MDRAID Common Commands
MDRAID Common Commands Creating an array Then you need to create a configuration file mdadm.conf And write the changes to the boot image: Work with array Mark a disk as… Read more »
MDRAID Common Commands Creating an array Then you need to create a configuration file mdadm.conf And write the changes to the boot image: Work with array Mark a disk as… Read more »
What to do if you receive an unexpected blob after performing a zmbobchk check? This means that the message with id 58276 has no corresponding mysql entry with meta data…. Read more »
Source: fake-news-initiatives-fact-checking To name a few: The Trust Project, which is made up of dozens of global news companies, announced this morning that the number of journalism organizations using the global… Read more »
Moving Zimbra to New Server Hardware This page describes another rsync method. Zimbra has a wiki full of examples but most have a list of associated issues or trade offs including… Read more »
Moving Zimbra 8.0.9 to Zimbra 8.6 on a New Server Disclaimer: I have the NETWORK version but chose not to use the backup/restore method available with the commercial version. This… Read more »
Disclaimer: I have the NETWORK/PRO version but chose not to use the backups. This method should work with both the free and paid version as a result. I have used… Read more »
Key Size in Cryptography Simplified Cryptography Primer In asymmetric or public-key encryption there are two main parts: Encryption Algorithm (RSA, ECC, …) Cryptographic key pair The two keys of the… Read more »
Your Privacy and your Web Browser is a Contradiction I am mad as hell about WebRTC and google chrome. I know this is a rant but it is disturbing that this… Read more »
Crypto Jargon Hash Functions A hash function is a completely public algorithm (no key in that) which mashes bit together in a way which is truly infeasible to untangle: anybody… Read more »
Security Pages that Count With so many sites that offer helpful security information, this is my start of the must read sites. Latest Reports ThreatPost – latest news of exploits… Read more »