Most Popular
1500 questions
59
votes
3 answers
Configure custom SSL certificate for RDP on Windows Server 2012 (and later) in Remote Administration mode?
So the release of Windows Server 2012 has removed a lot of the old Remote Desktop related configuration utilities. In particular, there is no more Remote Desktop Session Host Configuration utility that gave you access to the RDP-Tcp properties…
Ryan Bolger
- 16,755
- 4
- 42
- 64
59
votes
8 answers
Run a shell script as a different user
What's a good way of running a shell script as a different user. I'm using Debian etch, and I know which user I want to impersonate.
If I was doing it manually, I would do:
su postgres
./backup_db.sh /tmp/test
exit
Since I want to automate the…
Wadih M.
- 1,032
- 1
- 10
- 18
59
votes
2 answers
Should I use semicolons at the end of each PowerShell statement?
I've done a fair bit of programming in C#, but then I've also written a lot of T-SQL scripts. C# requires semicolons, and T-SQL and PowerShell they're optional. What do you do for PowerShell? Why? My gut feel is to include semicolons but I don't…
Mark Allison
- 2,188
- 7
- 26
- 45
59
votes
7 answers
dd on entire disk, but do not want empty portion
I have a disk, say /dev/sda.
Here is fdisk -l:
Disk /dev/sda: 64.0 GB, 64023257088 bytes
255 heads, 63 sectors/track, 7783 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size…
Jonathan Henson
- 979
- 2
- 10
- 16
59
votes
5 answers
Correct way to move kvm vm
I'm wondering what is the correct way of moving a VM between two KVM hosts without using any kind of shared storage
Would copying the disk files and the XML dump from the source KVM machine to the destination one suffice? If so, what commands need…
Onitlikesonic
- 1,201
- 5
- 17
- 24
59
votes
8 answers
What does "TTL expired in transit" mean on a ping attempt?
We get the message “TTL expired in transit” when we try to ping to a server in a different network segment. When we run tracert, 4 ip addresses repeat themselves indefinitely:
14 60 ms 59 ms 60 ms xxx.xxx.xxx.2
15 83 ms 81 ms 82…
Leonardo
- 695
- 1
- 5
- 8
59
votes
4 answers
logrotate daily and size?
If a logrotate config is specified with "size" and "daily" parameters, which one takes precedence? Where is this documented? I would like these rotations to occur as a boolean OR operation, ie, if the logs are a day old they get rotated, OR if they…
cat pants
- 2,273
- 10
- 35
- 46
59
votes
2 answers
How can I configure nginx locations to share common configuration options?
How can i configure a shared config block for a set of locations?
location / {
proxy_pass http://127.0.0.1:9000/;
proxy_redirect off;
proxy_set_header Host $http_host;
…
netbrain
- 753
- 1
- 6
- 11
59
votes
3 answers
Do Apache config files support block commenting?
You can use # to comment out individual lines.
Is there a syntax for commenting out entire blocks?
I've tired surrounding the block (specifically a block) with ... , but that didn't work.
ripper234
- 5,890
- 9
- 41
- 49
59
votes
9 answers
How do you recover you RDS master user username?
Resetting the RDS master user's password is simple enough, but how do you find your master users username?
mkirk
- 713
- 1
- 5
- 7
59
votes
3 answers
Soft limit vs Hard limit?
Can anyone explain in layman's terms what the difference between soft and hard limit is?
Should I set my soft and hard limit to be the same? Or should soft be significantly lower? Does the system benefit either way?
kidcapital
- 847
- 2
- 8
- 10
59
votes
6 answers
bash: variable loses value at end of while read loop
I have a problem in one of my shell scripts. Asked a few colleagues, but they all just shake their heads (after some scratching), so I've come here for an answer.
According to my understanding the following shell script should print "Count is 5" as…
wolfgangsz
- 8,847
- 3
- 30
- 34
59
votes
40 answers
How do you manage your passwords?
Obviously seeing as how many of us here are system administrator type people, we have a lot of passwords strung out across numerous systems and accounts. Some of them are low priority, others could cause serious harm to a company if discovered…
DWilliams
- 953
- 2
- 20
- 29
59
votes
6 answers
The corporate benefits of using MSI files
What are the advantages of using .msi files over regular setup.exe files?
I have the impression that deployment is easier on machines where users have few permissions, but not sure about the details.
What features does msiexec.exe have that makes…
Frode Lillerud
- 1,656
- 3
- 18
- 20
59
votes
1 answer
rsync - Exclude files that are over a certain size?
I am doing a backup of my desktop to a remote machine. I'm basically doing rsync -a ~ example.com:backup/ However there are loads of large files, e.g. wikipedia dumps etc. Most of the files I care a lot about a small, such as firefox cookie files,…
Amandasaurus
- 31,471
- 65
- 192
- 253