Search Results

Search found 26947 results on 1078 pages for 'util linux'.

Page 758/1078 | < Previous Page | 754 755 756 757 758 759 760 761 762 763 764 765  | Next Page >

  • Is MySecureShell a good way to manage SFTP user with chroot on a Centos Server?

    - by benjisail
    Hi, I need to setup my Centos 5.4 server for SFTP with chrooted access only (or equivalent). The regular solution using RSSH find here : http://www.cyberciti.biz/tips/howto-linux-unix-rssh-chroot-jail-setup.html seems over-killing to me if we want to manage multiple users... I found the project MySecureShell which seems a lot simpler to install and to maintain. Is it a good solution? Is there something better? Thanks!!

    Read the article

  • samba + kerberos ssh single signon (SSO)

    - by Matt Delves
    Hey folks, I'm modifying an existing samba config that it works fine for authenticating AD users on linux servers to also handle Kerberos and SSO. I've successfully got pam_winbind to use kerberos and it is handing out tickets, as well as having configured SSH to allow GSSAPI and Kerberos. Unfortunately though, when attempting to login via PuTTY using SSO, it fails. Is anyone who is familiar with configuring this able to point me in the right direction? Thanks, Matt.

    Read the article

  • double-click to run .sh file

    - by Delirium tremens
    GUI: I changed the permissions of an sh file, so that I can read, write and execute it. I double-clicked it, selected run in Terminal, but it didn't run. I double-clicked it, selected run, but it didn't run. Command-Line: bash *filename* runs it sh *filename* runs it The file content is: #!/bin/bash # get dirsyncpro home DIRSYNCPRO_HOME="$(dirname $0)" # start programm and pass any parameters java -Xmx512M -jar "$DIRSYNCPRO_HOME/dirsyncpro.jar" $* Works in this person's computer: http://www.knowliz.com/2008/08/how-to-installrun-sh-file-in-linux.html What's going on?

    Read the article

  • How do I copy/clone a dynamic disk in Windows 7?

    - by PP
    I have some dynamic disks (or "partitions" but they are not really partitions) that I want to copy onto spare hard drives. I tried using gpartd (and fdisk for that matter) from a linux live disc. All it saw was hard drives with only one partition encasing the whole hard drive. So gpartd/fdisk is incapable of identifying the dynamic "partitions" and allowing me to copy them. Any tools that can be used to clone/copy a dynamic "partition"?

    Read the article

  • How could I import Postgres data dumps into MS SQL?

    - by dean nolan
    I have some data that is from a Postgres database dump (not csv or anything) and I am looking to get it into MS SQL. Is there an easy way to do this or a free tool that doesn't have limits on data import size etc? The Postgres is on a Debian VM and I could export it to csv in there but I am new to Linux and don't know how I would transfer it from the VM to Win 7. Thanks

    Read the article

  • Unlimited online backup space for fixed price using rsync/FTP/other simple protocol

    - by barrycarter
    Many companies offer unlimited online backup space for a fixed price (mozy.com, twitter.com/allmydata, onlinestoragesolution.com, etc), but they either use proprietary non-Linux-friendly software and/or have gone out of business and/or don't actually work. Who offers reliable unlimited online backup space for a fixed price that's compatible with rsync, FTP, or other generic/open source file transfer protocols? Or, has anyone written software that lets me treat Mozy's/etc space as though it were regular file space (eg, "mozyfs"?)

    Read the article

  • Most valued features of Opera?

    - by Peter Mortensen
    What feature do you value the most in the Opera web browser (Windows, Linux and MacIntosh) ? Please only one feature per post - you may post several times. If possible please also provide a description of the feature for those who don't know what it is. A reference to a (YouTube) video demonstrating the feature would be a plus.

    Read the article

  • what 802.1x key_mgmt/eap does wired network normally uses?

    - by tuma
    I'm really new to 802.1x but I'm trying to use 802.1x authentication in a wired network. My desktop is Linux (centos) using wpa_supplicant as the supplicant. I'm wondering what key_mgmt/eap is normally used in the wired environment? I went through http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol but it doesn't clearly say which method/encapsulation is normally used for wired network. Can anyone give me a hint? Thanks.

    Read the article

  • How should I set up my Hyper-V server and network topology?

    - by Daniel Waechter
    This is my first time setting up either Hyper-V or Windows 2008, so please bear with me. I am setting up a pretty decent server running Windows Server 2008 R2 to be a remote (colocated) Hyper-V host. It will be hosting Linux and Windows VMs, initially for developers to use but eventually also to do some web hosting and other tasks. Currently I have two VMs, one Windows and one Ubuntu Linux, running pretty well, and I plan to clone them for future use. Right now I'm considering the best ways to configure developer and administrator access to the server once it is moved into the colocation facility, and I'm seeking advice on that. My thought is to set up a VPN for access to certain features of the VMs on the server, but I have a few different options for going about this: Connect the server to an existing hardware firewall (an old-ish Netscreen 5-GT) that can create a VPN and map external IPs to the VMs, which will have their own IPs exposed through the virtual interface. One problem with this choice is that I'm the only one trained on the Netscreen, and its interface is a bit baroque, so others may have difficulty maintaining it. Advantage is that I already know how to do it, and I know it will do what I need. Connect the server directly to the network and configure the Windows 2008 firewall to restrict access to the VMs and set up a VPN. I haven't done this before, so it will have a learning curve, but I'm willing to learn if this option is better long-term than the Netscreen. Another advantage is that I won't have to train anyone on the Netscreen interface. Still, I'm not certain if the capabilities of the Windows software firewall as far as creating VPNs, setting up rules for external access to certain ports on the IPs of Hyper-V servers, etc. Will it be sufficient for my needs and easy enough to set up / maintain? Anything else? What are the limitations of my approaches? What are the best practices / what has worked well for you? Remember that I need to set up developer access as well as consumer access to some services. Is a VPN even the right choice?

    Read the article

  • I have problems printing from gedit in windows

    - by John C
    Gedit in linux works like a champ. For me, in two installations Gedit in Windows xp works well except that it will not print properly on HP laser jets or toshibas laser printers. It will make a 90 page project out of two pages of text composed in gedit. It puts one or two confused lines of text at the top of a sheet and then ejects the page. Any suggestions? jac

    Read the article

  • Cannot assign a letter to a FAT32 partition

    - by Toc
    I have an external hard disk where I have created many partitions to use also in Linux. First two partitions are FAT32. The third is a Truecrypt partition. I cannot assign a letter to the second partition. When I go to Manage disk and right-click on the unassigned partition, most of the options are not enabled. What have I to do to see this partition on my XP PC?

    Read the article

  • SIP server ("gateway") for joining accounts

    - by Tomas Srna
    Hello, I have a phone supporting 2 accounts, but I need 4 accounts. Is it possible to install some sort of SIP server/gateway/proxy (on a linux server), that would register those 4 accounts and I would be able to connect to it as if it was 1 account? (With dialing rules, etc.) 3 of the accounts have incoming numbers. Thanks. Tomas.

    Read the article

  • In Tripwire For Servers policy what is the difference between ACL and permissions?

    - by this.josh
    I am configuring a policy file for Tripwire For Servers for GNU/Linux (x86) version 4.8.0.167 My system has ext2 and ext3 filesystems. In the policy file the properties include "ACL settings", "permission and file mode bits", and "Flags (additional permissions on object)". What is the difference between ACL settings and permissions for ext2 and ext3 filesystems, and what additional checking does the Flags property provide?

    Read the article

  • Can I mount a volume at /Users on OS X?

    - by bshacklett
    I'm considering purchasing a SSD for my Macbook Pro. Unfortunately, I can't afford a large one, so I'm thinking of moving the current hard drive to the optical bay. On a Linux system, I would mount the second drive at /home. Given that OS X is Unix, I'm thinking it should be possible to do the same thing. Has anyone done this before? Edit: I should mention I'm running Snow Leopard.

    Read the article

  • How do I access a git repository on a samba share?

    - by Jason Baker
    I have a Samba share set up that I'd like to put a git repository on. I've tried searching google for the best way to use git on a Samba share, but it seems difficult to find anything on doing this as Samba uses git for development. What is the best way to do this? Right now, I'm just working with Linux, but it would be nice to know how to do this in a cross-platform manner as well.

    Read the article

  • How to get UAC to co-operate with synergy2

    - by Kimvais
    How do I get UAC to behave so that I can control the dimmed desktop and programs running under UAC grants with synergy client? (The kb and mouse are connected to a Linux machine, windows is running synergy client) Or is turning UAC off the only option?

    Read the article

  • No Telnet login prompt when used over SSH tunnel

    - by SCO
    Hi there ! I have a device, let's call it d1, runnning a lightweight Linux. This device is NATed by my internet box/router, hence not reachable from the Internet. That device runs a telnet daemon on it, and only has root as user (no pwd). Its ip address is 192.168.0.126 on the private network. From the private network (let's say 192.168.0.x), I can do: telnet 192.168.0.126 Where 192.168.0.126 is the IP address in the private network. This works correctly. However, to allow administration, I'd need to access that device from outside of that private network. Hence, I created an SSH tunnel like this on d1 : ssh -R 4455:localhost:23 ussh@s1 s1 is a server somewhere in the private network (but this is for testing purposes only, it will endup somewhere in the Internet), running a standard Linux distro and on which I created a user called 'ussh'. s1 IP address is 192.168.0.48. When I 'telnet' with the following, let's say from c1, 192.168.0.19 : telnet -l root s1 4455 I get : Trying 192.168.0.48... Connected to 192.168.0.48. Escape character is '^]'. Connection closed by foreign host . The connection is closed after roughly 30 seconds, and I didn't log. I tried without the -l switch, without any success. I tried to 'telnet' with IP addresses instead of names to avoid reverse DNS issues (although I added to d1 /etc/hosts a line refering to s1 IP/name, just in case), no success. I tried on another port than 4455, no success. I gathered Wireshark logs from s1. I can see : s1 sends SSH data to c1, c1 ACK s1 performs an AAAA DNS request for c1, gets only the Authoritave nameservers. s1 performs an A DNS request, then gets c1's IP address s1 sends a SYN packet to c1, c1 replies with a RST/ACK s1 sends a SYN to c1, C1 RST/ACK (?) After 0.8 seconds, c1 sends a SYN to s1, s1 SYN/ACK and then c1 ACK s1 sends SSH content to d1, d1 sends an ACK back to s1 s1 retries AAAA and A DNS requests After 5 seconds, s1 retries a SYN to c1, once again it is RST/ACKed by c1. This is repeated 3 more times. The last five packets : d1 sends SSH content to s1, s1 sends ACK and FIN/ACK to c1, c1 replies with FIN/ACK, s1 sends ACK to c1. The connection seems to be closed by the telnet daemon after 22 seconds. AFAIK, there is no way to decode the SSH stream, so I'm really stuck here ... Any ideas ? Thank you !

    Read the article

  • Image Classification - Detecting an image is cartoon-like

    - by kingb
    I have a large amount of jpeg thumbnail images ranging in size from 120x90 to 320x240 and I would like to classify them as either Real Life-like or Cartoon-like. Are there any applications that will have cartoon classification capabilities? This application should work on Linux, and should take an image path on the command-line and return either 0 or 1 (echo $?).

    Read the article

  • HOw make new copied file always 777 permission

    - by Master
    I have one Linux ext3 partition shared on network. Now when some one copy files from MAc , then other people can't change the file dute to permission problem. Is there any way that ane new file which is copied will always have 777 permission and some specific user as owner of file not the default user thanks

    Read the article

< Previous Page | 754 755 756 757 758 759 760 761 762 763 764 765  | Next Page >