|
Is there one entry that will replace these 3 lines with 1 line for whitelisting in the local.cf file for SpamAssassin?
whitelist_from *@craigslist.org
whitelist_from *@reply.craigslist.org
whitelist_from *@sale.craigslist.org
Not sure how to do it, or if it can be done.
modified 8-Jul-16 16:25pm.
|
|
|
|
|
I just found the answer after searching for days. The format is:
whitelist_from *.craigslist.org
This is replace the 3 lines and be more efficient.
|
|
|
|
|
Hello,
I am using PC Helpware and VNC to connect remote desktops of client PC’s. I have set repeaters for that in my Web Server. I have set to ports say ‘X’ and ‘Y’ to Helpware and VNC respectively. Now the repeater ports are closing randomly.
I notice this problem when clients are unable to connect to the server. I don’t know why it is happening.
If I close and open the running repeater exe and then I can connect to clients without any problem.
Can anyone help me to solve this problem ?
|
|
|
|
|
I've setup a server I need to manage to allow RDP over the Internet. I would like to use this server to access and manage some of the other servers on my local network (ESXi 6.0 host). For some reason when I RDP over the Internet to my Win 2012 server I'm unable to putty from that server to other local servers.
Are there security settings that I'm missing?
Thanks,
|
|
|
|
|
I need to move a set of databases from a Windows 2008r2 server to a new Windows 2012 database server. I have looked at several articles but have not found the best one listing all of the complete steps in doing this the in a way that seems to have the complete process. Can someone direct me to a good article for me to follow in doing this?
|
|
|
|
|
holdorf wrote: I have looked at several articles but have not found the best one listing all of the complete steps in doing this the in a way that seems to have the complete process SQL Server 2012 Upgrade Technical Guide[^] from MSDN. Won't be "complete" in the sense that it will provide steps on how to proceed for each possible scenario.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Backup, copy, restore. What's the issue?
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
I understand what your saying about it being very easy but the main issue is we are creating a 200Rr2 server from scratch and want to ensure everything is done right. This includes server setup, settings, etc.
|
|
|
|
|
holdorf wrote: server from scratch and want to ensure everything is done right. This includes server setup, settings, etc. There is no way to know without doing it. I assume you are also upgrading SQL from 2008 to 2012? If so, it depends on if you are using anything in sql 2008 that is no longer supported in sql 2012.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
Thank you for your advise. I will look further into our situation and try to get a better understanding of all of the moving parts before we even start with the database copying.
|
|
|
|
|
Hello!
Suppose you purchase a piece of server software and install it on a machine. Now, ideally I would like to tie it to the underlying machine, but it may not be a machine at all, it may be a VM.
Now, if you want to start up a second instance, I want to ensure that you are paying for that second instance.
Because of this, I need to find a way to distinguish them even though the underlying hardware may be the same.
I thought of using the PC name, but even that may be problematic because I can't be totally sure that *ALL* cloud vendors (hence, not just the VM vendors, but also their customers who, in turn, become sellers to my customers) will allow to change it.
Suggestions?
Thanks!
A
|
|
|
|
|
Hey
The common way to implement such a thing is using some unique data from the server to identify it.
For example, you can check the server MAC address when your software start, send it to your management server and find out if this server allowed to run your software or not.
You can also check if there more than one server with this MAC address, so on, but this is just an example nothing more.
Most software using this principle but real implementation can vary.
|
|
|
|
|
I'm a freelance, junior sys-admin who is currently tasked with setting up the hardware for a tech startup. We're hosting a software service and need a system solution that makes sense within our budget and requirements.
The ideal goal would be n + 1 design, high security, long-term high availability without breaking the bank. Budget is ~6k for initial round of investment towards gear only. Additionally funds will be allocated for a year of quarter rack space in a datacenter local to my location.
I'm a bit over my head with my current knowledgebase, and intend to bridge the gap with a lot of pre-planning over the next 60 days. I figure 60 days before ordering any gear, 30 days to have it all come in, and get it initially configured at the datacenter, then 90 days to build out our hosting interface and properly test the system before going production. 6 months would be nice, but 8 months is being allocated for project.
Okay, so onto the gear and setup:
(2) Cisco SG-300-10 Switches, 1 wired & active, the second rack-mounted ready for wiring in case of failure.
PFSense:
Primary <> Secondary
With heartbeat in load-balancing + fail-over mode
Nginx Load-Balancers:
Primary <> Secondary
Configured in PFsense for failover
App/Data Servers:
A 4:1 ratio of active to failover App/Data Servers. I think failover can be configured with the Nginx Load-Balancer else PFsense.
Initial deployment is the two firewalls, two LBs, and 4+1 App/Data servers, with expectations to grow more App/Data as demand increases.
The service runs on LEMP stack. A master to master MySQL link between each A/D and the failover exists on separate partitions, separate instances of MySQL. It continuously synchs database with each active A/D, ready for activation in the event a LB declares an active dead. Higher resources in the form of more memory, higher thread count CPU, and n(A/D) hard disk space is allotted for failover.
Additionally, I plan to use an Anycast DDos prevention serviced by my colocation provider. I am wondering what drawbacks there are to my model.
The first 3-4 months is designing and deploying the system, the next 3-4 is linking the system to the software with the developers so that we can auto-provision services. I plan to utilize scripts heavily for this.
modified 19-Mar-16 13:45pm.
|
|
|
|
|
Hi,
Scenario: There are two isolated networks A and B with systems and applications (all Windows environment)
Network A
- Client AC1
- Server AS1
Network B
- Server BS1
"AC1" initiates a VPN-like connection and connects to Network B.
"AC1" then connects to a web application hosted on "BS1"
"BS1" in turn needs to connect to a Web Service hosted in "AS1" using Network A credentials of user on "AC1".
Is this possible? What do we need to ask the Network team of A and B to do in order to achieve this?
Thanks in advance.
|
|
|
|
|
Should be easily do-able via tunneling. VPN on AC1 alone won't get your BS1 server a good route back to AS1. If it's a simple web service that doesn't require a lot of security, you could always give AS1 a real internet addressable address (from your ISP) and BS1 can access AS1 web service over the web. The thing about web services is that they typically aren't blocked by firewalls, but you still need to have an IP address facing the internet for AS1.
|
|
|
|
|
Hi Albert,
Thanks for the info.
Providing internet addressable address is good idea - I will check with the team about it
Web service on AS1 does require authentication, but it must be Windows authentication of Network-A for that user!.
In case of any other possibility or possible blockades that we might face, do let me know
|
|
|
|
|
There is a good discussion on how to configure a reverse VPN tunnelling. Look like connecting back to the system is complicated issue. The essence of your problem is that even you can do the DNS registration (which makes eligible for the servers to find each other), the actual ip connection between your machines is further impossible.
|
|
|
|
|
It depends what you need or want from your server. And, btw, a third option "between" these two, is a Virtual Private Server (VPS) which, IMO, is as good a dedicated server (but much cheaper) unless your site is particularly large (or attracts lots of traffic) or resource heavy.
But the main advantage of a VPS or dedicated server is that you have full (virtual) control over the server, so can configure it as you want - obviously only an advantage if there is something particular you need to configure - and that you can also install and run your own programs (exe's) in the background to perform all sorts of related tasks.
|
|
|
|
|
I need to discover the IP address of a specific Ethernet switch on my LAN. What tool must I use for this?
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
I first thought of SNMP, but that's obviously wrong (you need to know the tcp/ip address before you can query a device about its abilities) ... SNMP does have a discovery process, but Im not sure how it works
.. then I remembered that ICMP has/had a 'sub protocol' for router discovery .. and tippity tap, https://tools.ietf.org/html/rfc1256[^]
not sure if either of those will serve as a starting point for you .....
|
|
|
|
|
Thank you. I looked at the page you link to, but it seems to be only for router discovery. I would like to discover a switch.
I did find a number of tools for network enumeration at Network Enumerators - securitywizardry.com[^], but I don't know what tool is good for what.
Are you able to recommend any of them?
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
I'd have a look at SolarWinds NPM Network Monitoring Software - Network Monitor | SolarWinds[^] - it has a discovery tool - but cheap it is not I only know of them because I used to use KiwiSyslog a toolset they bought
(I used to have a discovery tool based on WNETEnum ... that fed the data to Visio to draw, but have log lost where I put it - it was a DDJ tool, and I cant recall if it did switches or just 'anything ip')
Check out SPLUNK while you're at it and see if it does discovery
|
|
|
|
|
Thank you Garth, I appreciate it.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
I dont know if you found anything useful .. I found the original article I thought of (but it only does PC's, Printers etc) Visualizing Network Resources Using Visio | Dr Dobb's[^]
Im not sure what your motivation is Richard - if you were being paid, and had to write a tool (that was cheaper than SolarWinds for example), Im sure you could gather a list of all the tcp/ip addresses on your network, and then reduce/filter the list perhaps (eg remove PC's, printers ...) , leaving a list of addresses you could then issue SNMP calls against (for instance) ... thats what I would do
|
|
|
|
|
Depends on the switch.
Normally I would use a tool from the manufacturer.
Otherwise you would use a tool that implements LLDP (Link Layer Discovery Protocol) for low level switches, unless it's a Cisco, they have their own protocol (CDP).
If it's a high level switch SNMP should suffice.
|
|
|
|