Jump to content

Automatic

Members
  • Content Count

    553
  • Joined

  • Last visited

Community Reputation

1 Neutral

About Automatic

  • Rank
    Advanced Member

Converted

  • Gender
    Undisclosed
  1. That's a piece of hardware, right (Google results return hardware)? If so, I'm looking for software to throw on my already existing linux setup.
  2. I'm currently looking at other programs released and I'm trying to find something that does something like unRAID, however, I can't seem to find any program (like MDADM) that allows raid 4 arrays (With or without striping) to have multi-sized disks. So, how does unRAID do it? Is custom? Is there anything like it I can use that's not unraid? I know I could probably find out by spending hours going through my unraid box, but, I'd prefer to save those hours.
  3. So, I'm RMAing a SeaGate drive that I've had for about a year, I was going through the steps, first was "Input your serial number", then "Input your address", Then "Where do you want to ship to?" and finally "Submit order"? I've yet to submit the order, but, aren't I meant to tell them what's wrong with my device? They seem to have asked me zero questions what-so-ever.
  4. Have I ever told you about every HP printer I've ever owned? They don't work. They get stuck, the support refuse to help, the printers likes to random DC from my WIFI.
  5. It should write to it the second that it's called in line for high-water.
  6. Can I ask what this command does? I saw you tried to explain it in page 1, however, with this thread & google I'm still failing to see what it does. EDIT:- http://www.cs.fsu.edu/~baker/devices/lxr/http/source/linux/Documentation/sysctl/vm.txt?v=2.6.25 Seems to explain it, not sure if it's because I'm super tired right now or I'm just an idiot, but, I don't really understand it.
  7. Assuming the issue is the same as before, can you run this:- curl http://slackware.oregonstate.edu/slackware-12.2/slackware/d/gcc-4.2.4-i486-1.tgz | md5sum And tell me what it says? Maybe also:- curl http://slackware.oregonstate.edu/slackware-12.2/slackware/d/gcc-4.2.4-i486-1.tgz | wc -c Only reason I ask is I know some hotspot software (aswell as malware, antiviruses, proxies (big one for javascript & browser caching), and all the rest) inject items into downloads (Normally just HTML, JS and CSS, although, if poorly made (or maybe really well made) could technically fall into zip files) Only reason I ask is because to really looks like the files are corrupted (or modified) rather than 'not working'. EDIT:- Another example is if you live in a country that either has an issue with the slackware distribution, or, is just against free speech/white-lists URLs (not too sure I can name a country that does this, although, I live in the UK). An example I can give you however is that the UK hates ThePirateBay (Who would have guessed? I'll stick to usenet for my downloading, however) and my ISP likes to drop 100% of connections to that site (Sky). Although yours probably doesn't drop the page, it may be more like Virgin Media (Which give a nice "You may not access this page" error) EDIT2:- The lovely message you see when accessing ThePirateBay via Virgin Media:- Basically, I would assume, their DNS servers reply with a fake IP that is in fact their servers, then, that's just the page that listens on all HOST: headers. Just a guess however, I'm not on Virgin Media. I know sky issues you the correct DNS settings, however, just refuse access to said IP (All pings drop, TCP:80, etc...)
  8. 4242 is the port used for transmitting data and the port crashplan will open 'to the world' both on the server (i.e bound to all interfaces) and also try to upnp / traverse NAT in combination with your router. 4243 is indeed the GUI comms port but is only bound to localhost on the server. Crashplan doesn't try to make it open to the world - which is why I didn't mention it. Oh, I forgot. Sorry, I changed mine so that 4243 is open to the world. Silly me. Yeah, you're right.
  9. As above, this isn't true. The crashplan 'client' is also a server and will try to open up a port to allow inbound connections. Whether this succeeds based on your client config, router config or firewall / other network considerations is another matter. But crashplan will want to go there whether you intend to use it or not. Have a look at port 4242 on your unraid server... Pretty sure it's port 4242 and 4243. 4242 is for the transmitting of data (That you backup), 4243 is for the GUI.
  10. Disgusting that you have to protect a site for this type of thing. Why? That's the same thing as saying "Disgusting that you have to lock your house before going on holiday".
  11. Stop all plugins, stop the array, assign the new drive as a cache drive, start the array (To format it), stop the array, copy all files over from the old to the new, start the array, start plugins. I believe anyway, I'm probably wrong, wait till someone else comments.
  12. Well my suggestion wasn't in bash. Anyway, each to their own, although, I'd much prefer to use dependent free advanced software.
  13. Find isn't made in bash, I would assume it's made from some kind of C derivative (Although honestly not sure). Bash is simply a scripting language to queue up commands to be executed. Assuming we follow your logic, that'd mean that what you coded was made in Bash and so what Python, simply because you can access them from the Bash engine. Anyway, I honestly recommend you learn the basic unix I/O program arguments, it would mean that you can hop to a new machine and start doing the same commands without having to copy/recode your python scripts.
  14. But why? Not only does that limit the amount of things you can do (Find is a HELL of a lot more developed), but, also requires the dependency of Python. Seems like a lose-lose to me.
  15. You do realize this is very easy to do just with the "find" command? Disk one files only:- find /mnt/disk1/ -type f Disk one directories only:- find /mnt/disk1/ -type d Disk one all objects:- find /mnt/disk1/ /etc Then you can also start matching files between folders to check for duplicates over multiple disks:- find /mnt/disk* -type f | sed "s/\/mnt\/disk[0-9]\///" | sort | uniq -d Which will:- find all -type f files located at /mnt/disk* and then sed "s/\/mnt\/disk[0-9]\///" remove the prefix of "/mnt/disk{number/" to finally sort sort them and uniq -d disable non-unique (-duplicate) listings. Then you can also generate the md5sum of all the files:- find /mnt/disk* -type f | xargs md5sum And also the sha1sum:- find /mnt/disk* -type f | xargs sha1sum For instance:- find /boot/ -type f -name "*.bat" | xargs md5sum Would output:- bbfa5207af2aea433545aaa191dc5fd9 /boot/make_bootable.bat Although it's nice of you to post this, it seems that the default commands in unix have you beat.