vzquota off
It possible your /vx pasttioniom have file system error, so you should check it before vzquota off.
vzquota off
It possible your /vx pasttioniom have file system error, so you should check it before vzquota off.
awk 'NR==FNR{a[$0]=1;next}!a[$0]' B A
curl --silent --location https://rpm.nodesource.com/setup_4.x | bash -
yum -y install nodejs
npm install -g grunt grunt-cli gulp bower
touch /etc/cagefs/conf.d/nodejs.cfg
[nodejs]
comment=Nodejs
paths=/usr/bin/node, /usr/bin/npm, /usr/lib/node_modules
touch /etc/cagefs/conf.d/grunt.cfg
[grunt]
comment=Grunt tools
paths=/usr/bin/grunt
touch /etc/cagefs/conf.d/gulp.cfg
[gulp]
comment=Gulp tools
paths=/usr/bin/gulp
touch /etc/cagefs/conf.d/bower.cfg
[bower]
comment=Bower web tools
paths=/usr/bin/bower
cagefsctl --force-update
AUTH LOGIN
perl -MMIME::Base64 -e ‘print encode_base64(“ajcody\@zcs723.EXAMPLE.com”);’
YYYYYYY5QHpjczcyMy51cy56aW1icmFsYWIuY29t
perl -MMIME::Base64 -e ‘print encode_base64(“Somepasswd”);’
YYYYYYYkMW0=
/etc/init.d/saslauthd start
Check /etc/virtual/usage
echo 500 > /etc/virtual/limit
DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s’)dnl
rpm –import http://apt.sw.be/RPM-GPG-KEY.dag.txt
postmap /etc/postfix/virtual
postconf -d | grep mail_version
mkdir /etc/mail/cert
cd /etc/mail/cert
openssl genrsa -des3 -out server.key 1024
openssl rsa -in server.key -out server.key.open
openssl req -new -x509 -days 3650 -key server.key.open -out server.crt
chmod 600 server.*
vi /etc/mail/sendmail.cf
O CACertPath=/etc/mail/cert
O CACertFile=/etc/mail/cert/server.crt
O ServerCertFile=/etc/mail/cert/server.crt
O ServerKeyFile=/etc/mail/cert/server.key.open
O ClientKeyFile=/etc/mail/cert/server.crt
/etc/init.d/sendmail restart
openssl s_client -debug -starttls smtp -crlf -connect localhost:25
vi /etc/mail/sendmail.mc
DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea’)dnl
/etc/init.d/sendmail restart
copy: content="" dest=/etc/sample force=no
Example:
ansible -i inv server_group -m copy -a "content="" dest=/root/.ssh/authorized_keys2 owner=root group=root mode=0644"
If you still can get access to server without password after logout it means you have SSH ControlMaster session on your ~/.ssh/cm_socket/
So:
ls -la ~/.ssh/cm_socket/ | grep 132.168.2.100
[email protected]:22
rm -rf ~/.ssh/cm_socket/[email protected]:22
Another way: ssh -O stop 132.168.2.100