Review and Install Puppet at Solaris 11.2 it is useful in practice to understand how Puppet work at Solaris to manage multiple system and distributed configuration from Central System… 1,331 more words
Tags » System Administration
Common Criteria SSH - restrict ciphers, key exchange method and drop SSH packets within certain range
1. Open ssh_config / sshd_config – the first file is the configuration file for the client, the second is for the daemon (SSH server).
2. Uncomment Ciphers section and leave it as: 79 more words
TL;DR – Get the firmware update for the TL-WA850RE at http://www.tp-link.us/support/download/?model=TL-WA850RE&version=V1, unzip it and run the update from within the TPLink setup page. This solves most problems. 256 more words
In the first post, we listed the necessary details to restore/rescue GRUB2. In this post we cover the procedure.
Case 1: If you do not have a separate boot partition, then the method is very simple. 252 more words
I am assuming that the license is added and still EMC Powerpath shows the paths as unlic.
————— Host ————— – Stor – — I/O Path — — Stats — 403 more words