Skip to main content

Questions tagged [safety]

-1 votes
1 answer
76 views

Can Windows powershell give me fake or altered outputs if I use common commands primarily used in powershell checking hash codes is option but they can be altered too theorically so its not that ...
Mande de su ka 's user avatar
0 votes
1 answer
115 views

I will make a reservation, I am mediocre in Linux systems. I have several Raspbian (Client) devices that have access to the network over LTE (IP over NAT). I have my own server under Ubuntu (server). ...
MaxNTF's user avatar
  • 1
0 votes
0 answers
128 views

The whole list of all files found with find / -perm -4000 -print and find / -perm -2000 -print commands (same) are on the screenshot. So is it an efficient and safe thing to delete SUID, SGID from all ...
leonid777's user avatar
1 vote
1 answer
1k views

I have a 42HE 19” server rack which houses a bunch of equipment (UPS, PDU, server, network, ...). It has wheels so it’s easy to move and it stands on a concrete floor. The rack is out of metal and ...
divB's user avatar
  • 704
0 votes
1 answer
1k views

Interestingly there is no word in the manual and nothing to be found on the internet. But it seems like an obvious question: While a UPS (let’s use APC Smart-UPS 1500RM as an example) drives equipment/...
divB's user avatar
  • 704
0 votes
1 answer
417 views

In teaching CS, students submit their code to our server and we compile and run with unit tests. Similar to Codeforces, Codewars, and HackerRank. How should we be configuring servers for this? Launch ...
apptree's user avatar
  • 375
3 votes
1 answer
790 views

We have a Kubernetes cluster (kube-)sprayed over 4 nodes running CoreOS. Our most important services will run in this Kubernetes environment and we are trying to do everything we can to make it as ...
barney.balazs's user avatar
0 votes
1 answer
191 views

Since the closest Q & A I have found about this topic doesn't quite match the focus I have in mind, I felt that a more precise question could be a helpful point of reference for me and many other ...
John Galassi's user avatar
0 votes
0 answers
40 views

I'm pretty new to server-side stuff. The difficult situation is that we want to allow an application installed on the server to run python on the server, but the application server installation guide ...
Penny's user avatar
  • 111
99 votes
2 answers
29k views

A week ago I got the following error on my APC Smart-UPS 1000 which I muted. Warning State: Connect battery Load: 55% Batt: 100% Today, I could smell a sort of sulfur/sulphur/rotten egg smell when I ...
Andy Joiner's user avatar
  • 1,273
0 votes
2 answers
113 views

We want to use lvm to build raid0 array using amazon ebs, and we are worrying about the data safety. We have known that we need to halt the vm to backup. But we still want to know what will happen ...
sanigo's user avatar
  • 103
1 vote
1 answer
136 views

Like what Github.com has just experienced, what if a script provider, such as google ads, google analysis or something similar, add a malicious scripts at the end of their script, and let end users ...
simonmysun's user avatar
51 votes
5 answers
5k views

I removed the side panel of our server rack so I can clean up some of the wiring. Inside I found the PDU was wired like in the picture. Instead of an incoming power cable, there's just 3 uninsulated ...
Grant's user avatar
  • 18.2k
1 vote
1 answer
87 views

We are planing cloud solution for our customers and we are really concerned with designing safest storage servers for their files. This storage won't be IO demanding, as it will contain only files ...
Goran Radulovic's user avatar
0 votes
4 answers
288 views

sudoing adds a little bit of a roadblock to doing potentially stupid and dangerous things in the Linux shell, but it is a meager deterrent to newer Linux users. Still, many users login as root or have ...
tacos_tacos_tacos's user avatar
-2 votes
1 answer
296 views

I believe I have set up my code quite securely, it validates and cleans user input so it's safe, etc. So would I need SuHosin? (which is a security addition/patch for PHP) How does it help me if my ...
Hope4You's user avatar
  • 175
21 votes
5 answers
9k views

Ive requested the carpet to be removed from my server room, a disaster was almost waiting to happen air con leaked and the carpet UNDER the rack was soaked. (air con unit 0.3 meter from rear of ...
user121246's user avatar
190 votes
32 answers
106k views

I just ran rm -rf /* accidentally, but I meant rm -rf ./* (notice the star after the slash). alias rm='rm -i' and --preserve-root by default didn't save me, so are there any automatic safeguards for ...
Valentin Nemcev's user avatar
51 votes
7 answers
4k views

My business is... troublesome. What I do is legal in every country on earth, but some people don't like it, and make it so tough on my poor ISPs that I am forced to go looking for new providers more ...
darkAsPitch's user avatar
  • 1,971
2 votes
2 answers
792 views

I have various firewall/router/utility type boxes that do not require much if any storage for their primary purpose other than booting. But I do like to be able to put a more or less standard CentOS/...
Tracy Reed's user avatar
3 votes
4 answers
1k views

Unsure if this is the correct forum. Anyhow, we have had a network installed, using shielded cat 5 cable. This cable is in the same trunking as the mains power cable. The electrician says this is ...
user avatar
17 votes
15 answers
14k views

This three questions have been merged into this one. The following answers might have come from any of them, or might be a generic answer to all of them. Is there any kind of tool to assist in ...
MikeJ's user avatar
  • 1,381