What buffer size should I use to maximize disk I/O bandwidth? (16Kb, 32Kb, 64Kb, etc.) [closed]

It’s difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center. Closed 9 years ago. I am trying to write a file as … Read more

Authentication of both client and server in subscription based model [closed]

It’s difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center. Closed 8 years ago. My current business model takes a loss upfront … Read more

What are some options for acquiring a free realtime Linux distribution? [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for … Read more

web program today: why is online web program user =/= Unix user in /etc/passwd [closed]

Closed. This question needs to be more focused. It is not currently accepting answers. Want to improve this question? Update the question so it focuses on one problem only by editing this post. Closed 5 years ago. Improve this question History and explanation In the early days of Unix, … as Unix was invented as … Read more

Implementing Kerberos Authentication on Linux servers using script [closed]

Closed. This question needs details or clarity. It is not currently accepting answers. Want to improve this question? Add details and clarify the problem by editing this post. Closed 3 years ago. Improve this question My client wants to implement Kerberos Authentication on multiple Oracle Linux Boxes. Do they need to be done manually or … Read more

Proxy authentication

I’m wondering if replacing a squid proxy server for a heterogeneous network that permits traffic by IP addresses by one that authenticates usernames is viable, having in mind all those different softwares out there that may or may not work OK with authentication. What are your experiences? Am I asking for troubles? Answer Depends on … Read more

Serve 200 without reading the request

I have a system where Server receives large files from clients Files are unused and deleted immediately Clients cannot be updated to stop sending files There are a known number of clients (required number of threads is constant) The server must be Windows/IIS VMs How do I minimize this system’s footprint? My only ideas occur … Read more

IIS Windows Authentication – Change Password at next login

I have set windows authentication and forms based authentication (FBA) in IIS for my web application. I added users to windows so they can login using the windows prompt. I set the checkbox to force them to change their password at the next login. Now my windows users can’t log in. I think it has … Read more

Cloud server running slow

Can anyone help with this: One of our cloud servers is running slow and after running iotop I’ve noticed the below command running for nearly 2 hours, but I’m the only one who would run commands on this server. I haven’t and there has been no breach. find / -ignore_readdir_race ( -fstype NFS -o -fstype … Read more

How is it that my postfix server can also be used without authentication? [closed]

Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it’s on-topic for Server Fault. Closed 2 years ago. Improve this question Whenever I send an email via my Postfix server, I see this in the log: postfix/submission/smtpd: ehlo=2 starttls=1 auth=1 mail=1 rcpt=1 data=1 quit=1 … Read more