comi
comi
Comments
-
Superblock recovery in theory should work, other than that you might want to check what fsck says about the journal, that may yield some hints. In theory you have everything you need: filenames are basically data on disc, they are maps ("filename", inode_number) knowing inode_number you can get the inode itself as long as…
-
$ nc --versionNcat: Version 7.80 ( https://nmap.org/ncat )$ nc -l --ssl --chat 6666
-
hi, well obviously 1.9 is not an integer so -gt fails. There are several ways to do it bc / dcawk$(()) boolean shenanigans or my personal favorite echo "1.9" | grep [1-9]\.[9] > /dev/null && echo High you can lookup "bash compare floats" to find them all
-
Thanks to @Amitz, now I am able to see the future clearly A party!
-
if you want to terminate ssl at it then you can do caching, then ssd makes sense. If you don't need caching, it doesn't matter what you choose then, I guess.
-
it depends on the amount of viewers, so hard to tell buy 16GB for a month, observe your load, buy what you need the next month - it's not that big of a loss. also you get to reinstall so if you happen to mix up something the first time you have a great opportunity to iterate ;-) Nothing really solves this as in any case…
-
BGP load balancing... now that's pod racing
-
Well if you would be looking for some "second step" material, I have an idea of a post about "complexity" in relation to computers and deployments, what's that minimalism movement, when it's useful, when it's "too much" and becomes overcomplicated instead and such... This isn't a "first step" - not how to do it, but "okey,…
-
Man, they are such geniuses at marketing... You know that Intel in Macs never reaches it's peak performance due to inability to cool it, right?
-
whoa whoa ;-) shots fired, lol That's definitely incorrect, anything that can do conditional jump one way or another is considered Turing complete. And also "Turing complete" has never been strictly defined. http://stedolan.net/research/mov.pdf
-
I messed up my online footprint in the past, meaning anyone who knows my real name can google things that I don't want to share. I would very much read a modern guide on how to manage your online identity and I believe it would be interesting/useful to a lot of people.
-
Code fast, use 666 dependencies and giant frameworks for the smallest of tasks, disregard resource efficiency... Downgrade the CPU.... hmmmmmmmmmmmmmmmmmmmmmmmm..........
-
so it was the ip =)
-
You hosting whmcs on a shared hosting? I'm confused... You need to contact the hosting, without access to the server not sure what... wait what but if they started attacking before you used CF that means you couldn't change ip... or did you?
-
Can you post tcpdump? I do not promise, but I might take a look.