Best of Technical Support
I am trying to install Red Hat onto my Dell laptop using the partition I created for it. The install runs successfully, but when I try to load Linux it hangs up after these messages:
checking root filesystem / was not cleanly unmounted, check forced Setting filetype for entry log in /dev (174593) to 6 Unattached inode 82384 UNEXPECTED INCONSISTENCY; run fsck MANUALLY (ie without -a or -p options) An error occured during the filesystem check Dropping you to a shell; the system will reboot Give root password for maintenance
—Brian Weigner, email@example.com
Seems your Linux root filesystem was corrupted somehow. You actually need to get into single-user mode by issuing a linux s command at the LILO prompt and wait until you get the # root prompt. Type:
e2fsck -r /dev/your-root-disk-device
This will go through the device and ask you what to do with each error it finds. This will probably ask many questions that should be answered. To properly answer all of them, some Linux filesystem experience is a must. This is risky business on a real production system. For now, since it is a fresh install and to make it easy, answer yes to all the FIX?, and REPAIR? and REMOVE unused/dirty stuff, questions. After you are done, try rebooting your system. If that doesn't work, maybe your best bet is to carefuly reinstall. —Felipe E. Barousse Boué, firstname.lastname@example.org
To prevent this from happening in the future, run shutdown -h now (as root) before you power down. —Don Marti, email@example.com
My FTP users are able to back past their home directory and go right to /. They are using leach FTP, and it allows them to go up levels even in their home directory.
Also, I have 20 virtual sites (by name, not IP) running on my Apache server. A couple of times when adding a new virtual host, it would not resolve until I moved it to the top of the list of virtual hosts in httpd.conf. Am I out of virtual servers? The computer is an AMD K6 200MHz with 64MB of RAM. —Aaron, firstname.lastname@example.org
There is a hack in wuftpd to prevent users from cd-ing up, but you are probably better off installing proftpd if you aren't using that yet. It supports chrooting users in their home directory or some other preset directory. See: http://www.proftpd.net/. —Marc Merlin, email@example.com
You're not out of virtual hosts, but this configuration can be tricky. Here are some things to check. Do any of the ServerName or ServerAlias values in the virtual hosts before the broken one match the broken one's name? If you have a ServerAlias *.example.com and add warez.example.com, it won't work. Keep everything with a * alias at the end. Do an nslookup to make sure that the DNS for all the virtual hosts works. Make sure that the NameVirtualHost directive is before the corresponding VirtualHost sections. Read httpd.apache.org/docs-2.0/vhosts/details.html and, of course, every webmaster's most-read and least-enjoyed reading material, error_log. —Don Marti, firstname.lastname@example.org
I have a PCTEL internal modem, and I got the drivers from linmodems.org and have installed them. The problem is the modem keeps on dialing with the message NO DIALTONE. I was able to connect only once and that was after trying for a long time. Also, the transfer rate wasn't what I was expecting. —Krishna, email@example.com
Try to see if adding X1 in your AT init string makes a difference. —Marc Merlin, firstname.lastname@example.org
Increasingly, I see spammers attempting to send mail to my domains by simply trying a series of common first names (i.e., email@example.com, firstname.lastname@example.org, email@example.com, etc.) Is there any automated method of shutting down the connection after X failed addresses and, even better, adding their IP to sendmail's access database? —Waldo Jaquith, firstname.lastname@example.org
You could write a small Perl script that parses the reject log, adds the IP to a blacklist and restarts sendmail when this happens. —Marc Merlin, email@example.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The Humble Hacker?
- Varnish Software's Hitch
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide