Latest Server related questions

Score: 0
snuffleupagus yelling about disabled functions in phpmyadmin setup
in flag

What I am working on is a self setup arch with a LAMP stack, onto which I also want to add phpMyAdmin, and it is complaining about some disabled functions.

Here is the file after I have commented out everything phpMyAdmin was complaining about, compared to the recommended default.

I am not entirely sure why phpMyAdmin complains about these defaults but I have also tried a brief installation of matomo and ...

Score: 0
home networking issue - can't redirect wifi sites to website
my flag

First, I am an amateur when it comes to networking/routing. I have an Internet-accessible website on a home computer that I use to test html/javascript/etc. I have a domain name and a static IP from my ISP. The network is currently set up like this:

Smart/RG SR400ac - this is the router/modem and connects to the outside Internet. The only device plugged into it with an ethernet cable is a Netgear R6900 ...

Score: 0
hackerone member avatar
If i find port X open on an ip address, is it safe for me to assume that i will find a web server at domian:X where domain resolves to the ip
de flag

Lets say www.example.com resolved to 36.45.6.x, and i port scanned that ip and ports 80,443,8080 came up and nmap tells me they all have http web servers running on them, is it safe for me to assume that if i visit http://www.example.com https://www.example.com http://www.example.com:8080 a webserver will reply? like can an ip have port X open but in order for me to access it via hostname i have to go ...

Score: 0
Jankiel Goldman avatar
What is this SSH syntax?
us flag

customer has a kind of proxy system for securing access. The way it access is as bellow from powershell (OpenSSH_for_Windows_8.1p1, LibreSSL 3.0.2):

ssh myAllowedUser[[email protected]]@xx.xxx.xx.198

Where is this syntax from? I've tried to replicate this, thinking if it was a ProxyJump, without success

-J [user@]host[:port]
             Connect to the target host by first making a ssh co ...
Score: -1
Windows 10, before browsing, hard drive size 120 GB, after browsing facebook and watching some videos, size is 125GB
eg flag

I have Win10, when I turn on my laptop, C drive has 120GB, after browsing some videos on facebook and youtube, it gets to 125GB. After I restart my computer it gets to 120GB, why is that?

Score: 0
Access mysql from another computer connected with crossover cable
cn flag

I have two computers, and i am trying to access mysql via network on port 3322 (mysql listens on this port)

Computer A Server: Windows 10 home Added firewall exception to port 3322 (mysql installed and listens on this port) Static IP address: 192.168.0.1 Subnet mask: 255.255.255.0 connected via onboard ethernet port

Computer B Client: Windows 10 home Static IP address: 192.168.0.3 Subnet mask: 255. ...

Score: 1
The same message delivered multiple times on postfix
in flag

I have a problem with the postfix server I manage.

Server was working fine for over 4 years, but recently I have one issue with it.

Some e-mail messages are delivered on "my '' server many times. Those multiplied messages come from some big providers like amazon ses or zoho mail. I have found a similar thread on zoho forum, but it ends with a private message to zoho admins and I can't see how this s ...

Score: 0
TRONG NGUYEN avatar
Ansible regex_search module
cn flag

Can anyone please help me to explain this code in ansible regex_search module:

- set_fact:
    regex: "{{ '/opt/conf/path.txt' | regex_search('/?(.*)', '\\1') }}'
  • What "\\1" means in this code.
  • What is the function of each special letter in '/?(.*)'
Score: 1
Best way to reformat a JSON with Ansible?
cn flag
raw

I have this JSON in a variable :

{
"device_vlans": {
    "1": {
        "name": "default",
        "interfaces": [
            "GigabitEthernet1/1",
            "GigabitEthernet1/2",
            "GigabitEthernet1/3"
        ]
    },
    "20": {
        "name": "VLAN20",
        "interfaces": [
            "GigabitEthernet1/2"
        ]
    },
    "30": {
        "name": "VLAN30",
        "interface ...
Score: 0
Maestro avatar
Firewalld port forwarding to virtual IP
gs flag

I'm trying to replace an existing AutoSSH tunnel with firewall rules:

firewall-cmd --zone=public --add-forward-port=port=9999:proto=tcp:toport=9999:toaddr=100.1.1.1

This should forward all incoming TCP connections to 100.1.1.1

The problem is that it does not work (the port stays closed). I'm trying to understand what I'm doing wrong, and the only thing I can think of is that the destination IP address is ...

Score: 0
The security database on the server does not have a computer / workstation trust relationship - on a domain controller
pt flag

"The security database on the server does not have a computer account for this workstation trust relationship"

This is the message I am getting when I try to log into the only domain controller we have on the network. I have seen this before on workstations and have successfully repaired the trust relationship by unplugging the ethernet cable, logging into the workstation, reconnecting the ethern ...

Score: 0
Brad Silva avatar
Is it possible to identify what KBs are included in a Windows rollup patch (or is that not the right way to look at this)?
br flag

I have some software that is known to conflict with a specific patch (KBxxxxx), so until the vendor comes out with an update that fixes this conflict, I have to avoid installing that patch.

I'm assuming that Windows rollup patches include a stack of the various KB patches, but I haven't been able to identify a way to see what KBs are included.

I really don't want to not install patches, although tha ...

Score: 0
Exchange traffic between tun0 and tun1 using iptables
cn flag

I have two vpn's that I've created each of which accomplishes their own networking goals. tun0 forwards all traffic to a socks5 proxy and tun1 accepts vpn connections. These interfaces are created inside of a docker container. tun0 seems to be fully operational without any extra configurations. However I am experiencing some issues with tun1...

  1. Although I am able to connect to the vpn server (tun1) I ...
Score: 0
IPs blocked automatically by my firewall are all from Cloudflare
cn flag

I have a website that uses Cloudflare, in my host level firewall I have noticed that all IPs automatically detected as malicious are identified as "owned by Cloudflare" and I don't know how this is possible.

Does this mean that simply Cloudflare blocks all others malicious attacks but is unable to filter bad actors to perform attacks hidden by their CDN services?

...or these could be false positive ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.