I am using VMware® Workstation 12 Pro and setup a very complex networking config with multiple NIC’s, DHCP, Host-Only and VLANs. I have 10 active VM’s that needs to setup a complex environment and most of these VM’s needs 3.5GB to 2GB RAM to run with 2vCPU each. I could …
Read More »Fixing W: GPG error: http://download.opensuse.org Release: The following signatures were invalid: KEYEXPIRED 1501595774 error
I was trying to update one of my server that has some Opensuse repositories and received this error “W: GPG error: http://download.opensuse.org Release: The following signatures were invalid: KEYEXPIRED 1501595774” root@someserver:~# apt-get update . . . ---SNIP---- Ign http://download.opensuse.org Translation-en Fetched 481 B in 4s (97 B/s) Reading package lists... …
Read More »Fix Java error Unsigned application requesting unrestricted access to system
Tried to login to one of my server that requires Java and immediately got this error: Unsigned application requesting unrestricted access to system. The following resource is signed with a weak signature algorithm MD5withRSA and is treated as unsigned After some research on Google I found that the root cause …
Read More »USB and SSD drive speedtest in Linux
The speed of a drive is measured in terms of how much data it can read or write in unit time. The dd command is a simple command line tool that can be used to read and write arbitrary blocks of data to a drive and measure the speed at …
Read More »Encrypted EMail Service ProtonMail Opens Door for TOR Users
Let’s admit it: Privacy and Security are the two elements that matter most on our cyber cruising. Anyone including the government that sleuths on our online activities and data is not so welcome. The good news is that now even your email communication can happen in disguise through Tor network …
Read More »