Latest Server related questions

Score: 0
Franck Sartori avatar
Apache 2.4 ignoring basic authentication
es flag

I'm currently searching a solution to re-enable basic authentication with .htpasswd file in Apache 2.4. Everything was ok using Apache 2.2 and then I upgraded to MAMP Pro 6.4 that implements Apache 2.4. The authentication is now just ignored.

I understood that the key thing is the Directory content of the httpd.conf file.

Currently, it is configured like that :

<Directory "/Users/Shared/Shared_I ...
Score: 0
SSL To SQL From Remote Computer
cn flag

I have a SQL Server 2019 instance installed on Server 2019. A CA Cert is in the server and the SQL server is forcing SSL using that Certificate. I am able to login to the SQL server with the Management Studio using the connection information SERVER.DOMAIN.COM\DATABASE. The certificate uses the FQDN to secure the connection.

I am trying to access the SQL Server database from a client on the same n ...

Score: 0
Intermittent "Address already in use: AH00072: make_sock: could not bind to address" on port 80
ng flag

We are experiencing intermittent "Address already in use: AH00072: make_sock: could not bind to address" on port 80 failures on our servers. I have looked at other answers and they are mostly based around it being a consistent failure and a LISTEN being defined twice, which is not our issue.

Our issue only happens shortly after boot of the instance where we "sudo service httpd restart" the servic ...

Score: 0
duplicity SSH-RSA key fingerprint of format 102:
gb flag

When I try to run duplicity between two Ubuntu servers, a message is displayed:

"The authenticity of host ...... can't be established. SSH-RSA key fingerprint is 102:...:...:...:...:......."

The fingerprint appears to be made up of 16 numbers in the 100s-200s range

Does anyone know what this format is please? I'm struggling to find a way to generate it on the target server to compare against.


Edit - ...

Score: 0
Bill R avatar
Google Compute Services VM and mailman
ca flag

I have a VM with Google running mailman 2.1.29 and it is rejecting inbound emails quoting the Google Compute Services name (new-xxxx.c.agile-being-nnnnnn.internal) and "Relay access denied". The hostname has been set to the active DNS name and /etc/hosts file reflects the same. But I cannot figure out where it is getting the "agile-being" name from.

Thanks for any suggestions!

Additional Details:  ...

Score: 0
Dennis avatar
Connect to Linux VPS via VPN running on Another Linux VPS
kr flag

Is it possible to connect to Linux VPS via VPN running on another Linux VPS at all? I have 2 Debian VPS boxes. The first one runs openvpn only. The second one is production. I entered the IP address of the one that runs openvpn into the second one iptables' rules, allowing it to connect -A INPUT -s 1.1.1.1/32 -p tcp -m tcp --dport 22 -j ACCEPT. However, it always times out and won't connect. For testing ...

Score: 3
sweber avatar
How is TRIM handled when cloning a disk with dd?
in flag

The TRIM command allows an OS to inform an SSD which sectors contain data, and which are free. This allows the disk to re-use free sectors internally and improves wear leveling.

Now, if an SSD is cloned to anoher via dd, each single sector is copied to the target disk. However, dd does not know if the content of the sectors is actually data, or unused. That is, it can not send a TRIM command to the t ...

Score: 0
Windows 10 / Chrome: HTTP browser request to IP address differs from same request to hostname
ru flag

Agaoin, this is on Windows 10. I'm bringing in a new Ubuntu test web server (hpmicro1.lovelady.com) to our internal network, which is all in the lovelady.com domain. There's a DNS server on another machine that handles all DNS lookups.

PC configuration for DNS is:

DNS configuration

When I ping the web server by name, I get 192.168.1.5:

DNS resolution

I have rebooted within the last five minutes.

Now, at a Chrome or Firefox or  ...

Score: 2
Limit a single users FTP access on IIS10 to a IP address
in flag

Can I limit a user so they can only access my FTP server from a set IP address whist allowing other users to access the FTP from anywhere?

I have a Windows Server 2019 server running IIS 10 with an FTP site setup on it. the FTP server has Ftp User Isolation set to Username physical directory.

The server has several FTP users setup on it all mapping to their own folder, and I would like to limit some of th ...

Score: 1
Stop gnu screen from asking for a password on screen -rd
in flag
lwa

Looks like GNU screen considers detach a lock request, and always locks when detached. How do I disable this? I trust all users (myself) on the box, and care little about the security implications.

Score: 0
apache2ctl -S shows incorrect/unexpected DocumentRoot location
ru flag

I'm baffed by this fairly simple apache2 configuration. Given the following two configuration files, I expect the DocumentRoot to be /www/htdocs but instead, it's the apache default of /var/www/html. These are the configuration files with all the comment lines removed:

grep -v '^\s*#' /etc/apache2/apache2.conf|grep -v '^\s*$'

    DefaultRuntimeDir ${APACHE_RUN_DIR}
    PidFile ${APACHE_PID_FI ...
Score: 0
Bluebot avatar
What does the TW mean in NANYA RAM?
it flag

I brought a used R710 which came with 32GB of ECC Nanya RAM, all of the RAM sticks are identical (NT4GC72B4NA1NL-CG) 4GB RAM sticks, however, they have a number next to them that is different, e.g: 0934.TW 1010.TW e.t.c.

Also, there appears to be another model number towards the bottom of the label which is different despite the RAM model numbers being the same

Finally, there is also a number printe ...

Score: 0
Amount of data transferred when doing a gpupdate /force
br flag

We are thinking to change the GPO setting - Group Policy refresh interval for users. (We have it set high and would like to bring it down closer to the default value of 90 minutes).

Management would like to know how much data is actually brought down to a machine. They are concerned about overloading the network.

For this question, let's assume that the gpo setting "configure registry policy proce ...

Score: 0
GKaveH avatar
Changing Vcenter and Esxi IP's
gt flag

Guys I have a Vcenter with lots of Esxi hosts and all of them have public IP addresses in their vmkernel's (managment) and now we need to change all of them to private IP is there any easy way to do it? I have an idea but I can't test it right now my idea is:

create another Vmkernel with a private IP address and enable management on it on the same standard switch (each server have a specific port ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.