CimmerianX 197 Junior Poster

no-ip.org is a dynamic dns provider offering free service. I use it with success. You just have to type in a code every month when they send you a reminder email.

CimmerianX 197 Junior Poster

Work was throwing away the HP tablets when webos was dropped. I grabbed one from the trash, loaded Cyanogen on it, and use it to read comics online. It really serves no other purpose.

CimmerianX 197 Junior Poster

Somehow - Jorge always beats me to the answers.... OP, do follow JorgeM's post, it's spot on.

CimmerianX 197 Junior Poster

Try this tool... it's never failed to create a bootable USB for me.
http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/

rubberman commented: Good recommendation. +12
CimmerianX 197 Junior Poster

This is the way I do it:
http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/

The application has a pulldown for many popular distros including backtrack.

CimmerianX 197 Junior Poster

This is either a homework question, or you are in way over your head if you are asking questions like that.

CimmerianX 197 Junior Poster

Start from the public internet and work your way into your network. IF this is just a hardware layout, then show the routers, firewalls, LBs, switches, etc... and the interconnects between each.

Look at some examples on google images for ideas

CimmerianX 197 Junior Poster

Don't use password auth, use keys instead.

This article explains it all.

http://www.thegeekstuff.com/2011/07/rsync-over-ssh-without-password/

CimmerianX 197 Junior Poster

To recover Passwords in Yahoo you need:
1) The secret question answer
2) You must have setup a secondary, backup email address. You can send a password reset request there.

Without those items, you are out of luck and the email is a loss.

CimmerianX 197 Junior Poster

Are you using RHEL as the HOST os (the one running on physical hardware) or as the Guest os (the one running virtual)?

What software are you using for virtualization?

What do you want to know exactly, your question is not understood.

CimmerianX 197 Junior Poster

Well done Jorge.

CimmerianX 197 Junior Poster

Also, if you are using ubuntu 12 or better, dns entries are made in \etc\network\interfaces now.
i.e.
'dns-nameservers 4.2.2.1 4.2.2.2'

CimmerianX 197 Junior Poster

1st thing is to get the latest drivers for your wifi adapter. Usually had from the manufacturer's website.

CimmerianX 197 Junior Poster

Who is your email provider? Gmail? Somebody else? The info you need should be easily had from the host's website or forums. Also, as a side note, most hose ISPs block outbound port 25. So you probably need to and should use SMTP over 587.

CimmerianX 197 Junior Poster

Agree with you there.... this is an odd odd odd request.

To block just the google images web site, it would be easy enough to block the dns lookup with a hosts file entry or a simple URL block on the perimeter router. Blocking all images from all sites seems crazy to me.

CimmerianX 197 Junior Poster

I dont think you get that level detail.

Also, to restrict what users can sign into what machines, you use the PC's local security policy in:
Local Policies -> User Rights Assignment -> Allow log on Locally.

You'll want to leave administrators on there, and remove Users and guests, and then add in the domain\username for those allowed.

I've done this for C-level Execs in the past and it works well even if it is a an administrative headache.

CimmerianX 197 Junior Poster

Even now, you can get monitors that conect via USB, so it's limited only by the power of the host.

dchrismoore commented: Using USB display devices will ultimately be limited by the speed and power of the bus. How many of those can the interface support? +1
CimmerianX 197 Junior Poster

Grab the ISO or torrent file from http://www.ubuntu.com/download/server

CimmerianX 197 Junior Poster

What you are describing is some kind of software based RAID since I've never heard of any hardware based solution supporting a setup like that.

I would clone my existing setup to the newer drive with faster RPM. Once that is tested, you can but the slower drive to use as the 2nd data disk. I would forget about the RAID and just stick with a good backup schedule.

I use to game alot, and even though raid0 is sweet, having a single disk never bothered me as it really doesn't come into play when trying to get the most FPS.

CimmerianX 197 Junior Poster

Raid 0 is taking 2 drives and making 1 logical volume across the 2 drives.

This gets you more spindles for reading/writing but also doubles your change for a failure since if you lose even 1 disk, the entire volume is dead. This setup is good for gaming rigs that have no valuable data or for a system that is backed up religiously.

You can also do Raid 1. This is a disk mirror that 'mirrors' data from 1 disk to the 2nd. This will slow down writes but speed up reads. IT also will protect you in the event 1 disk fails.

In either scenario, the speed of the 2nd disk won't prevent you from setting this up.

CimmerianX 197 Junior Poster

Do this.

At the top of your php script, add the line
"#!/usr/bin/php"

That will set the environment up so the script 'knows' what it is.

Then in cron, just issue the script.
1 * * * * /var/www/cronjob.php

Make sure the .php is set with execute permissions (as DoRight said above):
chmod +x /var/www/cronjob.php

and you should be good.

CimmerianX 197 Junior Poster

IF a Blue Screen of Death (BSOD) happens once, then you reboot and keep working and not see it again. Just shrug it off.

If you get a repeated BSOD, then look at the 0x0...... error code. Lookup the error code on google as this can help with troubleshooting.

Any new applications/services installed?
Have you run a full malware/virus sweep on your system?
Have you Run a memtest?
If you suspect memory, try removing half of the mem and running to see if BSOD appears. Now try to the other half. this is a method to ID flakey chips, but a Memtest is better.

CimmerianX 197 Junior Poster

I don't need a program to force me to look away from my screens every 15 minutes. The end users interrupt me enough anyway.

CimmerianX 197 Junior Poster

FTP still has it's uses.

If you are going to do this, I suggest chroot-ing the users into their home directories to limit their access along with making sure the ftp logins do not match the system logins.

http://wiki.centos.org/HowTos/Chroot_Vsftpd_with_non-system_users

CimmerianX 197 Junior Poster

Sounds like the iso/disk is damaged. If you have the original ISO, you can use the .iso file and mount it directly to the Guest OS without having to burn it first.

windowsserver commented: thanks +0
CimmerianX 197 Junior Poster

So long as you let it dry completely before plugging it in (passing current), there is no danger. Water only harms electrical equipment when there's current and the water creates a short.

ujjwale commented: with you. +0
CimmerianX 197 Junior Poster

I'm only famliliar with printer pooling .... This seems like a very unique request. I know that with Certain queue management 3rd party software you can dupliate jobs on the fly....

I suppose someone could write a small app that would listen on the local port 9100 for inbound print jobs (simlualting a printer on your local port) store that job then redirect it back out to 2 other printer IPs on 9100. Doesn't seem too difficult a task.... But I've never heard of anyone actually doing that.

tristanhall commented: i'll look into this in the case that printer pooling doesn't accomplish this. thank you +0
CimmerianX 197 Junior Poster

No. Don't do that. Do not reset the router. All you need is to replace the SSID and Security crednetials back to originals. Since you don't have these you need to get them from the family. If they don't remember it, then you can select a new SSID and new Pre shared key and go around to every device and setup the wifi again. A Pain I know, but you have no other option without the original PSK.

Most routers have a backup/restore option too. IF the family was smart, they backed up the router's current config somewhere. You could also use that to restore if it exists.

CimmerianX 197 Junior Poster

Can I offer another suggestion.... IF you are looking for just a speed increase, Corsair offers a Caching SSD option. It's a small SSD drive that will cache files read from a larger HD. You install the SSD, run the caching software (only works in windows) and the files used most often are cached and read from the SSD. It's a cheap way to speed up a machine. I"ve seen this used and it cuts the OS load time in Half. Frequently accessed files (like your email app, office) loads fast.

http://www.corsair.com/SSD/accelerator-series-SSD-cache-drives.html

JorgeM commented: great suggestion as a valid option based on the discussion. +12
CimmerianX 197 Junior Poster

In backtrack (or any linux distro), a directory with a . as first character is hidden.

You can list all files, including hidden files, with ls -la

CimmerianX 197 Junior Poster

Cloud networking can mean many different things:

1)the use of a cluster of servers for virtual machines (like VMware, KVM, Xen)
2)The use of a 3rd party server for file storage (iCloud, Dropbox)
3)The use of external database servers (or servers for any purpose for that matter) (Amazon EC2)
4)The use of virtual workspace regardless of location.

The 'cloud' is a marketing term that I personally hate. The ability to run services independent of physical hardware, however, is the shit. And I say that with 20+ years of networking expertise behind me.

http://www.pcmag.com/article2/0,2817,2372163,00.asp

CimmerianX 197 Junior Poster

Unless I'm missing something.... It doesn't matter what tool you are using, ultimately, you are still trying to establish a secure ldap session using the fqdn on the cert.

A few things to remember, you need to trust the root CA (your CA Server). If your php solution doesn't take this into account, you will get warnings.

Also, the php solution must use the name on the cert. IP addresses or netbios names will not work.

bornie21 commented: thanks for the reply. Apart from compiling PHP with ldap enabled on Apache is there something that I am supposed to do +0
CimmerianX 197 Junior Poster

Using "Disallow: /foo/" would block the foo directory and everything in it.

Technically, without the trailing slash, Disallow blocks the 1 item, such as a single file. I would assume this would indicate a disallow on a single file named foo not the directory /foo/.

You can also use "Disallow: /foo*/" to block any subdirectory that began with "foo".

BTW, google has some webmaster tools available that will test the robots.txt file and report on the results. http://www.google.com/webmasters/

Dani commented: Thanks! +15
CimmerianX 197 Junior Poster

Also, if you don't know the package name, then use the following

apt-cache search [search term]

CimmerianX 197 Junior Poster

So you need to ALTER TABLE (or whatever) and create the new fields for password and filename. Then re-import the data again.

CimmerianX 197 Junior Poster

Encryption refers to the process by which certain files, or the entire HArd drive is 'scrambled' so that the contents could not be read without the proper credentials.

MAC includes filevault for this. It does the job and is integrated into the OS. IF you lose the credentials, you cannot read the HD or its contents.

Truecrypt is an opensource alternative for that same purpose. If you are on MAC, look at filevault and understand what it will do before you activate it.

CimmerianX 197 Junior Poster

As a 20 year Network admin, you should know all about running cable. That being said, I always outsource layer 1 stuff to a 3rd party. They will usually do it faster, and it will cost less than your valuable time.

Network admin's main job is to keep the network up and usable for the end users. And if that means having to run the odd cable once in a while, you do it.

CimmerianX 197 Junior Poster

Google latitide will report on other's locations. Use it to keep tabs on your kids for example.

ATT has a pay for user locator.

2 off the top of my head

CimmerianX 197 Junior Poster

Antivirus programs are usually 'Active'. This means that the program starts with the OS, is always running in the background, constantly checking files, webpages, downloads, etc.... it is always running. If you have 2 of these running at the same time, they start to step on each other every time they both want to check the file you just opened.

Antialware (i.e. malware bytes) is usually passive. You load up the antimalware run your scan, then you are out. Some, like spybot, can manipulate certain files (i.e. hosts file) to help protect you, but again you are in, run it, then you are out. Some malware apps do have a feature to always run in the background, but it's not a requirement like AV.

Firewalls enable/disable certain traffic. You only need 1 firewall. If you have 2 you double the complexity, but get no additional return.

CimmerianX 197 Junior Poster

Is it a single jack for the headset or 1 jack for mic and i jack for speakers? If it's a single jack, then I agree with Stuugie, sounds like a defective headset. If it's dual jacks, just switch plugs.

CimmerianX 197 Junior Poster

We need much more info. What does the screen show while booting? Where does it stop? Can you post some screenshots?

CimmerianX 197 Junior Poster

Have you tried
net user <user> "this is the password"

I don't know if that will work but worth a shot. ALthough you may end up with a password being "this

CimmerianX 197 Junior Poster

That makes no sense. Whoever said that is 100% wrong.

A Switch is a layer 2 device. A router is a layer 3 device. Getting a router connection means that all lower layers are working properly.

MACs and PCs can speak the same SMB or Bonjour protocols if that's what you mean....

CimmerianX 197 Junior Poster

The servers need physical conenctivity. I am assuming the 2 hosts each have internet conenctivity only. Is that correct?

How do they connect to the internet? What equipment to you have to work with? Do they have static, public ips? What do you expect these servers to do with each other once connected? Will end users at each site need access to the other server or is it just server to server?

Curty Brown commented: its connected staight to the internet. ive not given them static adress as yet. i will view camera feed from the other server. the access will b only viewing the camera feed from th other server +0
CimmerianX 197 Junior Poster

Sounds like the OP is after an itunes replacement, not just a media player.

VLC is the best player for a PC regardless of OS. It plays anything. However it will not manage your media like itunes, nor will it connect to various 'stores'.

The problem with the ipods is that apple changes the database structure of the device with a recent firmware update. 3rd party apps that could transfer music to and from the device no longer worked because of the change in the table structure and AFAIK, no one has desinged an app to do the same types of transfers.

I have an old ipod classic also. I manage my own music folder, I manually move stuff I buy/rip into that folder. I still use itunes to get music/media to and from the device. If there is an alternative, I'd love to hear it.

CimmerianX 197 Junior Poster

Instead of hotspot shield, try Riseup instead.

Also, choose a vpn provider carefully. Make sure to find one that doen't keep logs of connections for extended periods.

http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/

CimmerianX 197 Junior Poster

Its not one or the other. Use the right tool for the right job.

I use linux for all my servers.
I use linus to run asterisk for the VOIP system.
I use linux desktop distro for all my python coding.
I use windows as my normal workplace desktop for mail and productivity crap.

CimmerianX 197 Junior Poster

I"m with ITG-JM. If it's only for 1 user (you), then use a VPN client on your machine.

CimmerianX 197 Junior Poster

If the router that connects public wifi to the internet will ALSO be used to create a VPN tunnel, this is still a safe config if done correctly.

Just separate out the public wifi space from the private space in 2 VLANs isolated from each other. Both route outbound. THe VPN tunnel is built to match the interesting traffic to only the private wifi subnet.

I do this all the time.

CimmerianX 197 Junior Poster

A DMG file when burned to a disk, may or may not be bootable depending on the DMG.

You can burn a dmg to disk. Here's how:
http://lifehacker.com/251758/mac-tip--how-to-burn-an-iso-or-dmg-file-to-disc


To burn a dmg file to disk within windows, I've read you can use 3rd party apps like TransMac. I've never seen any native windows program that would do this. IF I'm wrong, someone jump in here.

In the MAC, you can convert the DMG to an ISO. The Windows PC can certainly work with that format.
"hdiutil convert image.dmg -format UDTO -o image.iso"

dioioib commented: This user gives sound suggestions on Mac issues. +1