ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Categories
    3. IT Discussion
    Log in to post
    Load new posts
    • Recently Replied
    • Recently Created
    • Most Posts
    • Most Votes
    • Most Views
    • scottalanmillerS

      ERROR 1366 When Important MySQL Database for WordPress

      Watching Ignoring Scheduled Pinned Locked Moved wordpress mysql mariadb sql database rdbms
      2
      1 Votes
      2 Posts
      652 Views
      M

      I've seen that a lot. When I import Drupal databases, I learnt to use its Backup and Migrate module instead, it works flawlessly. Downside is you need to do clean Drupal installation first, but that basically is just creating blank database and putting brick on enter key.

    • CloudKnightC

      Chromium memory usage

      Watching Ignoring Scheduled Pinned Locked Moved chromium memory size ubuntu 18.04 snap
      26
      0 Votes
      26 Posts
      3k Views
      travisdh1T

      @marcinozga said in Chromium memory usage:

      @travisdh1 said in Chromium memory usage:

      @marcinozga said in Chromium memory usage:

      lynx.PNG

      Lynx, 1 tab open :face_with_tears_of_joy:

      But why as root?

      Root is the only user on that server, no need for any additional accounts.

      pB43k.jpg

    • wrx7mW

      PowerShell - Using Variables to Delete SMTP Proxy Addresses in AD

      Watching Ignoring Scheduled Pinned Locked Moved powershell ad active directory windows get-aduser
      11
      1 Votes
      11 Posts
      3k Views
      wrx7mW

      @flaxking said in PowerShell - Using Variables to Delete SMTP Proxy Addresses in AD:

      if they do not have previous experience with objects

      Describes me. lol

    • DustinB3403D

      lpadmin and Apple printer creation help

      Watching Ignoring Scheduled Pinned Locked Moved Solved osx apple printers printer packages
      3
      0 Votes
      3 Posts
      569 Views
      DustinB3403D

      Got it with this.

      lpadmin -p Printer-Name -E -v ipp://printer-address -o printer-is-shared=false -o printer-make-and-model="Canon iPR Svr G250 V1.0 US" -P "/Library/Printers/PPDs/Contents/en.lproj/Canon iPR Svr G250 V1.0 US"

    • alex.olynykA

      Router Limits Hardware

      Watching Ignoring Scheduled Pinned Locked Moved
      13
      0 Votes
      13 Posts
      1k Views
      JaredBuschJ

      @DustinB3403 said in Router Limits Hardware:

      Don't use technology as a replacement for being a parent.

      Yeah, that is not how that works.

    • J

      Remote Control for one user to access his own home PC?

      Watching Ignoring Scheduled Pinned Locked Moved
      9
      0 Votes
      9 Posts
      301 Views
      JaredBuschJ

      ZeroTier on both devices and use RDP.

    • 1

      Skype & WebRTC?

      Watching Ignoring Scheduled Pinned Locked Moved skype for business skype webrtc
      5
      1 Votes
      5 Posts
      451 Views
      scottalanmillerS

      https://venturebeat.com/2016/07/13/skype-announces-new-webrtc-alpha-version-for-linux-chromebook-users-can-now-make-voice-calls/

      Did they kill it off, maybe?

    • JaredBuschJ

      Converting Hyper-V to KVM

      Watching Ignoring Scheduled Pinned Locked Moved hyper-v kvm v2v v2v converter virt-manager virt-v2v
      15
      4 Votes
      15 Posts
      13k Views
      scottalanmillerS

      Hey @JaredBusch if you Google about converting Hyper-V to KVM, this is Google's built in process now! They link this article as the "official" Google chosen reference document for this process!

    • stacksofplatesS

      Terratest

      Watching Ignoring Scheduled Pinned Locked Moved terraform terratest
      3
      4 Votes
      3 Posts
      413 Views
      jmooreJ

      @stacksofplates said in Terratest:

      I wrote a new article on unit testing Terraform modules with Terratest.

      https://hooks.technology/2020/03/testing-terraform-with-terratest/

      Nice article, I've never played with Teraform yet but its on my list.

    • FATeknollogeeF

      F31: L2TP client - modp1024 is not supported?

      Watching Ignoring Scheduled Pinned Locked Moved fedora 31 deepin l2tp ike
      3
      2 Votes
      3 Posts
      2k Views
      black3dynamiteB

      Just received a new update fix
      eb2a76e2-4b5e-48bf-b0bf-f64df0c270ff-image.png

    • CCWTechC

      Connectwise Control / Screenconnect recommends you break the law to run their software

      Watching Ignoring Scheduled Pinned Locked Moved screenconnect connectwise control
      78
      4 Votes
      78 Posts
      9k Views
      J

      @CCWTech said in Connectwise Control / Screenconnect recommends you break the law to run their software:

      @JasGot said in Connectwise Control / Screenconnect recommends you break the law to run their software:

      @scottalanmiller said in Connectwise Control / Screenconnect recommends you break the law to run their software:

      spending so much time waiting for ScreenConnect to finally be able to load its device list. We spend just as much time waiting for SC's list to stop flashing from its load problems as it

      How many clients?
      What list?
      SC is very fast in my experience.

      2,000 clients and navigation and opening are fairly slow.

      Have you used session filtering and subgroup expressions to keep any given window at a reasonable level?

      We have thousands of clients sorted into hundreds of sub folders [for lack of a better word]. Our largest folder is 332 clients and it is loaded before I can get my finger off the mouse button.

    • pmonchoP

      Create Internal CA for Windows LDAPs and Linux apps

      Watching Ignoring Scheduled Pinned Locked Moved ldaps certificate authority linux
      9
      0 Votes
      9 Posts
      965 Views
      pmonchoP

      @JaredBusch said in Create Internal CA for Windows LDAPs and Linux apps:

      @pmoncho said in Create Internal CA for Windows LDAPs and Linux apps:

      When I export the key, I want to export the private key as well?

      That depends. If you are only ever going to have devices using the key to auth against the DC that you created it on, then no.

      But if you need to install the cert on a device and then have another device auth to that first device, then that first device needs the private key.

      Thank you for the explanation.

    • RomoR

      PJSIP trunk- endpoint not found

      Watching Ignoring Scheduled Pinned Locked Moved pjsip trunk vitalpbx
      5
      1 Votes
      5 Posts
      1k Views
      RomoR

      Found the issue and fixed it.

      There were some extra entries in the default pjsip profile which were the culprit. The entries were there since quite a few versions back and hadn't caused any sort of issue with the trunks until we updated yesterday. Even after reverting to the previous working version, the trunks wouldn't get properly created until I found the extra entries and removed them. After that, the endpoints are created and the trunks are up once again.

    • scottalanmillerS

      Simple Password Compromise on MailGun

      Watching Ignoring Scheduled Pinned Locked Moved mailgun smtp email security passwords
      13
      5 Votes
      13 Posts
      2k Views
      scottalanmillerS

      @sully93 said in Simple Password Compromise on MailGun:

      @scottalanmiller, which service did you go with after dropping MailGun? We are looking at a relay service and have MailGun on our list. This is a bit concerning that they shut you down like that. We're also looking at Postmark and SendGrid.

      We made the call to just move to Zoho and get email hosted. We've been super happy with Zoho.

    • hobbit666H

      Securing SSH

      Watching Ignoring Scheduled Pinned Locked Moved ssh ssh keys security
      60
      1 Votes
      60 Posts
      7k Views
      scottalanmillerS

      @stacksofplates said in Securing SSH:

      Another really good option is not letting them log directly into the systems at all and forcing them to use a config management tool. So something like Tower or a Jenkins server that logs all of the commands run and has the permissions set there.

      Right. Just like the best defense is a good offense (or vice versa?) The most secure port, is a closed port. Locking down SSH, no matter how good, isn't as good as completely closing it.

      Or using config management to only open it when necessary, is an "in between" step, too.

    • gjacobseG

      NextCloud Shared Folder, not seen

      Watching Ignoring Scheduled Pinned Locked Moved nextcloud shared shared folders
      10
      0 Votes
      10 Posts
      1k Views
      wirestyle22W

      @gjacobse said in NextCloud Shared Folder, not seen:

      JEEZE -

      Though I had checked - it's been two months or more since then.

      Some how the permissions had fallen off and just needed to be added to the folder again.

      Solved!

      Enjoy the easy ones

    • ClemC

      Robocopy/7-zip bat file with high compression ratio

      Watching Ignoring Scheduled Pinned Locked Moved
      4
      0 Votes
      4 Posts
      1k Views
      ClemC

      @Emad-R
      Thanks for the tip. updated.

    • scottalanmillerS

      How to Rename a Column in SQLite Database

      Watching Ignoring Scheduled Pinned Locked Moved sqlite sqlite3 sql database
      10
      1 Votes
      10 Posts
      1k Views
      scottalanmillerS

      @Pete-S said in How to Rename a Column in SQLite Database:

      There used to be a lot of databases like SQLite. Often called database engines. dBase was probably one of the first.
      Later Microsoft Jet engine (aka Microsoft Access) became popular when Visual Basic ruled the world.
      Basically it's a one user database. You can have more than one user but it's done by multiple users accessing the same database file.

      Or by having an application on top that accessing the file and shares it out. That thing can be called a "database management system" or any application, really.

      All databases use database engines. MySQL, for example, isn't a database. It's a database management system. It uses one or more database engines to talk to the files on disk. MyISAM and InnoDB are two database engine options for the MySQL platform.

      At the end of the day, all databases work like SQlite. You can easily build your own database management system that uses SQlite as the engine and it could work just like MySQL or Oracle or SQL Server. Those are all single users to a file, under the hood. They just have the "multi-access" management built into an extra layer, instead of letting an application handle it.

      But for most things, you only access a database from a single app anyway, so that extra layer is often unnecessary as it is redundant. Just adds overhead.

    • J

      VoIP Services and AUTO TOP-UP prepaid billing.

      Watching Ignoring Scheduled Pinned Locked Moved
      24
      0 Votes
      24 Posts
      1k Views
      J

      @JaredBusch said in VoIP Services and AUTO TOP-UP prepaid billing.:

      it is usually open provisioning servers

      Would this be a server that is not using whitelists for access?

    • JaredBuschJ

      Need POS recommendations

      Watching Ignoring Scheduled Pinned Locked Moved Unsolved pos recommendations
      5
      0 Votes
      5 Posts
      695 Views
      J

      @WrCombs said in Need POS recommendations:

      there is also Clover Systems - Which isn't terrible, Lots of bars use this system

      We see Clover everywhere, including at the cash counter for Municipalities for tax and water bill payments.

    • 1
    • 2
    • 88
    • 89
    • 90
    • 91
    • 92
    • 698
    • 699
    • 90 / 699