Search:

Type: Posts; User: imort

Search: Search took 0.00 seconds.

  1. You can just run the command like that: ...

    You can just run the command like that:



    and it will be executed in the background return some result and finished.
  2. You get lucky or your table damage was relatively...

    You get lucky or your table damage was relatively minor.
    I can remember few problems when I can't fix that with 'mysqlcheck' utility and was needed to restore MySQL backup.

    You can take a look to...
  3. Yes, there is relatively much of providers which...

    Yes, there is relatively much of providers which restrict their gateways to send ICMP answers to you and your tracert output can look like that:



    I'm personally hate that because I can't be...
  4. All you need is to install 'pwgen' package on...

    [/QUOTE]

    All you need is to install 'pwgen' package on your server and then try to run 'yum install x2goserver' again.

    Try:
  5. It will run at 00:00:00 of the first day of the...

    It will run at 00:00:00 of the first day of the month so far I know.
  6. I can also add a few tips and tricks here: 1....

    I can also add a few tips and tricks here:

    1. Try add output redirecting to the end of the line to some log file, it can help you to investigate cron jobs issues in future.
    You can do it like...
  7. Hello If your root access is secure enough you...

    Hello

    If your root access is secure enough you need to be sure that your server kernel and software are free from known vulnerabilities, and so on.
    Where is your server located is much more about...
  8. Hey If we are talking about remote access, then...

    Hey
    If we are talking about remote access, then it probably doesn't matter where the server is locating.

    We can speak about the regular brute-force attack, kernel and software vulnerabilities,...
  9. Well, you can use 2-factor authorization with any...

    Well, you can use 2-factor authorization with any implementation you like, Google Authenticator for example.
    You also can use SSH lockout policy to block your account in suspicion of brute-force...
  10. Replies
    1
    Views
    2,775

    Implemented this one for my server and 5 users...

    Implemented this one for my server and 5 users few months ago
    Works as expected, however there was no any serious workload there so long no extra requirements - just regular office job.
  11. Replies
    1
    Views
    3,913

    You're probably using a Windows PC at the time...

    You're probably using a Windows PC at the time because Linux didn't have DNS caching by default.

    If you didn't want to wait for DNS cache to be renewed by itself (which can take some time) you can...
  12. Some browsers and especially the mobile devices...

    Some browsers and especially the mobile devices will have the security error with self-signed SSL certificate, so it's probably a good idea to have domain name anyway.
    And there is a great...
  13. I have to add: if you need to move your domain to...

    I have to add: if you need to move your domain to another cPanel which is installed at another server you can use the 'scp' command instead of creating a zip archive and uploading it manually.
    All...
  14. Replies
    4
    Views
    5,471

    It's not so obvious as we usually can think....

    It's not so obvious as we usually can think.
    Most people just doesn't know how the DNS works, which records do they need to create, when and where it needs to be done, etc.
    If you have bought your...
  15. Replies
    3
    Views
    3,070

    May be useful for someone because I'd faced some...

    May be useful for someone because I'd faced some issue here.

    When I'd tried to download the backup file to the Softaculous folder, I just can't see it in a file manager.
    I'd have to launch the...
Results 1 to 15 of 15
 Protected by : ZB BLOCK  &  StopForumSpam