Latest Server related questions

Score: 0
John F. Arroyave Gutiérrez avatar
How to delete a project shared with me?
cn flag

Somebody shared with me a project and now when I try to delete it OR HIDE it I cant do that.

Does anybody knows how to hide that project from my list of projects? I'm not interested to see it anymore.

Thanks in advance

Score: 0
Jarmund avatar
Locating "Timeout on hotplug command"
rs flag

I have a set of machines identical in hardware, and almost identical in softare setup. But one of them is filling up /var/log/messages with:

Jun 16 09:41:37 h0stname kernel: pciehp 10000:00:00.0:pcie04: Timeout on hotplug command 0x13f8 (issued 10082 msec ago)
Jun 16 09:41:37 h0stname kernel: pciehp 10000:00:01.0:pcie04: Timeout on hotplug command 0x13f8 (issued 10082 msec ago)
Jun 16 09:41:47 h0stname ke ...
Score: 0
SMTP "root+:"|sleep 5 #"" what is meant by this query i found it in dataset of smtp protocol
ru flag

what is "root+:"|sleep 5 #" in SMTP, I have found this line in dataset of SMTP protocol I have attached a picture of dataset, any one who can help me by explaining whats happening in it. enter image description here

Score: 0
HP DL380G6 disks reuse to another array
us flag

I have a DL380G6 with p410i controller (windows OS).

HDD Config is:

  1. SAS Array A - 1 logical drive, RAID 5
  2. SAS Array B - 1 logical drive, RAID 1 (2 x 450GB HDD)
  3. SAS Array C - 1 logical drive, RAID 1 (2 x 900GB HDD)

I want to expand the capacity of Arrays B and C and I have 2 spare disks 1.2TB. I want to use these drives for Array C and then replace the 450GB disks with the 900GB that were used i ...

Score: 0
Phoenix5650 avatar
Hp switch - enable promiscuous interface but prevent possibile attack
eg flag

i'm facing a strange request my client have done to me and i would like some help. He ask me to put a probe in promiscuous mode in my ced between my network and the mpls than connect us and them for sniffing voip packet and analyze registration on rtp channel.

In my opinion this is a security issue, beacuse once it capture the source packet of my network and there are ton of possibility of attack ...

Score: 1
Omar Obeid avatar
How to remove the shutdown button from a Windows VM (on Azure)
ru flag

I have an a Windows 2016 VM on Azure that several users are RDPing into. The users are complaining that the VM shuts down at random times. When I check the logs, it shows that the shutdown has been initiated by the user! I would like to remove the option of shutting down the VM after RDPing into (remove the shutdown button). How can I achieve this?

Score: 0
Davood Falahati avatar
Suspicious users with numbers are devouring entire CPU
cn flag

On my test server which I have docker-run gitlab-ce, redis server and some other important services, I noticed I have an uninvited guest, kdevtmpfsi. I tried everything proposed by the community but I see kind of intelligence in this one.

I runs some processes under nonexisting users, it started by gitlab-+, but I killed all the processed with this user. Now, I see a different behaviour. It runs some p ...

Score: 0
Juniper EX4200 Stack with PFSense DHCP (Discover/Offer Loop)
cn flag

I'm currently struggling with my Juniper Switch Stack.

Topology is like this Topology

The Client Ports on the Stack are configured as tagged-access with dot1x (multiple supplicant) and they switch according to the Radius authentication. This works without a problem and VLANs get correctly assigned.

The 2 PFSense firewalls do provide one DHCP instance for every VLAN in failover configuration with an C ...

Score: 0
writingdeveloper avatar
Ubuntu SFTP hide unauthorized subfolders
ua flag

I currently run Ubuntu 20.04 Desktop server. And I am using the SFTP function by installing OpenSSH on the server.

For testing purposes, I temporarily created a directory called /home/mydirectory/storage, where I created subfolders, each of which had folder-name privileges.

For example I have named A,B,C folders and each A,B,C folders has A,B,C groups privilege. And I expected that if A group person ...

Score: 1
user32882 avatar
Unable to push docker image into GCP container registry [permission error]
cn flag

I am trying to push a docker image into my container registry on google cloud platform. I am able to build my image successfully on my local machine. I tried the following command:


I get a permission denied error:

unauthorized: You don't have the needed permissions to perform this operation, and you may have invalid credentials. To authentica ...

Score: 0
Kakenx avatar
Firewall "any any" rules - Should I remove all these rules?
jp flag

I inherited a server from another dev that left. And the hosting is telling me to remove all these firewall rules, because these can cause security problems. Not sure if I'm understanding this correctly, but wouldn't removing all these rules also block users trying to access the websites on the server and even email access?

access-list 101 extended permit icmp any any object-group ICMP-ALLOWED

acc ...
Score: 1
Elon20 avatar
What is the exact meaning of "On Commit" in ISC DHCP server configuration?
vu flag

I know there are three kinds of events we can use for scripting in ISC dhcpd -- commit, expire and lease. My problem is, I am having a little problem in understanding the "commit" event. I know "commit" event means when the server has made a commitment of a certain lease to a client. But it would be easier to understand this in DORA context.

That means, when the "commit" event will trigger in ISC DHCP s ...

Score: 0
sloweriang avatar
Using ansible loop until with stdout_lines
de flag

I am trying to use ansible loop until the condition is met. I can use until if the output is only single line, however if the output is multiple lines, I will need to use stdout_lines but fail to do so.

If output is single line:

- name: check on sync status
  shell: some command
  register: sync_status
  until: sync_status.stdout == 'SSUS'

If output is multiple lines, then I try to use stdout_lines

Score: 1
How to solve "The forward DNS lookup (domain name to IP address) of your IP should match the HELO value set in your server." issue
gg flag

My IP is blacklisted in spamhouse

this is the message they sent me but I have no idea how to fix it

my domain is

my domain ip is :

I did setup DKIM and SPF correctly and they are working (tested with gmail)

I send emails as

My server is windows server 2019

I use default SMTP of the windows server 2019

Please help me to make necessary changes ...

Score: 0
How do I get a normal disk going (PERC H710 Mini) with perccli?
ve flag

I have a Dell PowerEdge R720 which boots up and has 1.7 TB of drive space but I can't seem to get any of it and use it. When I try and install Fedora there are no available drives to install it to.

I need to use perccli to run a command to make either all or some of this 1.7 TB available as a drive right?

I ran "perccli64 /c0 add ...

Score: 2
Windows Server 2019 2 node failover cluster offline after some reboot
pt flag

I have 2 windows server 2019 on VirtualBox. I have configured the failover cluster and it's working. I'm testing the failover and failback. These are the steps I have done after completing the configuration (Testing with IIS website).

  1. Start Node 1 (Only Node1 on, Node 1 Website Available on virtual IP)
  2. Start Node 2 (Both Node on, Node 1 Website Available on virtual IP)
  3. Shutdown Node 1 (Only Node2 on, N ...
Score: 0
Distributing load over multiple load balancers
se flag

Given a website that could have many hundreds of thousands of concurrent users at peak times how can one manage the laod where load balancer resources can only support 40,000 concurrent connections? (System spec, out of my control)

The only method I can think is to round robbin style redirect all incoming traffic to one of X subdomains (eg., where each s ...

Score: 0
I Own I Owe Oh My avatar
Cannot Access Mail Folder Content Since Dovecot Switched From MAIL to MAILDIR During Update
it flag

*See UPDATED & UPDATED AGAIN to jump to the issue at hand.

Just discovered that my mail app(s) are not displaying all of my messages in my SENT box(S) and maybe other boxes.

For example when using Mac Mail "Account Info" shows that one of the "Sent" boxes is only 97 KB and contains only 8 Messages but on the server the "Sent" box is 179M and I know contains a lot more than 8 Messages.

Running Dovec ...

Score: 0
duct_tape_coder avatar
What is the difference between "Apply image" and "From" when generating a windows docker image?
cn flag

Recently I have been examining the manifests of images on docker hub to verify the base image matches my hosts. I have noticed a large number of manifests (e.g. start with "Apply image" (e.g "Apply image 20H2-amd64") vers ...

Score: 1
Are Windows GPOs encrypted?
de flag

We have a piece of COTS software that has a command line tool for server credential rotation. Instead of going to each machine to rotate the credentials with the tool, I would like to use GPO to run a script to do so. However, I would need to place the new credentials in the script, so I am wondering if the script files stored in the GPO are encrypted at rest. I have not found any authoritative document ...

Score: 0
Tom avatar
Restrict access via HTTP 0.9 and HTTP 1.0 on Apache
bf flag

Is it possible to block any access other than HTTP 1.1 and HTTP/2 on Apache, for all VirtualHosts?

I added the code below to apache2.conf, but I still see IP requests coming via HTTP 1.0

#Block HTTP 0.9
RewriteEngine On
RewriteCond %{THE_REQUEST} HTTP/0\.9$
RewriteRule .* - [F]

#Block HTTP 1.0
RewriteEngine On
RewriteCond %{THE_REQUEST} HTTP/1\.0$
RewriteRule .* - [F]
Score: 1
turtlemcnuggets avatar
Does editing files over SSH transfer them to the local machine?
bz flag

If I were to edit files over an SSH connection, lets say either SSH'ing into the remote and editing files using Vim or using VSCode's remote development feature, are the files actually being transferred to the host machine (even if they are just being held in memory) and sent back after they have been changed? My fairly limited understanding of SSH would say that yes of course it would have to, but I  ...

Score: -1
Why are messages delivered to an address that doesn't exist?
iq flag

here are the headers from a message I received recently:

Return-Path: <>
Received: by (Postfix, from userid 1005)
    id 4G4B044ygFz5y8l; Tue, 15 Jun 2021 07:43:48 -0700 (PDT)
Received: from (unknown [])
    by (Postfix) with SMTP id 4G49zp2HXbz5vYk
    for &l ...
Score: 0
Internal Access to Published Services: Direct vs Bouncing Off Firewall
in flag

We have, as is common, two DNS infrastructures, one for internal resolution and another, non-forwarding, authoritative server for our public domains.

This question is about the comparative merits of two different approaches for our internal hosts to access our public services:

  • Some services have been set up so that internal hosts are given an internal address for the service (ie. a direct route to the s ...
Score: 0
zerodoc avatar
Adding mirrored array to an up and running Qnap system
cn flag

We had 2 Qnap Nas running side by side. 1 was a TS-251 and the other is a TS-451. Both are using 2 bays in a RAID 1 configuration. The 251 had a hardware failure and will not boot up. These two systems are compatible according to the Qnap tool and both had recent firmware.

The question is, can I add the TS-251 RAID 1 array to the spare 2 slots in the TS-451 and be able to access the data on both  ...

Score: 0
Secondary network interface can't be pinged with Amazon Linux 2 AMI
ru flag

Short story: both private IP addresses on primary network interface can be pinged, but both private IP addresses on secondary network interface cannot be pinged.

Long story:

Based on this aws documentation, using Amazon Linux 2 AMI, it will automatically configure additional network interfaces and IP addresses.

With a micro ec2 instance, theoretically it can have 4 private IP addresses (2 network inter ...

Score: 0
Tom avatar
Block access directly via IP on Apache server
bf flag

I have a Load Balancer provided by Digital Ocean that has a public IPv4, which can be accessed via HTTP and HTTPs by any user (there is no way to block at source).

To prevent users and scripts from accessing the server directly via IP, I added a rule in VirtualHost on Apache servers (VPS).

In my tests, the return is always 403, that is, theoretically the IP access block worked.

But I noticed that there ...

Score: 0
uday avatar
Dpinst is showing the UI screen even after sending silent parameters, how to fix that?
ke flag

The OS version:


The Dpinst window I am seeing:


The command I am using to suppress the window, but not working here.

"C:\Program Files (x86)\Common Files\IA\Eclipse\FTDI Drivers\dpinst64.exe" /S /Q /SA /LM /SW

With or without /Q same issue

Score: 1
Converting "docker run -v external_folder:internal_folder
cn flag

I have the following docker run command:

docker run -dit
-v $PWD/etc/ipsec.conf:/etc/ipsec.conf:ro
-v $PWD/etc/ipsec.secrets:/etc/ipsec.secrets:ro
-v $PWD/etc/ipsec.d:/etc/ipsec.d:ro
-v $PWD/etc/ipsec.d/certs:/etc/ipsec.d/certs:ro
-v $PWD/etc/strongswan.conf:/etc/strongswan.conf:ro
-v $PWD/etc/strongswan.d/charon-logging.conf:/etc/strongswan.d/charon-logging.conf:ro
-v $PWD/etc ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.