Latest Server related questions

Score: 0
How to use DNS to reference instances of a Server
gb flag

I would like to use our internal DNS server for linking names from provisioning to final use. So I imagine it like this.

A server comes into our network and gets a DHCP or a static address and then has a DNS entry with its hardware name, for example ilocz1234xyz with an HP server. Later the server is provisioned and gets a name and a function in the process. I would like to merge these names. we  ...

Score: 0
On RHEL/CentOS/Oracle Linux installer Software Selection screen, what do the packages/environments actually install?
cn flag
GDR

When installing Oracle Linux, at one point you need to choose the software. What actual packages are actually installed when you select Server, Minimal Install, and the subpackages such as Standard or Headless Management?

SOFTWARE SELECTION screen in Oracle Linux 8.6 Installation utility

Score: 0
Piotror avatar
How to resize partition to maximum size on Debian 8?
us flag

My question is how to resize partition on Debian 8 without losing any data? I have 90 GB partition but my disk has 150 GB space on VPS server, so 50 GB is free and I want to add this 50 GB without losing any data, this is how it presents:

2

I've tried using resize2fs command but this didn't helped me because it shows me an error :

Filesystem is already n blocks long. Nothing to do!

I've already ex ...

Score: 0
PowerShell on Windows: Start-Process fails if output redirection arguments are used
rs flag

Why does Start-Process fail to find the executable (not in the path) if -RedirectStandardOutput or -RedirectStandardError are specified?

I.e.

[X:\] Start-Process -FilePath "prog.exe" -WorkingDirectory (Get-Location).Path

The program starts & executes as it should. But when I add output redirection, everything falls apart:

[X:\] Start-Process -FilePath "prog.exe" -WorkingDirectory (Get-Location).P ...
Score: -2
Sahin avatar
Will Disabling All Non-256-bit Cipher Suites Cause An Issue?
in flag

I want to disable some risky cipher suites (especially for TLS 1.1 and 1.0) which are 128-bit, in order to achieve a more secure server in Windows. But these cipher suites may be used by some client. They probably use a 256 bit version of some cipher suite. I just want to be sure this won't cause a problem.

Score: 0
Quicksight Error: This user name already exists in this account
ge flag

When I want to login to view my Quicksight dashboard I get this error:

This user name already exists in this account.
Contact your QuickSight administrator, and ask
them to invite you with a unique name.

I have searched this error online but there was no answer for it. Here is a screenshot of the error: enter image description here

Score: 0
Monitor session duration on AWS Cognito
ge flag

I am using AWS Amplify to host an Angular application and using Cognito user pool. I have created a dashboard on Amazon Quicksight for BI purposes. One of the metrics that I want to monitor is how much time a user spend in the application. Obviously I can't calculate the time that the user log out because not many users log out once they are done with the app. Do you have any idea on how I can achieve t ...

Score: 0
NAT-Reflection on Cisco ASA 5508-X
cn flag

We have 2 internal networks in our environment. 10.1.x as a main network (with different vlans) and 192.168.1.x/24 as WiFi for our travelling users. Both are connected to our Cisco ASA 5508-X and then connected to WAN

Our ERP server provides an app, which contacts a DynDNS Address and is then redirected to our server IP in 10.1.x network. If the app is executed while in 10.1.x networks, it can lo ...

Score: 0
Sahin avatar
How To Disable Weak Cipher Suites Only For TLS 1.0 and 1.1 In Windows?
in flag

I want to disable some weak cipher suites in Windows but TLS 1.2 is not so vulnerable and I don't want to cause any other problem in the server, so I just want to disable them for TLS 1.0 and 1.1.
Disable-TlsCipherSuite command works but disables a cipher suite for all TLS versions.

Score: 0
ChrisTG74 avatar
Variable expansion in Apache2 log file request based
br flag

I'd like to have custom log files for every user accessing a virtual host. The user name is present in environment-variable "SSL_CLIENT_S_DN_CN" (coming from client certificate authentication). So first I tried something like

 CustomLog /var/log/apache2/by_user/%{SSL_CLIENT_S_DN_CN}x.log \
      "%t %h %{SSL_CLIENT_S_DN_CN}x %{SSL_PROTOCOL}x %{SSL_CIPHER}x %H \"%r\" %b"

which obviously does not work s ...

Score: 0
Jose Matinez avatar
¿what is kubernetes based on when assigning a pod to a node?
cn flag

I would like to know what criteria kubernetes has when assigning pods to a node if no daemonset, node selector or anything similar is configured.

Score: -1
Intolighter avatar
How to send packets to internet through nat adapter from subnet connected by lan adapters
jp flag

I need to implement this network. All computers should have access to internet. Currently, I can access it only through G. I have this default route on G. When I'm trying to tracert google.com, packets stop on 1 and 2 adapters of G and that's all.

Score: 0
Figure out ways to forward traffic through proxy for Home network from external 3rd party
cn flag

I noticed all my traffic goes through one ip address which seems a proxy and this proxy is not set up neither by me or my provider (I contacted them on this issue). I want to figure out who and how did this and as a first step I want to understand options to forward traffic from private home network to the proxy from 3rd party.

Environment:

  • I time to time work from different locations. From one of this  ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.