Drink default password

All things Arnold Palmer

2012.04.26 01:36 WinstonsTasteGood All things Arnold Palmer

[link]


2013.04.03 03:05 A_Jewish_Banker eulalia: The Redwall Subreddit

A community to discuss the book series Redwall by Brian Jacques.
[link]


2008.01.28 10:40 Internet Relay Chat! (Announcements, Support, QDB)

/irc is a subreddit dedicated to all things Internet Relay Chat
[link]


2024.04.29 02:22 HAYPERDIG Cannot Connect to Database Server

Whenever I open my MySQL server and try to connect to it, it just writes this next error: Your connection attempt failed for user 'root' to the MySQL server at 127,0,0,1:3306: Access denied for user 'root'@'localhost' (using password NO) Please: Check that MySQL is running on adress 127.0.0.1 Check that MySQL is reachable on port 3306 (note: 3306 is the default but this can be changed) Check the user root has rights to connect to 127.0.0.1 from your adresss (MySQL rights define what clients can connect to the server and from which machines) Make sure you are both providing password if needed and using the correct password for 127.0.01 connecting from the host adress you're connecting from. How do I fix this? There is a MySQL service and is running, but when it is offline it just says No Connection Established
submitted by HAYPERDIG to mysql [link] [comments]


2024.04.29 01:44 Dvillewop PS3/PSN Question

PS3/PSN Question
Hoping that someone can help me as PSN told me that they can't help me. I have a PS3 and have had it for several years and never had any problems with it. I haven't used it in years. I wanted to start using it again. My PSN email was no longer available to me, I had no access to it as it was an old email. Couldn't remember the password either. I call PSN and get my email and password updated for my account. They tell me I should be able to sign in and start using it again. It still would not let me sign in. It then told me that in order to use it I had to creat a "device setup password" so I go online on my computer , sign into PSN, create the setup password, go back to the PS3, use my new usable email address and the setup password just as the directions say. It still won't let me sign in and the whole process starts again. I tried this like 20 times, creating new passwords and nothing worked. I called PSN back and told them my problem, they told me they offer no support for the PS3 anymore and pretty much I was out of luck and they couldn't help me. I have years worth of game saves and I don't want to lose any of it, that is all still there and fine, no data loss at all. Everything on the system works, and all my data is still there. I just can't play ANY games because I can't sign in. I have no idea what to do. Again I don't want to lose any data on the hard drive and I want to start playing games on it again. Can anyone on here help me or even know what I am talking about? I'm begging for help here please. Thank you in advance! I included one photo of what the PS3 keeps telling me. Oh, also, even though I keep trying to sign in with my new email and password, it keeps defaulting to my old, unusable email address, and I don't understand that either. Again, thank you and hope someone out there can help me.
submitted by Dvillewop to PS3 [link] [comments]


2024.04.29 00:55 CroutonIsFun Info about debugging features

Debugging features can be enabled when you first transition from verified mode to developer mode. At the welcome screen, after about 10 seconds, you can click on the 3rd line to enable.
The Chromebook will first restart so as to turn off rootfs verification. Then, you'll be prompted to enter a root password. If you leave it blank, a default test value will be saved.
Once debugging is turned on, an ssh server will run every time you boot up. My particular usage works like this. Press ctrl-alt-t, and type shell. Next,
ssh root@localhost passwd chronos
Then, I logout with ctrl-d
Next, I go
ssh chronos@localhost
From this point onwards, I can use sudo in the crosh shell until logging out with ctrl-d.
When you're at the crosh shell, you're on the outside looking in, and sudo is banned. But once you login to localhost, the world is your oyster.
When ChromeOS updates, you lose your settings, and have to return to verified mode, then transition to developer mode again.
submitted by CroutonIsFun to chromeos [link] [comments]


2024.04.28 23:14 jpegdonkrider “Payment Required” But I Can’t Pay

I sell on eBay and accidentally put the wrong password onto my bank account a few times and I guess it did some security protection thing and it auto signed out that bank account from things like Plaid. I didn’t realize this and Coinbase defaulted to my old bank account. I made a few purchases with that bank account which has long been closed totaling $26.
Really not a big deal, I contacted support and they told me just to wait for the payment to fail then pay with the other bank account.
Well, when I try to pay nothing happens. A screen pops up saying “payment complete” but it still says I need to pay, and it’s not taking anything out of my bank account. So it’s literally impossible for me to pay.
Also, it says I made the attempted payments on 12/31/1969, what the heck?
Anyone had chargebacks and been unable to pay off the required payments. I’m literally trying to give Coinbase my money and they won’t take it
submitted by jpegdonkrider to CoinBase [link] [comments]


2024.04.28 23:06 mundungous 5 HTP Warning

I’ve been on duloxetine for a few months now and it’s helped me so much. The initial 10 days or so were not good but now it’s in my system I can function as a regular human again. A couple of months ago I got an infection which required antibiotics. As soon as I started taking them, my mood dropped massively, almost to how I was before. I checked on this (invaluable) site Drug interaction checker and found a strong interaction between my antibiotics and duloxetine. It was hell until my course of antibiotics finished and then I had to let the duloxetine back into my system as if I was starting again from scratch.
Anyway, I was back up to normal and feeling great. Then I started feeling awful again. I was confused. I couldn’t even remember my passwords that I’d been using for years at work. I was so depressed and just wanted to die under a rock. I checked with all the medications, vitamins etc to see what could be the problem and remembered I’d been taking a 5HTP every now and then to help me sleep. Sure enough I checked on the interaction site and they fuck with your duloxetine. Stopped the 5HTP and I’m back to normal again. Phew.
I have the site saved now and will always check it before taking anything in the future.
TLDR: Don’t take 5HTP whilst on duloxetine/ cymbalta
submitted by mundungous to cymbalta [link] [comments]


2024.04.28 22:22 PepperSalt98 Issues with PIN and old Microsoft account/s

For reference, I left school over a year ago. I occasionally used my school Microsoft account on my computer for access to OneDrive and such. Obviously I also have my main Microsoft account which I use for everything. I haven't touched the school account since I left. But for some reason now, i keep on getting a pop-up to sign back into it. I don't want to do this, I don't need to do this, but the damn notification comes up when I'm trying to play games, every hour or so. I couldn't sign into my school account if I wanted to; I don't remember the password and it was probably deleted when I left anyway.
Also, when I try to enter my computer and put in the PIN, it freaks out and says I need to reset my PIN. So what I've been doing is sign into my Microsoft account when the option comes up to reset, and then cancel the PIN reset, which unlocks my computer. This takes ages and requires inputting my password, my phone number, and then a 4-digit code sent to my phone. Notably my computer now always starts with seven or eight Steam tabs open, filling my entire screen. These can only be closed by opening Task Manager.
What do I do about this? I've tried to find away to completely sign out of the school account (quitting the school OneDrive which always opens up by default) but the notification always comes back and interrupts whatever I'm doing. I can't manage the account since I can't sign in. Also the issue with opening my computer is way too laborious, and is clearly a glaring issue that needs to be fixed somehow.
I have a laptop and it runs Windows 10, if that helps.
submitted by PepperSalt98 to pchelp [link] [comments]


2024.04.28 21:07 quietek New to Guix, could use a little help

Hi,
Im trying out guix as a new distribution and so far i have it running pretty well, but there are a few things ive been having a bit of trouble with that i was hoping someone out there would be able to help me with.
  1. I prefer to unlock my disk encryption using a usb stick. The way i have this set up on other systems is to read directly, since the key was copied via dd, from /dev/sdb or /dev/disk/by-id/SOMEID. I seem to be having some trouble getting this to work with guix though. I have my keyfile referenced in my system.scm, but im still getting prompted for a password twice, and on the second prompt it tells me "failed to open key file". Does anyone know how to get it to read my keyfile correctly and remove both password prompts when my drive is plugged in? Im a little uncertain on if /boot is encrypted as well and thats the reason its prompting me twice. i used the system crafters nonguix graphical install with a slightly modified config, not sure exactly how that might affect the encryption.
  2. Im having trouble with non-latin characters. I'm using the same font as another system that correctly is displaying said characters without issue. Is this purely a case of something with the font or do i need to add new locales or something?
  3. I've been having trouble getting my user to default to zsh instead of bash. I tried changing it via shell in user-account in my system.scm, but each time i logged in it would immediately kick me out saying it couldnt find zsh or something like that? I also wanted to mention i edited my home environment config references to bash to references to zsh. I was initially able to spawn new kitty terminals with zsh loaded by default, but trying to login with a new tty or after rebooting kept throwing the zsh missing error and kicking me me back to login. I was able to login with root just fine (which was still configured for bash as its shell) and then reload my system/home config with bash.
  4. I saw an example configuration for starting sway on login on tty's 2 and 3 out there, but i was struggling to see in the documentation anything regarding just adding it as an option on gnome's login screen via the gear icon in the bottom right?
  5. Each time i login via tty and start sway I've noticed I need to use sudo for poweroff/restart, i'm pretty new to shepherd so i wasnt sure if there was a power usergroup i needed to add myself to or something?
Thanks!
submitted by quietek to GUIX [link] [comments]


2024.04.28 20:59 manicpixiedreamgill A roundup of radiant outfits

A roundup of radiant outfits
Radiant is probably my #1 keyword! I am very emotionally impacted by color, and I really prefer to wear brights and pastels. Since dyeing my hair I’ve noticed an even stronger desire to match the level of my hair color. Here’s a roundup of various outfits from the past three weeks that show how I work with the radiant keyword.
1: I just thrifted this linen jumpsuit and wanted to wear it immediately. I don’t often wear all solid colors, but I felt like highlighting the earrings and playing with color blocking. Style logic - worn for a lazy day and then a casual friend hang where I wanted to feel put together but not too over the top.
2: A repeat outfit, which is likely to happen a lot as I land on my fave combos. Style logic - was invited to a networking event and then drinks afterward with a new friend. Wanted to look creative and demonstrate effort but also coordinate well enough with her level of business-casual punk. I’ve noticed that I really consider the vibe I bring socially; I want to express myself yet in a way that feels supportive to the level of the group and event.
3 - 6: All causal outfits for days working around the house, running errands, having low key friend meetups, voting, etc. Style logic - I am figuring out the level of “casual” I’m comfortable wearing while still feeling like myself. This is even more necessary in the summer when I often default to practical outdoors concerns. It’s a work in progress so I’ll share more thoughts as I continue to reflect!
7 & 8: These outfits are from the same day. First we had our town’s Cherry Blossom Festival, and then we went to Taylor Swift dance night round two. Style logic - I’ve been increasingly drawn to wearing all pink to match my hair. And I wanted to match the cherry blossoms, of course! For dance night I wore the same outfit that worked last time. The only downside was that it was much too warm to wear my rainbow fuzzy coat, so this didn’t look as much like a Lover themed outfit. Oh well! The next themed night is in August, so I may come up with a new idea by then.
Reflections overall: I am very happy working with radiant as a keyword. It applies to most colors I wear, and I also use it to focus on texture and shine. I love metallics, glitter, sequins, rhinestones, etc so I add them to outfits whenever I can get away with it. I find it easy to work with radiant in every type of outfit, from a bathrobe to a formal dress. (Like right now, I am writing this while wearing a white terrycloth robe with pastel rainbow stripes, and I still feel radiant.) Some keywords are harder to apply across many situations, so that’s a big reason why this one stands out so much in my style process. I am curious whether anyone else has a most-used keyword?
submitted by manicpixiedreamgill to RitaFourEssenceSystem [link] [comments]


2024.04.28 20:47 Dude_Man_Bro_Sir Nextcloud fails to create admin account in TrueNAS Scale Dragonfish

I recently posted about a problem installing Nextcloud in TrueNAS Core and was prompted to migrate to Scale. I did and tried to install Nextcloud again. I followed the steps outlined in the documentation but I did diverge a bit on the Adding Nextcloud Storage section and instead followed the steps in the section "Create datasets and set permissions to www-data" in this YT video.
Then, when I tried running the web portal and I tried putting in the credentials I set in the Nextcloud install page, I get hit with this error message:
Error while trying to create admin account: An exception occurred in the driver: SQLSTATE[08006] [7] connection to server at "nextcloud-postgres" (172.17.201.140), port 5432 failed: FATAL: password authentication failed for user "nextcloud"
I uninstalled and reinstalled Nextcloud a few times with different credentials (i.e. from the default "admin" to something else or the password from the default "changeme" to something else) but they all produce the same error.
I don't know what I did wrong or if I'm missing something with the installation process.
submitted by Dude_Man_Bro_Sir to truenas [link] [comments]


2024.04.28 20:41 jathejester Kodi Remote no longer works (screenshots attached)

Kodi Remote no longer works (screenshots attached)
So I’ve got an issue, I am using Kodi on my Xbox Series X and a currently on Kodi 21.0. My app won’t connect. I am using the official Kodi Remote on both my iPhone and IPad neither work
First I tried to add the host by filling out all the host info but no luck.
Then I tried to auto find but it says I need to toggle the “announce these services to other systems through zeroconf” under the settings/services/general tab but that option doesn’t exist there. Has it moved and I’m just not seeing where it is this an issue?
I would really like to regain control through my app so any help or tips would be greatly appreciated
submitted by jathejester to kodi [link] [comments]


2024.04.28 20:35 Numbers-Game25 Canarias Tradicional: Tips from a Newbie

Canarias Tradicional: Tips from a Newbie
I just started drinking yerba mate a couple of months ago. Canarias Tradicional is the second brand I try. I really like the strong, distinctive flavor, but it has taken me some time to get used to its texture and strength. Like all Uruguayan brands, Canarias is a "sin palo" yerba, which gives you a stronger flavor. At the same time, this cut absorbs water like a sponge, so if you pour in too much yerba, after a few refills your gourde will be overflowing with a muddy mess of wet yerba. Therefore, I recommend filling only half your gourd with yerba, as opposed to the default 2/3 or 3/4.
To help manage the mound as you pour water, I use a plastic knife to push the wet yerba mix against the wall of the gourd every now and then. Since the knife is flat, it makes it easy to shape the vertical wall of the mound (and you don't have to move your bombilla, which is never recommended).
Regarding duration, Canarias has an extra-long cycle, so it won't lose taste for many, many refills. That's a double edge sword though, because if you drink too much it may make you jittery or upset your stomach. The sweet spot for me is to stop between half a liter to 3/4 of a liter, enough to enjoy the taste while giving me a decent energy boost.
If you get used to the texture of the Uruguayan "sin palo" cut, and you are OK with the taste and strength, you can't go wrong with Canarias Tradicional as your go-to yerba. If you like the texture buy the strength is too much, perhaps a next step could be to try Canarias Serena (a variety that includes other herbs that give you a calming effect without losing the yerba mate taste).
What has been your experience with Canarias Tradicional?
submitted by Numbers-Game25 to yerbamate [link] [comments]


2024.04.28 20:30 TitanAura Badigadi: The Foolish Demon King of Wisdom (Final Arc Spoilers)

"If one man in a sea of fools is just a little smarter than the rest of them, can you really say he's clever? No, you can't! The fact he didn't see it himself proves he wasn't such a genius!"
Immortal Demon King Badigadi is like the walking embodiment of what is probably the single most famous quote in western philosophy, "I know that I know nothing." And all it took for him to figure it out was his thousands of years of life experience, a war of total annihilation, and coming back from the dead. Okay, so he was a bit slow on the uptake. He'd be the first to admit the Immortal Demon tribe can be a tad too patient when it comes to figuring things out and getting things done. Socrates thought really hard for a few years and figured out an approach to life that has remained a functional part of human culture for thousands of years, surviving even the collapse of his own civilization. Badigadi just needed a little push... in the form of a continent annihilating explosion to help that same message penetrate the thickness of his skull.
That's not to say Badi is as much of an idiot as he claims (quite the opposite in fact!), only that he must be a tad foolish that he requires life-altering paradigm shifts to piece together obvious solutions to personal issues that most people intuit naturally or otherwise don't worry about in the first place. Kishirika might be a tad lax about her own self-preservation, but she intuitively understands how to enjoy life. Meanwhile, Badi toils away, stuck in his own head, ruminating endlessly, playing back the difficult choices and mistakes he's made in the past over and over until he becomes paralyzed with indecision and self-doubt. I'm sure it goes without saying that this endless cycle of rumination is a struggle many of us identify with all too often.
Whilst retrieving the Fighting God Armor, Badigadi enters one such cycle of rumination and uses the process of breaking him from it as a test for Geese. He ruminates on the loss of culture and knowledge, of heroes and legends eroded by the sands of time, of landscapes and terrain that no longer exist yet live on solely within the memory of his tribe. He feels the tremendous weight of that loss and the burden of being one of the sole remaining people carrying the legacy of what was. It's the equivalent of being personal friends with Socrates himself and living long enough to not only witness his death and the implosion of his civilization, but the memory of his very existence fade away with the passage of time such that a quote as foundational to civilization as "I know that I know nothing" is not even esoteric knowledge amongst modern civilization. Try as we might, the concept of existence beyond our own lifespans is difficult and alien to us. How does one reckon with the weight of eternity?
Yet, despite Geese' deeply flawed perspective on life, he passes the test with flying colors. While his vocabulary is ineloquent and his mannerisms uncouth, his words carry weight precisely because of his intent rather than the intelligence with which he conveys it. He effectively points out that living memory and perspectives are relative. All one has to do to witness the erasure of one's history and culture is travel a few miles in any direction. If you were go to any country in Asia and ask someone to recite the most famous quote in philosophy, odds are Socrates would not even be in the top 100, instead defaulting to one of the many famous Confucius sayings such as, "He who learns but does not think, is lost. He who thinks but does not learn is in great danger." Such a quote would also perfectly meld with Badigadi's philosophical nature! Then again, one doesn't even need to travel that far to receive a similar level of culture shock. Just go down to a local frat house and attempt to engage in a philosophical debate to receive a myriad of blank stares from kids who've never even heard of these "Sock-rats" or "Confusion" guys. Yet you'd be hard pressed to find a group more joyful and bursting with life! Say what you will about fools, they know how to find happiness with such little effort!
It's paradoxical to those of us for whom rumination is the norm. To solve problems and find solutions through logical means and to take preventative measures to ensure we are prepared for the worst. Yet it leaves us unsatisfied and deeply unhappy most of the time. Certainly, compared to a fool we're more productive, proactive, and conscientious in applying lessons learned from the past to our plans for the future. Yet we are the least prepared when plans go awry.
Certainly the trauma of his own misguided actions during the Second Great Human Demon War lives on in his heart. To this day he can recall with perfect clarity the feeling of his blade piercing his beloved Kishirika, the sound of her comforting laughter as she chides his stubborn, humorless demeanor, and his humiliating, impotent rage and anguish towards the so-called God of Humans who manipulated him. But time has a way of putting things into perspective.
"There are some battles you can't win just by manipulating things from the safety of the shadows. Sometimes you gotta put your life on the line, to gamble on your chance at victory. I know it." said Badigadi. "There was a time I didn't, which is why I ended up losing everything. So, I learned, I've honed my body, chugged all kinds of alcohol, and made battalions of friends! FWAHAHAHA! I wish I could show you the puny nobody I used to be!"
Indeed, Badigadi was once a self-conscious, neurotic introvert with a bad habit of shutting himself away from social contact. Remind you of anyone? Yes, much like a certain man awkwardly fumbling through his marriage nuptials, I suppose I should follow Lord Badi's advice and simply cut to the heart of the matter this time, FWAHAHA! Just like nearly everyone else in the cast, Badigadi is yet another foil to Rudeus!
More specifically, Pre-Fighting God Badigadi most closely resembles Eartheus. Actually, "resembles" might not be a strong enough description. If you ignore his 6 arms, obsidian black skin, enormous stature, or the very concept of physical appearance in general and you could scarcely tell them apart! Or so Kishirika might say given her ability to perceive the "shape of their soul" when she describes the "boring man" Badi used to be:
"You are too serious for your own good... Too sour faced. Always holing up in your room... never drinking any ale... never sleeping...! What's so fun about that?"
In fact, the similarities only become more pronounced the more you look at their history. As youths they were naturally more gifted in intelligence than their peers, took their intelligence for granted, and became so lax in accumulating knowledge (instead resting on the laurels of their natural talent) they found themselves hopelessly unprepared to keep pace with the demands of their changing environment culminating in a beating (by bullies/Aldebaran respectively) so vicious it left their confidence shattered.
Similarly, they have both "reincarnated" (or regenerated in Badi's case) once after making the worst mistake of their life (not attending parent's funeral/donning the Fighting God Armor). Using this fresh start they hone their body, drink some good ale, make battalions of friends, and sleep with some women. Certainly there are some nasty bumps along the road, but they eventually find their happiness with the people they love leading to the pair of satisfied, contented men we find at the end of Volume 26. I realize that's a fairly... erm, \reductive\** description for the events that encompass the entirety of the Mushoku Tensei series, but to be fair that's pretty much how Badigadi himself would describe their lives up to this point.
Indeed, in their final few conversations with the Man-God, Rudy and Badigadi's reaction to his tantrums are identical. Despite the acknowledgement of his misdeeds and petulant, infantile behavior, they express their gratitude to him. That's not to say they FORGIVE him for his past malfeasance and betrayal, but a few decades/millennia spent living a satisfying, productive, happy life to the absolute fullest provides them with perspective. They come to understand that the trials in life are what gave those fleeting, mundane moments meaning. Without the paradigm shift that the Man-God (unintentionally) provided them, they would have remained shut away in their own heads even during periods of rest, fretting about the next life problem they must deal with, incapable of truly relishing those lulling, humdrum moments sandwiched between the tribulations.
Badigadi serves as an example of how to lead a life well lived. When reflecting back on the time most precious to us, it's not the outcomes of those hard times that come to mind... it's those quiet moments spent with friends and family that give us the most joy precisely because they were so fleeting.
"The shorter-lived races always wanted to cut down on wasted time. Even though wasting time is what made that time so special..."
submitted by TitanAura to sixfacedworld [link] [comments]


2024.04.28 20:17 Space_Carrot_ Bios - No storage device present [FA507NV - TUF A15 2023]

Bios - No storage device present [FA507NV - TUF A15 2023]
Hey everyone Last night I was using the laptop as normal and in the morning I turned it on, and it goes straight to bios. I tried to move the ssd to second slot, removing battery and then holding power button for a minute, running laptop with battery unplugged but it did not help. My bios weren't up to date so I just updated them using ez flash 3 utility to the newest version from asus website. Did anyone also experienced this issue? Even after restoring bios defaults, moving ssd to another slot, and updating bios? As you can see from photo, it detects other components with no issues. It has also detected the USB stick when I updated the bios. I suppose the ssd is screwed? Thank you for any help
submitted by Space_Carrot_ to ASUS [link] [comments]


2024.04.28 20:03 amerpie 77 Types of Notes to Create in Obsidian

77 Types of Notes to Keep in Obsidian

  1. A scratchpad for temporary text snippets
  2. Published blog posts
  3. Bookmarks via Raindrop.io
  4. People you work with (co-workers)
  5. Customers/Clients
  6. A record of your daily appointments
  7. Weather reports
  8. Restaurants where you've eaten
  9. Recipes
  10. Watched YouTube videos
  11. Watched movies
  12. Watched TV shows
  13. Music you've listened to
  14. Games you've played/bought
  15. Apps you want to buy
  16. Receipts via email
  17. Apps you own
  18. Analytics reports from your web site or blog
  19. Registration info for software you've purchased
  20. A record of interactions with your family members who live separately
  21. Random photos
  22. Saved blog posts from writers you like
  23. Phone numbers and contact information
  24. Two Factor Authentication backup codes
  25. Copies of your insurance cards
  26. Lyrics to your favorite songs
  27. Profile pictures to use on web sites
  28. Your bank routing number
  29. Podcasts you want to subscribe to
  30. Books you've read/want to read
  31. Vacation plans
  32. Your favorite memes
  33. Copies of vital documents like birth certificates, marriage licenses etc.
  34. A copy of your resume
  35. Your current and past goals
  36. A copy of your will
  37. A copy of your healthcare power of attorney
  38. The random poem you've written
  39. Cue sheets for long bicycle rides
  40. Jokes you want to remember
  41. A list of things you love
  42. A record of completed tasks from your task manager
  43. Your favorite quotes
  44. Transcripts of your Q&As with ChatGPT or Google Gemini
  45. Saved emails
  46. Notes from training you've attended
  47. The encryption key for Bitlocker or File Vault
  48. A brag document for your job
  49. Technical "How to" documents for computer related tasks
  50. Non-vital passwords
  51. Wifi passwords
  52. Imported web pages from your read it later service
  53. RSS feeds from your favorite blogs
  54. Software manuals
  55. Appliance manuals
  56. Default settings for your computer
  57. A record of your Amazon purchases
  58. End of the year "Best of" articles to check out on books, TV, podcasts, movies, articles
  59. Screenshots of social media posts you like
  60. Purchasing wish list
  61. Templates for various dataview queries
  62. Terminal or Powershell commands too complicated to remember
  63. How to write in Markdown
  64. Search tips, syntax and operators for your favorite search engine or AI
  65. API Keys for various web services
  66. Templates for your Obsidian plugins
  67. Templater snippets
  68. All the topics in your quotes collection
  69. Drafts blog posts
  70. A history of your social media posts
  71. A "To Watch" list for YouTube and television
  72. A daily gratitude list
  73. A record of new things you've learned
  74. Alarm codes for your relative's houses
  75. A dataview query for notes created today
  76. A dataview query for notes modified today
  77. Waypoint Folder Notes for your important folders of notes
submitted by amerpie to ObsidianMD [link] [comments]


2024.04.28 19:56 4ur3lius Bunch of noob questions theme settings

Hi all,
I am just getting started with Shopify and am trying to get my shop to look the way I want but am running into a bunch of issues. I am using the Dawn theme and I have a custom font I want to use and have successfully(?) added using the method I found on the ezfycode blog. Is there any way to apply the custom font to the menu drawer?
The second thing I ran into is that I have applied a custom color scheme of #F3F3F3 for the background and #DD1D1D for the foreground but I cannot seem to apply that scheme to the Page heading or any of the policy pages. Is is possible to format those and, if so, how?
Third, I am probably doing this completely wrong but I tried creating a custom page for a product line. I created a new page, added it to the menu, and then went in and added a rich text block so I could put a description under the title. I haven't even gotten to adding the products when I noticed that there was a huge gap at the top of the page. I checked and the header has the same padding as the home page (where everything looks right). What could be causing this?
Last one (for now), is is possible to change the default text in the theme? The font I am using has ornate caps and then lower case is the plain version so I was hoping to change them all to lower case. For example, instead of "USD" on the price listing I want the default text to be "usd". Is there a way to do that?
As I said, I know these are probably mostly simple questions, so if there is a reference you cold point me to to find the answers myself, that would be great. Right now I feel like I'm drinking from the firehose and getting frustrated that I can' even make simple typographic changes much less get the chop to look and act the way I want it to.
Any help is greatly appreciated.
Thanks!
submitted by 4ur3lius to shopify [link] [comments]


2024.04.28 19:11 SieteSeven77_ Basic Config 2.

Access Methods
A switch will forward traffic by default and does not need to be explicitly configured to operate. For example, two configured hosts connected to the same new switch would be able to communicate.
Regardless of the default behavior of a new switch, all switches should be configured and secured.
Table caption
Method Description
Console This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as performing the initial configuration. A computer running terminal emulation software and a special console cable to connect to the device are required for a console connection.
Secure Shell (SSH) SSH is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device, including an active interface configured with an address. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.
Telnet Telnet is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network. Unlike SSH, Telnet does not provide a secure, encrypted connection and should only be used in a lab environment. User authentication, passwords, and commands are sent over the network in plaintext. The best practice is to use SSH instead of Telnet. Cisco IOS includes both a Telnet server and Telnet client. Note: Some devices, such as routers, may also support a legacy auxiliary port that was used to establish a CLI session remotely over a telephone connection using a modem. Similar to a console connection, the AUX port is out-of-band and does not require networking services to be configured or available.
2.1.5 Terminal Emulation Programs There are several terminal emulation programs you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection. These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes.
IOS Navigation
2.2.1 Primary Command Modes
In the previous topic, you learned that all network devices require an OS and that they can be configured using the CLI or a GUI. Using the CLI may provide the network administrator with more precise control and flexibility than using the GUI. This topic discusses using CLI to navigate the Cisco IOS.
As a security feature, the Cisco IOS software separates management access into the following two command modes:
User EXEC Mode - This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol.
Privileged EXEC Mode - To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the # symbol. The table summarizes the two modes and displays the default CLI prompts of a Cisco switch and router.
Table caption Command Mode Description Default Device Prompt User Exec Mode Mode allows access to only a limited number of basic monitoring commands. It is often referred to as “view-only" mode. Switch> Router> Privileged EXEC Mode Mode allows access to all commands and features. The user can use any monitoring commands and execute configuration and management commands. Switch# Router#
2.2.2 Configuration Mode and Subconfiguration Modes To configure the device, the user must enter global configuration mode, which is commonly called global config mode.
From global config mode, CLI configuration changes are made that affect the operation of the device as a whole. Global configuration mode is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
Global configuration mode is accessed before other specific configuration modes. From global config mode, the user can enter different subconfiguration modes. Each of these modes allows the configuration of a particular part or function of the IOS device. Two common subconfiguration modes include:
Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access. Interface Configuration Mode - Used to configure a switch port or router network interface. When the CLI is used, the mode is identified by the command-line prompt that is unique to that mode. By default, every prompt begins with the device name. Following the name, the remainder of the prompt indicates the mode. For example, the default prompt for line configuration mode is Switch(config-line)# and the default prompt for interface configuration mode is Switch(config-if)#.
Navigate Between IOS Modes Various commands are used to move in and out of command prompts. To move from user EXEC mode to privileged EXEC mode, use the enable command. Use the disable privileged EXEC mode command to return to user EXEC mode.
Note: Privileged EXEC mode is sometimes called enable mode.
To move in and out of global configuration mode, use the configure terminal privileged EXEC mode command. To return to the privileged EXEC mode, enter the exit global config mode command.
There are many different subconfiguration modes. For example, to enter line subconfiguration mode, you use the line command followed by the management line type and number you wish to access. Use the exit command to exit a subconfiguration mode and return to global configuration mode.
Switch(config)# line console 0 Switch(config-line)# exit Switch(config)# To move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the exit command.
To move from any subconfiguration mode to the privileged EXEC mode, enter the end command or enter the key combination Ctrl+Z.
Switch(config-line)# end Switch# You can also move directly from one subconfiguration mode to another. Notice how after selecting an interface, the command prompt changes from (config-line)# to (config-if)#.
Switch(config-line)# interface FastEthernet 0/1 Switch(config-if)#
Basic IOS Command Structure This topic covers the basic structure of commands for the Cisco IOS. A network administrator must know the basic IOS command structure to be able to use the CLI for device configuration.
A Cisco IOS device supports many commands. Each IOS command has a specific format, or syntax, and can only be executed in the appropriate mode. The general syntax for a command, shown in the figure, is the command followed by any appropriate keywords and arguments.
Keyword - This is a specific parameter defined in the operating system (in the figure, ip protocols). Argument - This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5). After entering each complete command, including any keywords and arguments, press the Enter key to submit the command to the command interpreter.
Hot Keys and Shortcuts The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting easier.
Commands and keywords can be shortened to the minimum number of characters that identify a unique selection. For example, the configure command can be shortened to conf because configure is the only command that begins with conf. An even shorter version, con, will not work because more than one command begins with con. Keywords can also be shortened.
The table lists keystrokes to enhance command line editing.
Device Names You have learned a great deal about the Cisco IOS, navigating the IOS, and the command structure. Now, you are ready to configure devices! The first configuration command on any device should be to give it a unique device name or hostname. By default, all devices are assigned a factory default name. For example, a Cisco IOS switch is "Switch."
The problem is if all switches in a network were left with their default names, it would be difficult to identify a specific device. For instance, how would you know that you are connected to the right device when accessing it remotely using SSH? The hostname provides confirmation that you are connected to the correct device.
The default name should be changed to something more descriptive. By choosing names wisely, it is easier to remember, document, and identify network devices. Here are some important naming guidelines for hosts:
Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length An organization must choose a naming convention that makes it easy and intuitive to identify a specific device. The hostnames used in the device IOS preserve capitalization and lowercase characters. For example, the figure shows that three switches, spanning three different floors, are interconnected together in a network. The naming convention that was used incorporated the location and the purpose of each device. Network documentation should explain how these names were chosen so additional devices can be named accordingly.
The diagram shows three interconnected switches spanning three floors. The top switch is named Sw-Floor-3, the middle switch is named Sw-Floor-2, and the bottom switch is name Sw-Floor-1. A user sitting at a host PC is connected to the Sw-Floor-1 switch. Text at bottom reads: when network devices are named, they are easy to identify for configuration purposes.
Password Guidelines The use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.
Cisco IOS can be configured to use hierarchical mode passwords to allow different access privileges to a network device.
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.
When choosing passwords, use strong passwords that are not easily guessed. There are some key points to consider when choosing passwords:
Use passwords that are more than eight characters in length. Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences. Avoid using the same password for all devices. Do not use common words because they are easily guessed. Use an internet search to find a password generator. Many will allow you to set the length, character set, and other parameters.
Introduction to Networks v7.02 Basic Switch and End Device Configuration … Basic Device Configuration
2.4.1 Device Names You have learned a great deal about the Cisco IOS, navigating the IOS, and the command structure. Now, you are ready to configure devices! The first configuration command on any device should be to give it a unique device name or hostname. By default, all devices are assigned a factory default name. For example, a Cisco IOS switch is "Switch."
The problem is if all switches in a network were left with their default names, it would be difficult to identify a specific device. For instance, how would you know that you are connected to the right device when accessing it remotely using SSH? The hostname provides confirmation that you are connected to the correct device.
The default name should be changed to something more descriptive. By choosing names wisely, it is easier to remember, document, and identify network devices. Here are some important naming guidelines for hosts:
Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length An organization must choose a naming convention that makes it easy and intuitive to identify a specific device. The hostnames used in the device IOS preserve capitalization and lowercase characters. For example, the figure shows that three switches, spanning three different floors, are interconnected together in a network. The naming convention that was used incorporated the location and the purpose of each device. Network documentation should explain how these names were chosen so additional devices can be named accordingly.
The diagram shows three interconnected switches spanning three floors. The top switch is named Sw-Floor-3, the middle switch is named Sw-Floor-2, and the bottom switch is name Sw-Floor-1. A user sitting at a host PC is connected to the Sw-Floor-1 switch. Text at bottom reads: when network devices are named, they are easy to identify for configuration purposes.
Sw-Floor-3Sw-Floor-2Sw-Floor-1 When network devices are named, they are easy to identify for configuration purposes.
When the naming convention has been identified, the next step is to use the CLI to apply the names to the devices. As shown in the example, from the privileged EXEC mode, access the global configuration mode by entering the configure terminal command. Notice the change in the command prompt.
Switch# configure terminal Switch(config)# hostname Sw-Floor-1 Sw-Floor-1(config)# From global configuration mode, enter the command hostname followed by the name of the switch and press Enter. Notice the change in the command prompt name.
Note: To return the switch to the default prompt, use the no hostname global config command.
Always make sure the documentation is updated each time a device is added or modified. Identify devices in the documentation by their location, purpose, and address.
2.4.2 Password Guidelines The use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.
Cisco IOS can be configured to use hierarchical mode passwords to allow different access privileges to a network device.
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.
When choosing passwords, use strong passwords that are not easily guessed. There are some key points to consider when choosing passwords:
Use passwords that are more than eight characters in length. Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences. Avoid using the same password for all devices. Do not use common words because they are easily guessed. Use an internet search to find a password generator. Many will allow you to set the length, character set, and other parameters.
Note: Most of the labs in this course use simple passwords such as cisco or class. These passwords are considered weak and easily guessable and should be avoided in production environments. We only use these passwords for convenience in a classroom setting, or to illustrate configuration examples.
2.4.3 Configure Passwords When you initially connect to a device, you are in user EXEC mode. This mode is secured using the console.
To secure user EXEC mode access, enter line console configuration mode using the line console 0 global configuration command, as shown in the example. The zero is used to represent the first (and in most cases the only) console interface. Next, specify the user EXEC mode password using the password password command. Finally, enable user EXEC access using the login command.
Sw-Floor-1# configure terminal Sw-Floor-1(config)# line console 0 Sw-Floor-1(config-line)# password cisco Sw-Floor-1(config-line)# login Sw-Floor-1(config-line)# end Sw-Floor-1# Console access will now require a password before allowing access to the user EXEC mode.
To have administrator access to all IOS commands including configuring a device, you must gain privileged EXEC mode access. It is the most important access method because it provides complete access to the device.
To secure privileged EXEC access, use the enable secret password global config command, as shown in the example.
Sw-Floor-1# configure terminal Sw-Floor-1(config)# enable secret class Sw-Floor-1(config)# exit Sw-Floor-1# Virtual terminal (VTY) lines enable remote access using Telnet or SSH to the device. Many Cisco switches support up to 16 VTY lines that are numbered 0 to 15.
To secure VTY lines, enter line VTY mode using the line vty 0 15 global config command. Next, specify the VTY password using the password password command. Lastly, enable VTY access using the login command.
An example of securing the VTY lines on a switch is shown.
Sw-Floor-1# configure terminal Sw-Floor-1(config)# line vty 0 15 Sw-Floor-1(config-line)# password cisco Sw-Floor-1(config-line)# login Sw-Floor-1(config-line)# end Sw-Floor-1#
2.4.4 Encrypt Passwords The startup-config and running-config files display most passwords in plaintext. This is a security threat because anyone can discover the passwords if they have access to these files.
To encrypt all plaintext passwords, use the service password-encryption global config command as shown in the example.
Sw-Floor-1# configure terminal Sw-Floor-1(config)# service password-encryption Sw-Floor-1(config)# The command applies weak encryption to all unencrypted passwords. This encryption applies only to passwords in the configuration file, not to passwords as they are sent over the network. The purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file.
Use the show running-config command to verify that passwords are now encrypted.
Sw-Floor-1(config)# end Sw-Floor-1# show running-config ! (Output omitted) ! line con 0 password 7 094F471A1A0A login ! line vty 0 4 password 7 094F471A1A0A login line vty 5 15 password 7 094F471A1A0A login ! ! end
Save Configurations
2.5.1 Configuration Files You now know how to perform basic configuration on a switch, including passwords and banner messages. This topic will show you how to save your configurations.
There are two system files that store the device configuration:
startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off. running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted. The show running-config privileged EXEC mode command is used to view the running config. As shown in the example, the command will list the complete configuration currently stored in RAM.
Sw-Floor-1# show running-config Building configuration... Current configuration : 1351 bytes ! ! Last configuration change at 00:01:20 UTC Mon Mar 1 1993 ! version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname Sw-Floor-1 ! (output omitted) To view the startup configuration file, use the show startup-config privileged EXEC command.
If power to the device is lost, or if the device is restarted, all configuration changes will be lost unless they have been saved. To save changes made to the running configuration to the startup configuration file, use the copy running-config startup-config privileged EXEC mode command.
2.5.2 Alter the Running Configuration If changes made to the running config do not have the desired effect and the running-config has not yet been saved, you can restore the device to its previous configuration. Remove the changed commands individually, or reload the device using the reload privileged EXEC mode command to restore the startup-config.
The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.
When a reload is initiated, the IOS will detect that the running config has changes that were not saved to the startup configuration. A prompt will appear to ask whether to save the changes. To discard the changes, enter n or no.
Alternatively, if undesired changes were saved to the startup config, it may be necessary to clear all the configurations. This requires erasing the startup config and restarting the device. The startup config is removed by using the erase startup-config privileged EXEC mode command. After the command is issued, the switch will prompt you for confirmation. Press Enter to accept.
After removing the startup config from NVRAM, reload the device to remove the current running config file from RAM. On reload, a switch will load the default startup config that originally shipped with the device.
submitted by SieteSeven77_ to u/SieteSeven77_ [link] [comments]


2024.04.28 19:01 SieteSeven77_ ITN T1

What term describes a type of network used by people who work from home or from a small remote office?
What type of network traffic requires QoS?
What two criteria are used to help select a network medium from various network media? (Choose two.) the distance the selected medium can successfully carry a signal the environment where the selected medium is to be installed
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? an intranet
Which PDU format is used when bits are received from the network medium by the NIC of a host? frame
What is a characteristic of multicast messages?
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? flow control
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond? response timeout
At which layer of the OSI model would a logical address be added during encapsulation? L3
What process involves placing one PDU inside of another PDU? encapsulation
Which name is assigned to the transport layer PDU? segment
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
FTP DHCP DNS What layer is responsible for routing messages through an internetwork in the TCP/IP model?
network access
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? Segments are sent from the transport layer to the internet layer.
At which OSI layer is a destination MAC address added to a PDU during the encapsulation process? data link layer An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)
Explanation: The configuration mode that the administrator first encounters is user EXEC mode. After the enable command is entered, the next mode is privileged EXEC mode. From there, the configure terminal command is entered to move to global configuration mode. Finally, the administrator enters the line console 0 command to enter the mode in which the configuration will be entered.
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords.
Explanation: Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.
What are three characteristics of an SVI? (Choose three.)
It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default. Switches have one or more switch virtual interfaces (SVIs). SVIs are created in software since there is no physical hardware associated with them. Virtual interfaces provide a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration “out-of-the-box.” The default SVI interface is VLAN1.
After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? The new configuration will be loaded if the switch is restarted. With the copy running-config startup-config command, the content of the current operating configuration replaces the startup configuration file stored in NVRAM. The configuration file saved in NVRAM will be loaded when the device is restarted. What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address? show ip interface brief
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
(config)# service password-encryption What function does pressing the Tab key have when entering a command in IOS?
It completes the remainder of a partially typed word in a command. Match the description with the associated IOS mode. (Not all options are used.)
In the show running-config command, which part of the syntax is represented by running-config ?
Explanation: The first part of the syntax, show, is the command, and the second part of the syntax, running-config, is the keyword. The keyword specifies what should be displayed as the output of the show command.
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown
What is the technician configuring? SVI
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.) RM-3-Switch-2A4 SwBranch799
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? Explanation: The startup-config and running-config files display most passwords in plaintext. Use the service password-encryption global config command to encrypt all plaintext passwords in these files.
Which interface allows remote management of a Layer 2 switch? the switch virtual interface
Which device performs the function of determining the path that messages should take through internetworks? a router
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? The administrator must first enter privileged EXEC mode before issuing the command. Why would a Layer 2 switch need an IP address? to enable the switch to be managed remotely
submitted by SieteSeven77_ to u/SieteSeven77_ [link] [comments]


2024.04.28 18:27 ForwardProfession586 BenQ PD2725U display pilot ICC sync not working

I have a new BenQ PD2725U and when I use display pilot the ICC sync is not working. Everything stays the same except I can manually change profiles in the app.
I have my MacBook calibrated with Calibrite Profiler and the preset set to Photography (P3-D65) L100 as it should be with the brightness etc locked in as per screenshot
However when I connect the BenQ and tick the ICC sync it does nothing at all. All I can do is manually choose say P3 or sRGB?
Any idea what I am doing wrong?
submitted by ForwardProfession586 to BenQ [link] [comments]


2024.04.28 18:14 Special_Strategy_627 Oop-

Oop- submitted by Special_Strategy_627 to escapethenight [link] [comments]


2024.04.28 18:10 Kuraiko55 RAID issue with IOMEGA ix4-300d

Hello dear people. I sincerely hope you can assist me with this issue of mine.
 
I am the proud owner of a second hand IOMEGA ix4-300d. Currently, it runs with three 3 TB and 1 4 TB drives. The reason for this is, that I once had to replace one of the original 3 TB drives as it broke. I'm not quite sure any more why I chose to replace it with a 4 TB, but most likely it had a similar price tag to a 3 TB or not much more. In retrospective, it was very stupid, as you'll learn in a moment. Anyway, replacing it like that worked just fine back then. The NAS reconstructed its RAID 5 and everything was good for several years.
 
About two weeks ago, I noticed that some features did not work at all as I tried to access the shares from my new Smart TV. After some hither and thither, I decided to back up my data and factory reset the NAS. That's where the fun began.
 
My issue is, that I cannot create a RAID any more on this NAS via the web interface. In the “Drive Management” section, it's telling me: “Storage could not be initialized. Make sure all drives are the same size.”
That's odd, I thought, because it was working fine with the differently sized drives as I described above, but now it suddenly seems picky. Alright, my next thought was, let's get on a journey.
 
I have been attempting to create a RAID 5 via SSH on this NAS for the past two weeks, now. I have manually created equally sized partitions on each drive and successfully created a RAID 5 and formatted it, too. I made sure it was mounted as well, of course. However, when I reboot the NAS afterwards, it always states: “Your device is in an inconsistent state because the original drives were replaced. You can either put the original drives back or perform a factory reset to erase all existing data and use the new drives. To perform a factory reset you must first clear the administrator password by pressing the reset button on the back of the device.”
 
Here are the commands I used for this, with some commentary:
parted /dev/sda mkpart primary 20.5GB 3001GB //repeat for the remaining three drives sdb, sdc and sdd mdadm --create /dev/md1 --level=5 --raid-devices=4 /dev/sda2 /dev/sdb2 /dev/sdc2 /dev/sdd2 //I chose md1 here because the NAS boot and system are on md0 mkfs.ext4 /dev/sda2 //repeat for sdb2, sdc2, sdd2 nano /etc/fstab //to open this file and add the mount points //added the following line for each partition to this file and saved it /dev/sda2 /mnt/data ext4 defaults 0 2
 
I have also attempted to resize the first partition of each drive with the aim of creating the RAID on the first partition. That seems impossible, though, as I'd have to dismount /mnt/system first, which it wouldn't let me do while the NAS is running for obvious reasons.
 
Is there anything at all that I can do to make this work with the drive setup I currently have?
Thank you for reading all this, by the way :)
submitted by Kuraiko55 to HomeNAS [link] [comments]


2024.04.28 18:01 XilenceBF Guide: Transferring profiles to Extra Members

Hey everyone!
After a lot of trial and error and frustrated talks with the customer service in an attempt to add 2 existing accounts as extra members I finally figured out how to do this without having to pay for new subscriptions. I’ll break it doen below.
The issue most people face is that if you want to add an extra member you dont actually get the option to transfer a profile if the new slow has already been purchased. If you then create a new account for the extra member this account is limited to only 1 profile which will be the default profile. The challenge was to create a new account with a transferred profile as the default. This is how I did it:
  1. Change the email of the to-be-added account to a different email.
  2. From this to-be-added account under the new email transfer the profile to a new account under the original email. This asks you to create a new account with password.
  3. Once you did this the next thing Netflix asks is to finish transferring the profile. Choose Finish Later. Confirm you dont want to transfer the profile. Your account is now created in a state where the first thing it wants to do is finish transferring your profile
  4. Go to the main account holder with the ability to invite extra members. Invite the new account with the original email.
  5. Accept the invite (on a different device/browser or log out of the main account)
  6. If everything worked you will be presented with a prompt to choose a name for your profile. This name should match the transferred profile.
  7. Finish setup!
I just did this with 2 account and in both cases it worked flawlessly. It’s a shame Netflix makes this so difficult. There are definitely ways to make this easier.
I hope this helps anyone!
submitted by XilenceBF to netflix [link] [comments]


2024.04.28 16:06 ThrowRA-bad1011 Trying to use ASUS AX6000 with a PPPOA ISP, any ideas to make it work?

Hey all,
Got myself an AX6000 from a friend moving and the standard TalkTalk router is just useless, I've set up 3rd party before but when checking the ISPs details it says PPPOA with no password, now the router doesn't have that option and the default router has nearly no options in it.
Any ideas for a workaround? Not an expert on networking by any means and need some help!
submitted by ThrowRA-bad1011 to HomeNetworking [link] [comments]


http://activeproperty.pl/