04-27-2019
Hi.
No I did not have any "meaning" except to try to understand your cryptic posts and partial information, missing key details.
You should post complete details in the future if you want folks to easily help you.
Thanks!
This User Gave Thanks to Neo For This Post:
8 More Discussions You Might Find Interesting
1. Red Hat
Hello,
Our production linux server have multiple network interface.
Recently we installed and started NFS. Now the client server cannot mount to the server running NFS.
Later it was discovered that the port being used for NFS is only bound to one IP address, which is not the IP address I... (0 Replies)
Discussion started by: hemangjani
0 Replies
2. Cybersecurity
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (0 Replies)
Discussion started by: noufel
0 Replies
3. OS X (Apple)
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (1 Reply)
Discussion started by: noufel
1 Replies
4. Cybersecurity
Hello,
I recently had a Retina scan of my system and there are some findings I do not understand.
SSL Week Cipher Strength Supported - Retina has detected that the targeted SSL Service supports a cryptographically weak cipher strength... Disable ciphers that support less than 128-bit... (4 Replies)
Discussion started by: stringman
4 Replies
5. Cybersecurity
Hello,
One of my co-worker changed our the ssh ciphers that we currently use.
We made a change to /etc/ssh/ssh_config on our Solaris 10 servers. Security said that we have to use aes128-ctr or higher, but not aes128-cbc.
The issue is that many of the ssh clients (Tectia) on Windows will not... (0 Replies)
Discussion started by: bitlord
0 Replies
6. UNIX for Dummies Questions & Answers
When you get the message can't bind to ip already in use.
is there a command to search to see everything that is using that IP?
I've already check the host and hostname files (2 Replies)
Discussion started by: mchelle_99
2 Replies
7. Linux
I try to enable only secure high ciphers.
With those
smtpd_tls_auth_only = yes
smtpd_tls_mandatory_ciphers = high
smtpd_tls_protocols = SSLv3, TLSv1, !SSLv2
smtpd_tls_mandatory_exclude_ciphers = aNULL
Disable sslv2 but nessus say weak and medium ciphers
still enabled,how to enable only... (0 Replies)
Discussion started by: Linusolaradm1
0 Replies
8. UNIX for Advanced & Expert Users
Hi All
I need to do bind of exiting filesystem to new storage allocated
mount --bind /prod/OpenCSS /var/lib/test
echo "/prod/OpenCSS /var/lib/pgsql bind bind 0 0" >> /etc/fstab
will this command just work ? (2 Replies)
Discussion started by: anil529
2 Replies
LEARN ABOUT DEBIAN
unattended-upgrade
unattended-upgrade(8) System Manager's Manual unattended-upgrade(8)
NAME
unattended-upgrade - automatic installation of security (and other) upgrades
SYNOPSIS
unattended-upgrade [options]
DESCRIPTION
This program can download and install security upgrades automatically and unattended, taking care to only install packages from the config-
ured APT source, and checking for dpkg prompts about configuration file changes. All output is logged to /var/log/unattended-upgrades.log.
This script is the backend for the APT::Periodic::Unattended-Upgrade option and designed to be run from cron (e.g. via
/etc/cron.daily/apt).
OPTIONS
unattended-upgrade accepts the following options:
-h, --help
help output
-d, --debug
extra debug output into /var/log/unattended-upgrades.log
--dry-run
Just simulate installing updates, do not actually do it
CONFIGURATION
The configuration is done via the apt configuration mechanism. The default configuration file can be found at /etc/apt/apt.conf.d/50unat-
tended-upgrades
AUTHORS
unattended-upgrade is written by Michael Vogt <mvo@ubuntu.com>
This manual page was originally written by Michael Vogt <mvo@ubuntu.com>
COPYRIGHT
Copyright (C) 2005-2009 Canonical
There is NO warranty. You may redistribute this software under the terms of the GNU General Public License. For more information about
these matters, see the files named COPYING.
May 4, 2009 unattended-upgrade(8)