Sorry for interrupting you all guys
Can you please tell me, does anyone using a XenServer anymore, or it's more dead than alive now?
Just got a job where I can find two of servers with XenServer 6 on them.
Have a little experience with them but seems like we only have VMWare and KVM over the...
Hey
You need to setup a SSH tunnel using this syntax:
ssh -L localhost:548:<synology_local_ip>:548 root@<remote_ip>:1000
You need to try it but if Synology shell if luck of 'ssh' command you may need to use another Linux server as a proxy server at the same location. Your router SSH...
What are you storing in your servers, Death Star blueprints?! :)
RSA2048 is more than enough for the moment I believe.
Actually, even old 1024 bit keys still can be used, and 4096 keys are the real sign of some paranoia here!
Hey
You need to setup an ssh tunnel on the Raspberry Pi first:
ssh -L 124:192.168.0.9:80 root@pi
It means that you'll run a tunnel on your Raspberry Pi listening on the TCP:124 port.
All requests on that port will be forwarded to the 192.168.0.9:80 which is your switch I believe...
I believe there are hardly for a regular home user.
You can increase your routers security a bit by restricting SSH at all and connecting with VPN only. If you have a router with IpSec VPN feature available at home you can configure site-by-site VPN and have permanent transparent connection...
Looks like a 'rogue DHCP server'.
You need to setup one of the software available to check if there any other DHCP servers in your network which can send DHCP offers too along with your DHCP servers.
So if your client received such a offer it will receive the incorrect IP lease and you...
Nah, the desktop market share overall is decreasing by smartphones and tablets for a few years there.
But I can't see any Linux desktop numbers increasing.
Even if Linux is the completely brilliant system without any problems and complaints, supporting all hardware and delivering incredible...
Hey
Did you tried to put your command to the cron and run them with @reboot key?
They should run just with your 'root' user after that and you also can run them with & to run them at background.
It can be easier to do with a script.
You can create a script named say 'launch_miner.sh'...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.