Specifically, we have a fairly large network of HP thin clients running HP ThinPro (a variant of Debian) with Adobe Flash Player pre-installed. We have a new application coming to the network which will make use of the camera. Flash is doing its job and asking for permission to use the camera every time the page loads. Unfortunately, it is not giving us the options to add the site/domain to its trusted list to not ask for permission every time (perhaps due to the locked file system, not certain why the advanced options aren't coming up). In any case, we're trying to find where Flash Player stores this information so we can go edit it manually in the file system (we can unlock it temporarily, make the change, and re-lock, then capture the system image for later deployments). We've not been able to find where it's located. Any thoughts or ideas where to look?
Justin Scott's questions
Ok, this may sound like a dumb question, but does the SonicOS web interface not have a search option for object definitions?
One of my clients recently decided to replace their Astaro Security Gateways with SonicWALL firewalls. These sit in front of a small data center full of servers and we have several hundred custom service and address definitions that need to be ported.
The SonicOS interface provides a basic list for service and address definitions but no search option to be found. To make it worse, there is no option to list them all on one page (they're paginated 50 at a time) so I can't use the text search on the web browser either. The Astaro units have a nice search option on their definitions so perhaps I just got spoiled by their software.
Am I missing something or is there some way to search for an object without paging through the list and finding an entry manually?
We have a bunch of kiosks deployed into let's just say... abusive environments. The enclosures we had built are tough as nails, and the HP thin client computers are working great. The keyboards that were purchased for the project have been nothing but problems. They're a generic brand direct from a Chinese manufacturer. They're stainless steel with keys mounted from the inside and a trackball, but they've been deployed for only a month and nearly 20% of them are already out of service due to keys sticking, keys not working, trackball problems, water damage, and a variety of other issues.
Are there any kiosk keyboards that can take a beating without breaking so easily? Ideally they should be tamper-proof (keys can't be removed), waterproof, lettering should be engraved into the keys, trackball, option for a single mouse button would be nice, and some protection to keep debris out of the keys so they don't stick (sticky cleaners, food debris, etc.). Does such a beast exist? Everything we've looked at is susceptible to easy damage. We need the M1 Abrams Tank of keyboards. Any suggestions?
We have a series of HP Thin Clients deployed which support their ezUpdate protocol. On boot, it checks in with the DHCP server and looks for tag 137 to get the FTP URL to connect to to check for updates. Our DHCP server is ISC DHCPD and I cannot determine how to configure the options to give out this tag/code with the rest of the DHCP lease information. This is my first foray into ISC DHCPD so please be gentle. Any guidance is appreciated.
Note: The content of the tag would be a string with a URL in the format ftp://user:[email protected]
We have a scheduled task that runs robocopy periodically to mirror a rather large folder structure from one server to another (thousands of folders, 100,000+ files, 50+ GB in size). There is a share on the receiving server where the mirror gets stored. We're running the task from the origin server connecting out to the share on the receiving end. Both servers run Windows Server 2003 and are connected to the same network switch (100Mbps).
The process will sometimes complete all the way through without error. More often than not, however, at some point during the process (seems random as to where), robocopy will fail with the error The specified network name is no longer available.
It will wait 30 seconds and try the file again and eventually give up after a number of retries. Process will repeat at the next schedule interval and may complete... or not.
When this occurs I am not able to access the share at all on the destination server from anywhere on the network for up to 30 minutes. There is nothing else on the network using this share.
My question is what does this error mean specifically? Why is the share "dropping off" and becoming inaccessible? Is there a way to prevent it and get the file mirroring to be more stable?
We are planning to deploy many groups of workstations into a "hostile" environment (think public library, university common area, Internet cafe, etc.) which will have a particular system image that will need to be pushed to all of the systems in the group on a nightly basis. For example, machines are up and running all day with people using them, making changes, etc. Each night we want to re-image all of them back to a standard system image.
I know there are reset programs which can reset a system back to a given state, but we're leaning toward a re-imaging process so that we can change the standard image if needed and push it out and have all machines updated with the new image that night. These systems will be remote and at locations where on-site access for IT staff is limited and expensive. Each location will have a server associated with it which will act as a network gateway and firewall, so if the solution is centralized and can run on the server that would be ideal.
For the operating systems we're planning standalone Windows 7 workstations and a Linux or BSD variant server. Are there any options for pushing standalone Windows system images, automatically, from a Linux or BSD server?
One of our web server clusters serves a moderate number of busy e-commerce applications. At present, each site lives on a specific web server and has a hot-spare copy mirrored to another web server in the cluster. If a server fails, there is a manual process to re-activate the sites on their failover server. We're getting to a point where we need a better solution, not only for failures, but also so that we can take machines down for maintenance without downtime for the sites.
We're considering building a cluster of 2-3 HAProxy servers (primarily because it has a great performance record) to put in front of the web servers. From what I've read it will meet most of our needs for session management and keeping users on the same server, etc. Our biggest concern is in regards to the SSL certificates. Each of the sites has its own SSL certificate. Since the end users would be connecting to the HAProxy servers, I can only assume that we would need to move the certificates to each of the machines in the HAProxy cluster. Since HAProxy doesn't handle SSL directly, I've read that we can accomplish this with Apache+mod_ssl on the same system through a reverse proxy type forwarding arrangement.
So, my specific question is whether HAProxy is actually the right tool for the job? Will the existing SSL certificates (on a Windows 2003 Server at present, a few are EV-SSL certs) be portable to Apache? Are there other software or hardware solutions that we should consider instead (using HAProxy with an SSL site seems more complicated than it needs to be)? Any other caveats in setting up a high-availability SSL web cluster that we may not have considered?
We've discussed the tools used for load testing here on ServerFault, but what about training on how to use them properly? Are there companies that specialize in IT training that cover load testing? How do you properly come up with a simulated load? How long should you run the test for? What are the best metrics to be tracking on the server-side while the test is running? And so on...
System and network administrators are usually very busy people. Juggling projects, meetings, support tickets, and verbal requests from people in the hallways can make a real mess. We've discussed some request tracking systems here in the past, but what other methods or tools do you use to manage your time to be more effective?
Thomas Limoncelli's book, Time Management for System Administrators, has some great ideas, but what works and doesn't work for you in the real world?