Latest Server related questions

Score: 0
Is there a (forensic) way to list past events/actions of a certain *.exe malware program (PUP-Proxygate, possibly a Trojan)?
jp flag

There is a folder with suspicious *.exe files on a Win 10 PC, and there are (external) protocols of potentially unlawful actions coming from that PC at a certain time in the past. The first suspicious action was network traffic to a sinkhole IP address typical for the Hupigon trojan, a second one (some days later) was posting an attempted scam on an Internet commerce platform.

The PC in question has ...

Score: 6
Niall Gallagher avatar
AWS instance giving me less NVMe space than advertised
br flag

I recently provisioned 10 m5d.large instances (with Terrafor. The advertised space is "1 x 75 NVMe SSD", however when I ssh on to the instance I see.

[root@web0 ~]# df -h
Filesystem      Size  Used Avail Use% Mounted on
devtmpfs        3.8G     0  3.8G   0% /dev
tmpfs           3.8G     0  3.8G   0% /dev/shm
tmpfs           3.8G  376K  3.8G   1% /run
tmpfs           3.8G     0  3.8G   0% /sys/fs/cg ...
Score: 0
Klav avatar
PM2 - Process or Namespace not found when deploying with GitLab CI
ge flag

When deploying from CI, as the user who started PM2, pm2 restart appname always results in [PM2][ERROR] Process or Namespace appname not found

whoami/who on deployment shows the correct user.

Tried switching users, as well as PM2's location: /usr/local/bin/pm2 restart appname results in the same process not found.

CI command:

script:
- pm2 restart appname

or:

deploy: 'ssh -o StrictHostKeyChecking ...
Score: 0
BANJOSA avatar
Piping SSH to wireshark on windows
ve flag

In my day-to-day operations, I frequently need to execute tcpdump's on remote servers, and it's a pain to save the output to a file and then have to move the file to my laptop to analyze it on wireshark.

I was exploring the command below, and it works fine in linux

ssh <remote_host> sudo tcpdump -vv -i eth0 -U -w - | wireshark -k -i -

But, unfortunately, my work laptop that is provided by my compan ...

Score: 0
Supervisor Service Not Running
sh flag

Good Afternoon All,

I am going through some of our OptiPlex 7050 machines and a common theme on some is:

Selected Sensor Details Sensor Name: Supervisor Service Not Running

Description The supervisor service exists on the system but is not running. This service is responsible for monitoring the SysTrack agent and assisting in other child-level SysTrack administration.

Where can I check and turn this featu ...

Score: 1
red0ct avatar
Does TCP RST packet along with other flags set valid?
cn flag

When I researched some methods of DDoS protection I faced with some firewall rule which limit packets with RST bit set to 60 per second. Indeed it makes some sense. But it also doesn't check the other flags.
For me it seems that packets with RST flag set and also some other flags set are invalid, so we can drop/reject it.

The questions is: can in practice we see valid TCP RST packets along with oth ...

Score: 0
Constantin avatar
How do I tell AWS to gracefully reclaim an EC2 spot instance?
cn flag

I have an autoscaling group which is scaled up/down based on proprietary logic. We use the boto3 client to perform such scaling activities when required.

By default our EC2 instances have a maximum execution lifecycle of 60 seconds. When spot instances are requested to be terminated it is very important that these are immediately detached from their load balancer.

When AWS reclaims their Spot inst ...

Score: 0
IIS 8 ERR_CONNECTION_RESET
gb flag

We're having issues accessing our server remotely. Currently the server is setup using a 192.168.x.x IP and our firewall is redirecting all traffic from our public IP to the server. Port 80, 443, and 8080, 53 are open.

I'm trying to get to: ip.add.re.ss:8080 off the network which is a basic index.html page at the moment. Locally on the server I can load the web page just fine with ip.add.re.ss:80 ...

Score: 0
Charly Roch avatar
Can someone outside of the lan uses my nginx proxy?
in flag

I know this question can sounds weird but I noticed strange behaviour on our network.

Here's the context:

I have a vm running multiple docker containers. To simplify their use and because I need https we set up a nginx reverse proxy in a container jwilder/nginx-proxy (following this method https://www.singularaspect.com/use-nginx-proxy-and-letsencrypt-companion-to-host-multiple-websites/)

I am se ...

Score: 0
Stretch0 avatar
CI Pipeline that doesn't require OAuth?
om flag

I am wanting to build a CI/CD pipeline Github app. What CI tool can I use to leverage to build this?

I want my application to handle the Github OAuth so as far as the user is concerned, they only connect to their Github but behind the scenes, I run Pipelines through Jenkins, CircleCI, AWS Codepipelines or something similar.

These all require the user authorise these Apps via their own OAuth but I'm ...

Score: 0
Vatoch Mr avatar
Give permission to Larvel web app in Centos 7 to add/delete/edit files
us flag
  • I build a new web interface by Larvel 8 for nagios core in Centos 7, everything is OK I can open the interface in browser, except one thing it s add/delete/edit files in nagios repositry cuz I want to automate this process, but it's obviously permission problem.

  • So I try all solutions I founded but none of them works, Can you please help me on this?

this is the details about nagios repository:

 ...
Score: 0
dywan666 avatar
Azure Virtual Desktop - can't login
hu flag

I need to set up Azure Virtual Desktop and everything is deployed but there is no possibility to log in. Created the host pool, Desktop Application Group and a workspace, then added users to the DAG and gave them the "Desktop Virtualization User" IAM role in the application group resource.

My domain controller is hosted in Azure with Azure AD Domain Services. When I try to log in to the virtual d ...

Score: 1
Eduardo Lucio avatar
UPI/Bare Metal - The master node cannot finish the installation ("config/master", "timeout awaiting response headers"/"EOF")
in flag

Simple question, but so far very difficult to answer... =-[

I am trying to deploy OpenShift (OKD) 4.5 or 4.7 as directed here Guide: Installing an OKD 4.5 Cluster. Look at the "Starting the control plane nodes" section.

I'm trying to create the cluster using an UPI (User Provisioned Infrastructure)/Bare Metal (KVM).

PROBLEM:

  • Version 4.5

The master node cannot finish installation after reboot. It kee ...

Score: 1
King David avatar
Kafka installation with Confluent vs Apache Kafka
gb flag

for now we have HDP 2.6.5 version , with Kafka cluster with Kafka version 0.1

all Kafka machines are installed on RHEL version 7.6

all machines with RHEL 7.6 are on DELL physical machines

we want to move to Apache Kafka or Confluent Platform

The Kafka that we need to use is for production , so we intend to install 5 Kafka machines

Now the big Question is:

What is better to use - Apache Kafka or Conflu ...

Score: 0
Mike Sherrill 'Cat Recall' avatar
In an Azure network security group, is denying all traffic before the "AllowVnetInbound" and "AllowAzureLoadBalancerInbound" rules good practice?
cn flag

Inbound rules for an Azure network security group

This set of Azure Network Security Group inbound rules came from a "best practice" blog.

I understand this to mean there isn't any way for any network traffic to pass the "DropAll" rule and reach the "AllowVNetInbound" rule. Do I understand that correctly?

I can imagine a few cases where you might want to deny all inbound traffic from the vNet, but I can't imagine why that would be considered a best p ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.