Most Popular
1500 questions
51
votes
5 answers
Failed tls handshake. Does not contain any IP SANs
I'm trying to set up logstash forwarder, but I have issues with making a proper secure channel. Trying to configure this with two ubuntu (server 14.04) machines running in virtualbox. They are 100% clean (not touched hosts file or installed any…
connery
- 545
- 1
- 4
- 8
51
votes
5 answers
Is it possible to enable http compression for requests?
I see lots of information about enabling http compression for server responses but what about for incoming requests. Wouldn't it make sense for the browsers to compress large form posts before sending them to the server?
Another example is a REST…
Mike L
- 719
- 1
- 6
- 11
51
votes
7 answers
What are the practical differences between Maildir and Mbox?
Although I understand the basics of the two storage formats (1 file per email under Maildir vs. 1 single file per mailbox under mbox), I am wondering what the practical implications are here -
Is one storage format more scalable than the other?
Are…
olympe26
- 519
- 1
- 4
- 3
51
votes
7 answers
System process (PID 4) constantly accessing the hard disk
Recently I noticed some of our machines are getting sluggish, mainly after boot-up. Using the Resource Monitor I detected excessive disk access from the system process with PID 4. Following some tips, I disabled the anti-virus on the System Volume…
zmbq
- 675
- 1
- 7
- 9
51
votes
14 answers
Preventing brute force attacks against ssh?
What tool or technique do you use to prevent brute force attacks against your ssh port. I noticed in my Security logs, that I have millions of attempts to login as various users through ssh.
This is on a FreeBSD box, but I imagine it would be…
grieve
- 1,547
- 3
- 17
- 18
51
votes
4 answers
Create Unix Named Socket from the Command Line
Is there a command similar to mkfifo but for domain sockets?
benmmurphy
- 755
- 1
- 7
- 8
51
votes
2 answers
Construction workers filled my SAN with concrete and mineral dust
Update: EMC has dropped our warranty and support, so this is going to be an insurance case. Dell says's that we can get a professional cleaning agency to refurbish the servers and keep our warranty. Cisco says "maybe". HP is still silent :(
Final…
pauska
- 19,620
- 5
- 57
- 75
51
votes
7 answers
How to take full ownership of an IP address?
My business is... troublesome.
What I do is legal in every country on earth, but some people don't like it, and make it so tough on my poor ISPs that I am forced to go looking for new providers more often than I would like.
The only option I know of…
darkAsPitch
- 1,931
- 4
- 25
- 42
51
votes
6 answers
How to check progress of DBCC SHRINKFILE?
Is there a way to find out the progress of DBCC SHRINKFILE statement?
Here is how I was running it
dbcc shrinkfile('main_data', 250000)
I am running above statement on both SQL Server 2005 and 2008.
[UPDATE]
Here is the query I ran to check the…
dance2die
- 2,011
- 7
- 32
- 41
51
votes
6 answers
Why do we still have such small email attachment filesize restrictions?
What's the technical limitation preventing us, in the glorious year 2011, from emailing each other 1GB files?
Or is it just the main email platforms dragging their feet?
If I can set my inbox to grab headers only, and then full attachments if I want…
Drew
- 661
- 6
- 9
51
votes
4 answers
When to use delaycompress option in logrotate?
The man page of logrotate says that:
It can be used when some program cannot be told to close its logfile
and thus might continue writing to the previous log file for some
time.
I'm confused by this. If a program cannot be told to close its…
Anand Chitipothu
- 613
- 1
- 5
- 5
51
votes
3 answers
Ubuntu ufw: set a rule on a per interface basis
I want to create a rule that allows anyone on eth1 to access port 80. Can UFW do this or should I go back to using Shorewall?
To clarify: this is a capabilties question, can ufw handle interfaces as a target?
Antonius Bloch
- 4,680
- 6
- 29
- 41
51
votes
4 answers
run rsync as root but keep user ownership
I would like to backup user files from one server to another with rsync.
but I noticed that the user folders change to root.
how can I keep the user permissions with rsync (running by root)?
edotan
- 1,876
- 13
- 39
- 57
51
votes
7 answers
How to remove IIS/ASP.NET Response Headers
I have a couple IIS/6.0 servers that security is asking me to remove a couple of response headers that are sent to client browsers on requests. They are concerned about divulging platform information through response headers. I have removed all the…
Astra
- 683
- 1
- 7
- 9
51
votes
4 answers
How do I make cURL use keepalive from the command line?
I'm trying to verify that HTTP persistent connections are being used during communication with a Tomcat webserver I've got running. Currently, I can retrieve a resource on my server from a browser (e.g. Chrome) and verify using netstat that the…
Rob Hruska
- 683
- 1
- 5
- 10