Score: 0
Andrew avatar
In the bind mount "hostPath:containerPath:ro" what dose the ro part do?
bn flag
  1. How do I know I need to add the ro or not?
  2. I know the ro stands for read only but why would you need a read only bind mount?
  3. How would it effect my docker-composer-yml

Example: Containerizing a python app

// docker-composer.yml
...
volumes:
    - ./src:/usr/src/app/src:ro
Score: 0
Getting CORS error while accessing audio files on same server in chrome
id flag

Access to video at '/path/to/mp3/file' from origin 'https://example.com' has been blocked by CORS policy: Request had a target IP address space of unknown yet the resource is in address space public.

Score: 0
leonid777 avatar
Is it safe and appropriate to remove SUID and SGID from certain system files in Debian 11 (files on the screenshot)?
id flag

The whole list of all files found with find / -perm -4000 -print and find / -perm -2000 -print commands (same) are on the screenshot. So is it an efficient and safe thing to delete SUID, SGID from all of them? Or it won't give any additional safety and just meaningless? Thank you in advance!

There is only one added user and we won't add any more users.

List of found files

Score: 1
json_query help - not producing expected output
cn flag

I am trying to build an array to use for with_nested, but I cannot get past why json_query isn't outputting the actual hosts assigned to each cluster:

Play:

- name: Index clusters.json
  shell: cat {{ tower_var_path }}/clusters.json
  register: result_clusters

- name: Save the Json data to a Variable as a Fact
  set_fact: 
    clusters_jsondata: "{{ result_clusters.stdout | from_json }}"

- debug:
     ...
Score: 1
dlfls avatar
In RSA, What does gcd(e,phi) != 1 means? Why always choose e = 2^n +1 not 2^n?
in flag

Recently I have few experiences with Questions in RSA which e is 2^n instead of 2^n+1, and that leads to gcd(e, phi) is not equal to 1... Won't this make the private key impossible to get? Is the Rabin cryptosystem the only way out?

Score: 0
CFD avatar
connection refused from upstream html - NGINX
br flag
CFD

I have an html file running on a docker container with this url: http://localhost:80 I want to redirect this to another port like http://localhost:8080 with NGINX. I have the following config for it:

user  nginx;
worker_processes  auto;

error_log  /var/log/nginx/error.log notice;
pid        /var/run/nginx.pid;

events {
    worker_connections  1024;
}

http {
    include mime.types;
    sendfile o ...
Score: 0
Only the PC that is plugged into the same switch as the printer can ping the printer, but other devices can ping the PC on the same switch. Why?
uy flag

In my store I have sever POS computers running Windows 10 and a Brother network laser printer. Suddenly none of the POS systems can reach the printer. When I installed the printer in the showroom I added a Netgear switch so that I could plug both devices into the network. It was working fine until about a week ago. The printer has a static IP but only the POS system that is plugged into the same switch  ...

Score: 0
Leponzo avatar
Fail an AutoSys file watcher job if it exceeds maximum runtime
hu flag

Is there a way to fail an AutoSys file watcher job if it exceeds some maximum runtime? I am aware of term_run_time, but that terminates the job, causing it to not run at the next scheduled time.

Score: 0
scorpdaddy avatar
login to remote Win10 and retrieve file
au flag

Currently doing a manual daily backup of certain files, tars and zips, from a number of Win10 boxes to a master Win10 box. Backups are done by RDP - copy - paste. There has to be a way to script this. Please avoid: network file share, folder mapping, installing ssh or other server, or any permanent connection. The idea is to script what has been happening manually: open a connection with the known l ...

Score: 0
questionador avatar
Windows 2012 Server Task not running
cn flag

I have two exactly equal Tasks created on Windows 2012 Server.

One of them is set to run only When User is logged in, and the other is set to run whether user is logged in or not.

What happens is, the one set to run when I'm logged, automatically runs when i log in, and that's what is expected.

My problem is, the other one, does not run when I'm logged, or if I do not log in, not even manually.

Can anyone ...

Score: 0
Exchange DAG seeding operation fails with I/O error
ua flag

we are getting below error on some of our database wheh we try to create/update a database copy:

The seeding operation failed. Error: An error occurred while performing the seed operation. Error: An error occurred while processing a request on server 'EX1-Server'. Error: An I/O error occurred while attempting to access file 'D:\Exchange\DAGMBDB01\Database\DAGMBDB01.edb' on source server EX1-SERVE ...

Score: 0
Marius avatar
Invalid argument received when running chown in a Linux namespace
ao flag

After running something like this:

unshare -rUm
mkdir opt
mount --bind opt /opt
touch /opt/test
chown 1000:1000 /opt/test

I'm receiving this:

chown: changing ownership of '/opt/test': Invalid argument

I don't understand why or how can I bypass this issue.

Score: 0
AnJ avatar
Correct routing table for split tunneling VPN
cn flag
AnJ

My contractor requires a VPN to access some resources on their side. I'm using Windows built-in VPN and by default all traffic is routed through this VPN. So I used "Split Tunneling" to route only specific traffic through this VPN.

I ran:

Set-VPNConnection -Name "MyVPN" -SplitTunneling $True

And checked with http://api.ipify.org/ if my IP is changed - and it seems to successfully route traffic wit ...

Score: 0
14207973 avatar
Applying IIS rewrite rules from multiple web.configs for single request
it flag

I am trying to configure a directory structure in an IIS website with rewrite rules applying at various levels. For example, consider the following structure:

Default Web Site
├─ web.config
└─ v1
   ├─ web.config
   └─ wwwroot
      └─ hello.txt

I want to be able to access hello.txt through http://localhost/hello.txt. I have configured the web.config at the website root level ...

Score: 0
fileinsert avatar
rsyslog rewrite hostname before relay
lb flag

I am setting up rsyslog in a multitenant environment to relay to a central server. Because it is multitenanted, I would like to prefix the hostname from the first rsyslog server with a customer specific prepend before relaying on to the central server. I had planned to set the prefix manually, however, the prefix is configured in another file on the server, and if this could be gathered from that file,  ...

Score: 0
disable deprecated resource automatic conversion
br flag

I’m trying to purposefully create K8S resources with deprecated apiVersion for test purposes, but keep ending up with a converted resource to the non-deprecated apiVersion. I don’t understand why it’s happening and can’t find any discussion/topic on how to force K8S API to respect my resource manifest.

Does anyone know how it could be done? Or even why it’s acting like that?

Here is the resourc ...

Score: 0
Nginx multi-domain and multi web servers with one public IP
us flag

I have two web servers with different domain and only one public IP. I found that I can multi domain in the same IP and same server as bellow, but I would to open the website depending on the domain. I tried

server {
    listen       80;
    server_name  first.domain.com;
    return 301 http://192.168.1.10;
}

but this configuration change the url to http://192.168.1.10 ! I want to see the https://first ...

Score: 0
dokaspar avatar
Extract archive with tar but skip unchanged files
ru flag

I have a nightly process that unarchives a roughly 40 gigabytes large tar.gz file like this:

tar -xzf latest-backup.tar.gz

This step takes about 10 minutes, although often only a few files have changed inside the archive. I've seen that tar has some options to treat existing files, such as --skip-old-files:

--skip-old-files
    don't replace existing files when extracting, silently skip over them
 ...
Score: 0
Decoy_Octopus_ avatar
How to group some exposed filters in a collapsible block
cn flag

I have a view with several exposed filters
The theme is based on bootstrap, so I'm looking for a way to group some of them within a collapsible or accordion block (Bootstrap example)

I'd like to avoid installing an extra module if possible.
Drupal version : 8 / 9

Thank you

Score: 0
Ex0r avatar
Custom Views Field Plugin
cn flag

I am creating a custom views field plugin, and I am having a huge amount of notices in the dblog that I cannot trace.

It's a simple views field plugin that just renders some content into a custom "non-db" field on the view.

Issue #1, is that in the view, the field is listed as just ':' (The field group and field name are not being displayed on the view).

Secondly, I am receiving these notices in the db ...

Score: 1
Konstantina Mil avatar
How to calculate entropy of a specific cryptosystem?
sa flag

I want to calculate the entropy of a specific cryptosystem such as the Caesar cipher or Vernam cryptosystem etc but I don't quite understand how to do so. Any help?

Score: 0
hybang avatar
bridge with bonding interface
ai flag

I have some scenario like below

       [F/W]  [F/W]
     eth1|      |eth3
         +      +
       [  CentOS7 ]
         +      +
     eth2|      |eth4
       [B.B]  [B.B]

Line1 = eth1, eth2 Line2 = eth3, eth4

It is a network redundancy configuration, one proxy server is inserted in the middle.

I try to make bonding with bond-ex(eth1, eth3), and bond-in(eth2, eth4)

and will make bridge br0(bond-ex, b ...

Score: 0
Uday Kiran Reddy avatar
How to check script status after_script?
cn flag

In the after_sctipt section, if the script section fails or success, still it runs as I keep allow_failure: true But, how to check in after_script that whether script section failed/success so that I can pass the same in some api call in the after_script

Score: -1
None None avatar
Site-to-Site VPN for overlapping cloud networks
ky flag

I've got two cloud networks with following private addressing:

  1. 10.10.0.0/16
  2. 10.0.0.0/8

Need to establish IPsec site-to-site tunnel

I thought about NETMAP but is it possible to translate whole /8 network in this case?

Score: 2
Rein Ernst avatar
Is it possible to calculate the modular inverse of a secp256k1 public key?
jp flag

I know that it wouldn't be possible to use the extended Euclidean algorithm, since it would require the ability to divide a public key and calculate the remainder. I was wondering if there were any other ways of calculating the modular multiplicative inverse of a point on an elliptic curve (like secp256k1)? Or perhaps a reason why it is provably impossible? Is there a way (other than brute force) to fin ...

Score: 0
Dylk58 avatar
Short description of encryption methods?
jp flag

I can't seem to wrap my head around these encryption methods. I can't find a brief description for any of them.

  • Hash then encrypt
  • MAC then encrypt
  • Encrypt and MAC
  • Encrypt then MAC
Score: 0
When a VM Template was last used (to create a VM)?
kr flag

I need to know when a VM Template was last used (to create a VM)? As I am working on a project of segregating unused templates in my vSphere environment, I need to know that answer.

I tried Get-Template TemplateName | select * But is not giving me the required information, Any help here is appreciated, Thank you!

Score: 0
HDB avatar
Connect redis-cluster(running in docker) from host machine
fr flag
HDB

I have used docker-compose with static ip to create redis-cluster, everything ran successfully but now I am stuck at how do I connect my host application to redis-cluster running in side docker.

version: '3'
services:  
  hdbrediscluster:
    container_name: hdbrediscluster
    image: redis:6.2.7-alpine
    command: redis-cli --cluster create 172.20.0.10:6380 172.20.0.11:6381 172.20.0.12:6382 172.2 ...
Score: 0
file system error during bootup
at flag

I am getting below errors through console of the linux machine.

Welcome to emergency mode! After logging in, type "journalctl -xb" to view system logs, "systemctl reboot" to reboot, "systemctl default" to try again to boot into default mode.
systemd-fsck[160090]: /dev/sda3: Inodes that were part of a corrupted orphan linked list found.
systemd-fsck[160090]: /dev/sda3: UNEXPECTED INCONSISTENCY; RUN  ...
Score: 0
TvEtoffes avatar
Apache 2.4 : Redirect a subdomain to a new domain except one url the / (index.html)
cn flag

I just changed the domain name, and i would redirect the following links :

  • All old urls from subdomain.example.com/url.html --> subdomain.newdomain.com/url.html

Except one url (the /) (implies index.html) but not specied by user in the browser :

  • The domain itself subdomain.example.com ---> subdomain.newdomain.com/newpage.html

How can i do that please?

this is what i tried (without succe ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.