familiar with Linux CLI to administer servers, I find Linux GUI OS's like Ubuntu at times very clunky.
This is partially because there's no such thing as a "self-made" Linux from scratch where the UIwas designed by a single team. Linux is made up of several different projects that are generally completely separate and this lack of integratiion is a key issue that makes things f........
One thing to note about DNS servers and providers is that they aren't always trustworthy, not even if they're Google or your favorite ISP. Any DNS server can compromise your privacy, and they are likely tracking your browsing habits and keeping logs of it. Sometimes it's for Marketing/Research purposes such as Google's GMail service which they admit is scraped/datamined. I would expect nothing less from their DNS service.
The other danger with such widely used and pu........
I don't expect this to be solved soon but some of Yahoo's DNS servers are out of whack. I changed the IPs of some nameservers of some domains and now most Yahoo users can't e-mail to those domains!
As you can see below by the "No MX or A records for mychangedomain.com", now Yahoo's DNS/mailserver DNS cache is wrong. You would think they would at least have cached the old incorrect records, but instead for some reason their DNS cache has no entry and doesn't seem........
This really made me nervous but notice the mdstat says "check". This is because in Ubuntu there is a scheduled mdadm cronscript that runs everyday on Sunday at 00:57 that checks your entire array. This is a good way because it prevents gradual but unnoticed data corruption which Inever thought of.
As long as the check completes properly you have peace of mind knowing that your data integretiy is assured and that your hard drives are functioning properly (I'........
Basically it seems that Thunderbird only remembers/savesfor the first/default identity account. It is very annoying when the signature gets placed at the bottom and another huge oversight on Mozilla's part.
Fortunately you can hack/manually set this setting.
The solution for fixing the Signature At the Bottom (Below The Quote)
Click Tools -> Options ->Advanced -> Config Editor
Then search for ".sig_bottom" and set them al........
I've recently used CPanel on the admin side for the first time and have to say I hate it. Everything from the layout to the functionality screams "hackish". It just lacks so many common sense features and way of working.
I was never 100% impressed with Plesk but the basics were definitely laid out and done in a sensible manner, even though it is made by a Russian company, they definitely thought about how to make a Control Panel.
I have no idea why people........
Ihave no idea how to get the loopback device working in OpenVZ, but what's more frustrating is that I purchased a CPanel license for my VPS and clearly it is not "VPS Optimized". Although everything does seem to work at this point despite that error.
The suggestions here: http://forum.openvz.org/index.php?t=msg&goto=1339 don't seem to work at all. This is an OpenVZ issue, but also a CPanel isue, why on earth would loopback support be expected in a VPS a........
It's basically free bash shell script available from: http://wpkg.org/email2fax/index.php/Main_Page
Make sure you have the required tools:
libtiff
ghostscript
mpack/munpack
Where you can e-mail your Asterisk box and it will fax it to the phone number in the subject line. The good news ends there, it is fairly undocumented and buggy.
Take for example how the documentation mentions you can invoke from the com........
Clone any OS partition perfectlyIn one box I needed to copy the boot partition to another disk while retaining the MBR and other data.
I simply ran this command:
[code:1:1b1ff110ca]dd if=/dev/hda1 of=/dev/hdb1[/code:1:1b1ff110ca]
[b:1b1ff110ca]if[/b:1b1ff110ca] = source patition
[b:1b1ff110ca]of[/b:1b1ff110ca] = destination partition
Here's an interesting article on it
http://www.rajeevnet.com/hacks_hints/os_cl........
NEC ND-3500A is great!I just picked up an NEC 3500A a few weeks ago and I love it.
It is a great all in-one optical drive solution.
It can burn DVD/+R-R at up 16x, read at 16x and rewrite at 4x and CD-R at up to 48x!
Not bad, but the impotant part is that it delivers consistent high quality burns and the drive is as quiet as I could ask it to be.
It's also convenient that it has a lot of hacked firmware for overspeeding of........
My list of handy security links - Ongoing[b:6f8d25be68][size=18:6f8d25be68]News[/size:6f8d25be68][/b:6f8d25be68]
Security Focus http://www.securityfocus.net - Nice Security News Site
CERT http://www.cert.org/
Common Criteria (see if your OS/software is EAL4 certified) EAL(Evaluation Assurance Levels is the industry standard for evaluation of security in software) http://www.commoncriteria.com
[size=18:6f8d25be68][b:6f8d25be68]Tools[........
Other Security Web SitesSeveral websites actively track security issues. This list provides you with the major providers
of security information on the Web. Many of these organizations also provide newsletters and
mailings to announce changes or security threats:
Center for Education and Research in Information Assurance and Security (CERIAS)
CERIAS is an industry-sponsored center at Purdue University that is focused on technology and
relate........
Clustering LinksI thought this might be interesting for people with spare time.
[b:6423c19973]Great clustering article from Linux Mag[/b:6423c19973]
http://www.linux-mag.com/2003-11/clusters_01.html
[b:6423c19973]General Linux cluster information[/b:6423c19973]
http://www.gdargaud.net/Hack/ClusterNotes.html#HighA
http://www.faqs.org/docs/Linux-HOWTO/Cluster-HOWTO.html#s3
http://www.yolinux.com/TUTORIALS/LinuxClustersAndFileSys........
Put what you see below into your .htaccessand it will enable errors and notices. (change on to off and 1 to 0 to disable though)
php_flag display_startup_errors on
php_flag display_errors on
php_flag html_errors on
Now you'll be able to see errors and notices but this should really only be used for debugging purposes and only temporarily as it can be a security issue since errors can reveal information you wouldn't want hacker........
This is something that annoys a lot of people, fortunately the Redhat style OS's are the most simple in this respect. I disagree that Debian's way makes sense, it is more of a hackish approach in how they implement iptables.
Anyway, for those who are using Redhat/Centos style OS's it is very simple.
Set your rules from the shell/command prompt and to save the iptables firewall rules so they are remember/loaded on boot just run this command:
service iptables........
First of all, the iPhone is crippled in many ways, but most of my complaints about functionality have been addressed through the jailbreak, Ican run apps in the background of my choosing, I can install a terminal, acccess my phone through SSH and SCP and so much more.
It even addresses the 15 minute e-mail problem, I installed a program called "PushMod" and now set the checking time to just 1 minute.
Apple should really thank the developers for this gift, it ma........
This happened during a sync of my iPhone while installing some apps. This usually happens to non-jailbroken iPhones who are trying to install non-Apple approved software OR jailbroken phones who haven't done the "Sync update".
How to fix this error and get the Sync Update
Open Cydia - Manage - Sources - Edit
Add this source: http://cydia.hackulo.us
Then under the section "Hackulo.us" install "Ap........
Truly, the only way to unleash the capabilities and customization abilities of iPhone are to jailbreak, it's not just for hackers anymore.
A few days ago someone by the named of "geohot" released a single click application called "purplera1n", which does the entire operation smoothly and seamlessly.
In our case, the first time it went as far as "done, wait for reboot" on our Windows machine and for minutes we waited and saw the pic on the iPhone w........