Archivo de la categoría: Nix
Tunnel yum traffic through another server via ssh using socks
Run all commands on the computer with restricted acccess. in yum.conf set the proxy as follows from a terminal type press enter and type your password. now, in a separate terminal (not the ssh one) type
boot solaris 10 x86
http://download.oracle.com/technetwork/systems/opensparc/OpenSPARCT1_Arch.1.5.tar.bz2 https://wiki.qemu.org/Documentation/Platforms/SPARC#Compatibility qemu-w64-setup-20180430.exe http://tyom.blogspot.com/2016/10/qemu-sun4vniagara-target-went-public.html
How To Install VirtualBox on CentOS 7
VirtualBox is an open source cross-platform virtualization software which allows you to run multiple guest operating systems (virtual machines) simultaneously. In this tutorial we will show you how to install VirtualBox from the Oracle repositories on CentOS 7 systems. Prerequisites Before continuing with this tutorial, make sure you are logged in as a user with… Leer más »
install kernel header files
NAS BUILD
MB: ASRock N3700 | RAM: Kingston ValueRAM DDR3L-1600 SO-DIMM CL11 Single 4GB | CASE: Cooler Master Elite 120 ITX | HDD: 4xWD Red WD60EFRX (SHR) | Jun’s Baremetal V 1.02b + DSM 6.1.5-15254 (DS3615xs)
FRRouting (FRR)
https://frrouting.org/ FRRouting (FRR) is an IP routing protocol suite for Linux and Unix platforms whichincludes protocol daemons for BGP, IS-IS, LDP, OSPF, PIM, and RIP.
How to Create a Mirrored Root Pool (Post Installation) raid 1 raid-1
If you did not create a mirrored ZFS root pool during installation, you can easily create one after the installation. For information about replacing a disk in root pool, see How to Replace a Disk in the ZFS Root Pool. Display your current root pool status.# zpool status rpool pool: rpool state: ONLINE scrub: none requested… Leer más »
Where to download Oracle Solaris ISO images and Update Releases (Doc ID 1277964.1)
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=323781788379095&id=1277964.1&_afrWindowMode=0&_adf.ctrl-state=r0kzvty40_4
iSCSI Security with CHAP
Posted on June 28, 2007 source: http://cuddletech.com/?p=382 The first line of defense in iSCSI deployments is to properly define and bind targets to a target portal group (TPG) via a tag on the target (TPGT). ACL’s then provide yet more security by not only restricting how you get to the target, but which initiators are… Leer más »