Often times, it is necessary to circumvent Draconian network policies. SSH local port forwarding to the rescue. For the seasoned administrator this is likely already second-nature.
Unable to connect to remote DRAC (version 5) unit on an older DELL PowerEdge server.
Observed warnings surfacing within the MySQL slow query log during mysql-server initialization.
Filesystem (ext4) resize failed on Ubuntu 12.04.4 LTS, following an mdraid expansion.
During a test deploy of PHP 5.4 (IUS repository) on CentOS 5.11, I ran into a dependency involving libgmp.so.3.
The Debian 7 default lftp package (from the repository) refused to establish a secure TLS connection.
After deploying a new Fedora 21 virtual machine within VirtualBox on my development workstation, I observed that I did not have the option to enter “Seamless Mode” (offered by VirtualBox).
Observed that Exim4 was listening on the IPv6 address. If you’re not accepting incoming IPv6 traffic, there’s little sense in having support enabled.
"During a code audit performed internally at Qualys, we discovered a buffer overflow in the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions, so we decided to analyze it -- and its impact -- thoroughly, and named this vulnerability 'GHOST'."
The following is a proof of concept of “GHOST”, written in C, provided by Qualys–access to GNU compiler (‘gcc’) is necessary.
Updating a Gentoo server that hasn’t seen updates in a long while–during an update operation, it pulled in udev, which eventually errored out:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19