Latest Server related questions

Score: 1
Mickaël Philippon avatar
squid commSetConnTimeout
tr flag

I'm using squid 3.5.20 on centos. I send a curl request to bigquery directly without a squid proxy, and I have a response after 8 minutes.

Now, when I launch the same curl request through the squid proxy, I have a response after 15 minutes.

When I set debugging mode on squid, I can see a timeout of 900 during the tunnel.

"comm.cc(553) commSetConnTimeout: local=10.190.113.69:50488 remote=74.125.193.153: ...

Score: 0
Nick avatar
Ansible playbook not running : Import error
uz flag

enter image description here

ansible-playbook -v -i Monitoring/hosts Monitoring/main.yml
[WARNING]: log file at /var/log/ansible.log is not writeable and we cannot create it, aborting

Using /etc/ansible/ansible.cfg as config file
/etc/ansible/roles/Monitoring/hosts did not meet host_list requirements, check plugin documentation if this is unexpected
/etc/ansible/roles/Monitoring/hosts did not me ...
Score: 3
Akala Volo avatar
Is there a real point to using "Run as" local admin accounts instead of logging in as a local administrator?
uz flag

Let's start by setting the scene -- I'm a junior systems administrator tasked with conducting a transition of the company towards a "Least-Privilege" model. This includes removing admin rights from our users, who mostly work with Windows 10.

Now at this point in time, users are (for the most part) using accounts with local admin rights. This is obviously pretty bad, and we're working on changing  ...

Score: 0
Does Windows store time/date when a known SATA drive/volume was last connected?
jp flag

Assume an internal SATA hard drive named "Samsung-XYZ" with one partition called "Backups" is connected to a PC.

If the drive is removed (while the PC is powered down), will the system have saved:

a) information about the removed drive/volume, and particularly

b) when this drive/volume was last connected?

I found a similar question here: https://superuser.com/questions/1589626/how-to-discover-whe ...

Score: 0
mosquetero avatar
Verify in ExecStartPre if bash binary exists
it flag

I want my service to start only if another service is not active. To do so, as explained in this other question, I am going to do:

ExecStartPre=/bin/bash -xc '/usr/bin/systemctl is-active --quiet other-unit.service && exit 1 || exit 0'

However, there is a small possibility that the OS does not include /bin/bash. In that case, I'd like the service to start anyway. I was trying to achieve this b ...

Score: 0
John F. Arroyave Gutiérrez avatar
How to delete a project shared with me?
cn flag

Somebody shared with me a project and now when I try to delete it OR HIDE it I cant do that.

Does anybody knows how to hide that project from my list of projects? I'm not interested to see it anymore.

Thanks in advance

Score: 0
Jarmund avatar
Locating "Timeout on hotplug command"
rs flag

I have a set of machines identical in hardware, and almost identical in softare setup. But one of them is filling up /var/log/messages with:

Jun 16 09:41:37 h0stname kernel: pciehp 10000:00:00.0:pcie04: Timeout on hotplug command 0x13f8 (issued 10082 msec ago)
Jun 16 09:41:37 h0stname kernel: pciehp 10000:00:01.0:pcie04: Timeout on hotplug command 0x13f8 (issued 10082 msec ago)
Jun 16 09:41:47 h0stname ke ...
Score: 0
SMTP "root+:"|sleep 5 #"" what is meant by this query i found it in dataset of smtp protocol
ru flag

what is "root+:"|sleep 5 #" in SMTP, I have found this line in dataset of SMTP protocol I have attached a picture of dataset, any one who can help me by explaining whats happening in it. enter image description here

Score: 0
HP DL380G6 disks reuse to another array
us flag

I have a DL380G6 with p410i controller (windows OS).

HDD Config is:

  1. SAS Array A - 1 logical drive, RAID 5
  2. SAS Array B - 1 logical drive, RAID 1 (2 x 450GB HDD)
  3. SAS Array C - 1 logical drive, RAID 1 (2 x 900GB HDD)

I want to expand the capacity of Arrays B and C and I have 2 spare disks 1.2TB. I want to use these drives for Array C and then replace the 450GB disks with the 900GB that were used i ...

Score: 0
Phoenix5650 avatar
Hp switch - enable promiscuous interface but prevent possibile attack
eg flag

i'm facing a strange request my client have done to me and i would like some help. He ask me to put a probe in promiscuous mode in my ced between my network and the mpls than connect us and them for sniffing voip packet and analyze registration on rtp channel.

In my opinion this is a security issue, beacuse once it capture the source packet of my network and there are ton of possibility of attack ...

Score: 1
Omar Obeid avatar
How to remove the shutdown button from a Windows VM (on Azure)
ru flag

I have an a Windows 2016 VM on Azure that several users are RDPing into. The users are complaining that the VM shuts down at random times. When I check the logs, it shows that the shutdown has been initiated by the user! I would like to remove the option of shutting down the VM after RDPing into (remove the shutdown button). How can I achieve this?

Score: 0
Davood Falahati avatar
Suspicious users with numbers are devouring entire CPU
cn flag

On my test server which I have docker-run gitlab-ce, redis server and some other important services, I noticed I have an uninvited guest, kdevtmpfsi. I tried everything proposed by the community but I see kind of intelligence in this one.

I runs some processes under nonexisting users, it started by gitlab-+, but I killed all the processed with this user. Now, I see a different behaviour. It runs some p ...

Score: 0
Juniper EX4200 Stack with PFSense DHCP (Discover/Offer Loop)
cn flag

I'm currently struggling with my Juniper Switch Stack.

Topology is like this Topology

The Client Ports on the Stack are configured as tagged-access with dot1x (multiple supplicant) and they switch according to the Radius authentication. This works without a problem and VLANs get correctly assigned.

The 2 PFSense firewalls do provide one DHCP instance for every VLAN in failover configuration with an C ...

Score: 0
writingdeveloper avatar
Ubuntu SFTP hide unauthorized subfolders
ua flag

I currently run Ubuntu 20.04 Desktop server. And I am using the SFTP function by installing OpenSSH on the server.

For testing purposes, I temporarily created a directory called /home/mydirectory/storage, where I created subfolders, each of which had folder-name privileges.

For example I have named A,B,C folders and each A,B,C folders has A,B,C groups privilege. And I expected that if A group person ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.