So I am currently gathering information in regards to renaming our AD domain name from company.net to company.local. I am reading through the docs on technet.microsoft.com and It states that I would need to prepare the new DNS zones before executing the domain rename. The question I am asking about is regarding the _msdcs subdomain _msdcs.company.net I have read posts of forums where people reported issues after renaming their domain and not having the _msdcs [...]Continue Reading »
I know the linux command echo “- – -” > /sys/class/scsi_host/host0/scan is used to rescan scsi host. But what does “- – -” mean in the command? Asked by Harold Chan The three values stand for channel, SCSI target ID, and LUN. The dashes act as wildcards meaning “rescan everything” A quick google search turns up this RHEL doc (and dozens of other answers) This is the same command described in Section 7, “Adding a [...]Continue Reading »
I am new to Linux but would like to configure a server with Centos 6 to replace a current one running old Fedora Linux Release 3 Asked by Munya Fedora 3 is ancient. You are basically going to need to start from scratch, but might be able to copy at least parts of the config files when configuring the new server (in most cases, I would not recommend to just copy the files, at least [...]Continue Reading »
Is it still considered a ‘port scan’ to have scripts trying to SSH in with a list of common account names or trying multiple passwords for ‘root’ or ‘mail’ (or similar)? I’m hoping to find a way to block these but I’m at a loss as to what to search for. When I imagine the term port scan I think of using NMAP (or equivalent) to find what’s open in iptables. Just curious if this [...]Continue Reading »
if i use any yum command, i get Loaded plugins: fastestmirror Traceback (most recent call last): File “/usr/bin/yum”, line 29, in <module> yummain.user_main(sys.argv[1:], exit_code=True) File “/usr/share/yum-cli/yummain.py”, line 285, in user_main errcode = main(args) File “/usr/share/yum-cli/yummain.py”, line 114, in main base.doLock() File “/usr/lib/python2.6/site-packages/yum/__init__.py”, line 1791, in doLock while not self._lock(lockfile, mypid, 0644): File “/usr/lib/python2.6/site-packages/yum/__init__.py”, line 1861, in _lock os.write(fd, contents) OSError: [Errno 28] No space left on device If i use the top command i see [...]Continue Reading »
If I have a GPO that contains a handful of user settings – if i apply this to a OU container which contains computer objects – will those User Policies then apply to any user who logs onto that Computer? Asked by TheD By default, no this will not happen. Fortunately, Group Policy Loopback Processing can be enabled, which will do exactly what you’re looking for. Answered by MDMarra Check more discussion of this question. [...]Continue Reading »
This is my specific problem I need to solve (But my question is different, so please read on even if you don’t know what fail2ban is): I’m trying to use fail2ban on a linux server to ban brute force attacks on multiple services (ssh, dovecot, apache, postfix, …). Now I stumbled over the problem that fail2ban seems to execute multiple iptables commands at the same time (with threads in Python) and this fails pretty often [...]Continue Reading »
I want to build the source of a package on myself (new version, some additions) but I want to use the ./configure options from the original package as a starting point. I can’t find anything in the source package, so where can I see the actual options used to compile a binary Debian package? The Name of the package is php5-cgi. Asked by Fu86 The options should be in the source package in the debian/rules [...]Continue Reading »
We have 4-5 people technicians using a server and as they share a single user account, one person logging in ends the RDP session for someone else. Which would be a better practice – Using multiple account or allowing multiple sessions for a single admin user? Asked by Tineye Windows lets you have multiple accounts (and simultanious accounts) for a reason. Give each person an account. This will allow for better auditing of who did [...]Continue Reading »
A new RedHat EL5.6 server has been recently put under my care. It is immediately obvious that, for the previous 12 months, little to no attention has been given to any sort of package updates. Typically I am of the mindset of if it isn’t broke – don’t fix it. However, after registering the server with RHN, and also using the yum-security plugin to check security updates, there are just over 1100 “security” updates available. [...]Continue Reading »
- SCP transfer only modified files
- How can I automate clearing and resetting a Linux user’s home directory to a default?
- Cron expression that runs every 5 minutes from 1:30 am – 6:00 am [duplicate]
- Understanding redundant power supplies
- Is there a way for administrators to disable users from installing Firefox extensions?