I’ve encountered this issue a couple of times in the last couple of weeks and it’s one that it seems unless you know the inside lore of how Linux works the actual solution isn’t exactly obvious and you can easily lead you to a disaster that seems like it should work and can actually leave you without a bootable system. While the fix is technically documented the actual method is . . .
After several years of growth and change in my personal infrastructure, I’ve eventually hit enough bottlenecks on my N36L Microserver to need to upgrade, as usual this led to a full overhaul enough fun to make it a proper project, however with the complexity I’ve managed to build up over the years of projects and different services I’ve introduced (along with the unsupported hack of an SSD in my existing . . .
Even in 2020 (current year argument), it’s woeful how prevalent Brute Force Attacks are, what’s more worrying is how successful they are, whilst it might seem that the logical thing to do is just to harden password policies that’s not really the way the tide is turning and I’d remind anyone to remember Kerckhoffs’s principle of The Enemy Knows The System. What Is fail2ban? I’ve briefly discussed the use of . . .
Despite the huge advances in technology over the years the one thing we don’t seem to have fancy solution to is just moving big volumes of data from A to B. Particularly in the age of cloud migrations the problem still keeps presenting itself of how you actually move all your company data from one location to another. On the surface it looks like you could just drag and drop . . .
Update: The host mentioned in this infrastructure has since been replaced with another the upgrade process is covered here. My personal infrastructure has gone through a number of iterations. Starting as a 450mhz Pentium 3 Ubuntu 7.04 server running SMB on a single 5400 RPM IDE disk cobbled together through a BT home hub and some cheap megabit switches, it later became an Ubuntu 14.06 host on a laptop with . . .
Over the years I’ve encountered the same problem from huge corporations to small businesses when changing a domain name to another registrar. This seemingly innocuous task frequently ends in disaster, particularly when working with a fly-by-night registrar (though the bigger players are often just as guilty, as are private ISPs) and a lack of understanding somewhere along the lines of who holds DNS records is always the killer. The problem that . . .