ours goes something like this: cat rndc.key key "rndc-key" { algorithm hmac-md5; secret "eNJHxxxxxxx/xxyyA=="; }; may be copy the...
Oh I am sorry, I was reading his logs and got confused with the config file. :( This must be something simple, like the secret as mentioned by...
I noticed you use names and Gary used IP addresses. may be you need to edit your resolv.conf, restart /init.d/networking and try bind again?
is the file system you are trying to bring up still mounted (by any chance)? Also does the system read into ISO files without any problems?
sorry I dont know centos but in ubuntu there is a file in; /etc/network/interfaces which you can edit and configure your NICs to either have...
I forgot to mention the commands such as mkfs.ext2 or mkfs.msdos or mkswap which will create a file system in whatever OS...or..
OK Thank you for your prompt reply! I'll try that later (I got to go now). I was at the server all this time and got the display back.... But I...
I use the ssh --help but it is not clear as to how to use that -D switch in there? I want to use a different port than 22 since I think it's...
btw this is a cool command to get the intruders IPs from /var/log/auth.log then put them in the /etc/hosts.deny file; I made a script out of it...
just 2 cents worth from a noob; use fdisk to find out which drive (partition) is empty, assign FAT or FAT32 or NTFS etc, partition via fdisk...
No I am sorry I am not very good at the stuff, but may be someone else can help? F A L K O ?? He is the authority on these things around here...
trash can is on the bar (panel) not desktop
we have many unsuccessful attempts. look in your log files auth.log has the intruders IP addresses then use the host.deny file or a program to...
Hi; I am fairly new to linux too but I never like to use vi editor! I know those who use it love it and wont use anything else but I just have too...
Separate names with a comma.