Does anyone know what algorithm is used?
If at has a 3 way mirror, will Veritas ACK the write back to the app after the primary mirror hardware has reported the write complete, or does it wait for all mirrors to ACK first?
Yes, I'm aware Sol2.5.1 and VxVM 3.0.4 are more ancient than the hills...
Maybe it'll actually post this time. ...
We are trying to integrate FalconStor's IPStor SAN appliance into our existing Big Brother monitoring. While I can write the scripts to integrate it. I thought I'd see if anyone had already done so. So does anyone know of any good bb-ext scripts for...
/etc/shorewall/rules should hold the key (I think Fedora is still using that)
The line
ACCEPT <internal zone> all tcp 25,110
Should allow your clients to reach the servers
We are trying to integrate FalconStor's IPStor SAN appliance into our existing Big Brother monitoring. While I can write the scripts to integrate it. I thought I'd see if anyone had already done so. So does anyone know of any good bb-ext scripts for monitoring an IPStor and replication status?
Sounds like the client update to the domain controller is slow..check it's timeouts and syncronization intervals. I'd bet the old password would still work for about 30 min after the password change.
I was going to say, it sounds like login is timing you on the reverse DNS lookup. This can generate up to a 15 minute (5 min timeout x 3 attempts) delay before presenting the login prompt. very common problem with incorrect DNS settings or a bad DNS server.
Question 1: What version of Solaris
Question 2: What is generating the largest percentage of the log entries?
Once I have that I can begin to help you determine how to trim up your auditing.
MANY versions of ssh aside from the one shipped by Sun for Solaris 9 or Solaris 10, are not configured using the --with-pam
option. No PAM = No password aging. It also causes wtmp/utmp problems as well. See here:
3.15 - OpenSSH versions and PAM behaviour.
Portable OpenSSH has a configure-time...
There are very few options for this.
1: Never include a password in your commandline.
2: The application should be able to 'rewrite' it's commandline in kernel space if it requires a password on the commandline. - Many do not, but they can if written properly -
3: make ps impossible to use for...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.