"Bad SMTP Prompt at host"
I get this message when I send an e-mail through our new ASA. This does not happen with everyone that I send to, just a few.
If I go to the mail server, I see the messages in the queue and as soon as I put in our old firewall, clears the queue and messages are sent.
Any ideas?
Thank you!
Bob
Bob
You may need to disable on your ASA ESMTP inspection,
Have a look here:
Hope this helps and please rate messages!
Jay
Tags: Cisco Security
Similar Questions
-
When I try to send an e-mail with AOL, I get this error: "bad SMTP to the host.
I get this message every time I try to send an e-mail to a recipient who has AOL.
I know what SMTP, but this what/who is the host? Is my server or the server of the recipient?
How can I solve this problem?
original title: bad SMTP to the host
Hi John Benzon.
You must contact the Support of AOL for assistance on this issue.
Contact AOL Customer Service
http://help.AOL.com/help/microsites/search.do?cmd=displayKC&externalID=217480
AOL Mail
http://help.AOL.com/help/product/aol_webmail/
I hope this helps.
-
Hola y buenos dias
me esta dando este error cuando a UN con cluster 2 hots the digo el HA assets. There buscado por internet y the mayoria of las hacen referencia a lo mismo responses:
The config of VMware high availability (HA) falla con el error: unable to complete the configuration of the HA agent on the host
- Select turn on VMware HA, luego elija VMware HA desde el cuadro of the izquierda.
- Select Advanced options.
- Adicione opcion das.bypassNetCompatCheck con el valor 'true '.
- Haga click OK in the options advanced, luego haga click en OK again pantalla para aceptar los cambios in el cluster config.
- Hope a todos los servidores ESX in el reconfiguren HA cluster.
-
When I try to reply to messages on some Internet sites via outlook, I get, no socket error 11001 protocol smtp port 25 google host cannot be found. also when attempt to send from outlook, I get, google found 3 error socket port 110 Protocol pop 0X800CCC0D.i am not very good at such things but can follow directions if they are not complicated to. A few years ago someone set up my computer and I remember their delete something with outlook, because I was going to use google to e mail.but I'm not sure. This problem became a big drawback.
original title:, not socket error11001 protocol smtp port 25 host not found google, google can't find ox8oocccodHello
see this link:
http://www.FixYa.com/support/t2859101-cannot_get_or_send_mail_error
-
ORA-29279: SMTP permanent error: 503 bad sequence of commands
Hi gurus
Please help solve this problem, everything was going well, but these last two days I ' m receive this error message during the execution of this
exec send_email (' [email protected]', ' jhon.gmail.com ', NULL, NULL,' First msg ', 'First msg', 'First msg');
send_email code is like
CREATE OR REPLACE PROCEDURE IMAGE.send_email)
p_to IN VARCHAR2,
P_FROM IN VARCHAR2,
p_cc IN VARCHAR2,
p_bcc IN VARCHAR2,
p_subject IN VARCHAR2,
p_text IN LONG DEFAULT NULL,
p_html IN LONG DEFAULT NULL)
IS
p_smtp_hostname VARCHAR2 (225): = "smtp.abc.com";
p_smtp_portnum VARCHAR2 (5): = '25';
p_username VARCHAR2 (30): = ' [email protected] ';
p_password VARCHAR2 (20): = "B34adf";
l_boundary VARCHAR2 (255) DEFAULT 'a1b2c3d4e3f2g1 ';
l_connection UTL_SMTP.connection;
l_body_html CLOB: = EMPTY_CLOB; -Ce LOB will be the electronic mail message
l_offset NUMBER;
l_ammount NUMBER;
l_temp LONG DEFAULT NULL;
LONG l_to_recipients;
BEGIN
l_connection: = UTL_SMTP.open_connection (p_smtp_hostname, p_smtp_portnum);
UTL_SMTP. HELO (l_connection, p_smtp_hostname);
-AUTHENTICATION OF BEGIN-
UTL_SMTP.command (l_connection, "AUTH LOGIN");
UTL_SMTP.command (l_connection,
DEMO_BASE64. ENCODE (UTL_RAW.cast_to_raw (p_username)));
UTL_SMTP.command (l_connection,
DEMO_BASE64. ENCODE (UTL_RAW.cast_to_raw (p_password)));
-END AUTHENTICATION-
UTL_SMTP.mail (l_connection, ' < ' | p_from |) ') ;
-starts to multiple recipients
FOR x IN (SELECT REGEXP_SUBSTR (p_to, "[^,] +', 1, LEVEL") address OF DOUBLE CONNECTION BY REGEXP_SUBSTR (p_to,"[^,] +', 1, LEVEL) IS NOT NULL)
LOOP
UTL_SMTP. RCPT (l_connection, ' < ' | x.address |) ') ;
IF (l_to_recipients IS NULL)
THEN
l_to_recipients: = ' from: '. x.Address;
ON THE OTHER
l_to_recipients: = l_to_recipients | ', ' || x.Address;
END IF;
END LOOP;
-multiple at the ends of the recipients
IF p_cc IS NOT NULL
THEN
UTL_SMTP. RCPT (l_connection, ' < ' | p_cc |) ') ;
END IF;
IF p_bcc IS NOT NULL
THEN
UTL_SMTP. RCPT (l_connection, ' < ' | p_bcc |) ') ;
END IF;
l_temp: = l_temp | "MIME-Version: 1.0 ' |" CHR (13) | CHR (10);
l_temp: = l_temp | l_to_recipients | CHR (13) | CHR (10);
l_temp: = l_temp | "CC:". p_cc | CHR (13) | CHR (10);
l_temp: = l_temp | "Bcc:" | " p_bcc | CHR (13) | CHR (10);
l_temp: = l_temp | ' De : ' || P_FROM | CHR (13) | CHR (10);
l_temp: = l_temp | "Subject: ' |" p_subject | CHR (13) | CHR (10);
l_temp: = l_temp | ' Reply-To: '. P_FROM | CHR (13) | CHR (10);
l_temp: = l_temp | ' Content-Type: multipart/alternative; Boundary = "|" CHR (34) | l_boundary | CHR (34) | CHR (13) | CHR (10);
----------------------------------------------------
-Write headers
DBMS_LOB.CREATETEMPORARY (l_body_html, FALSE, 10);
DBMS_LOB. Write (l_body_html, LENGTH (l_temp), 1, l_temp);
----------------------------------------------------
-Write the text limit
l_offset: = DBMS_LOB.getlength (l_body_html) + 1;
l_temp: = '-'. l_boundary | CHR (13) | CHR (10);
l_temp: = l_temp | ' content-type: text/plain; charset = us-ascii' | CHR (13) | CHR (10) | CHR (13) | CHR (10);
DBMS_LOB. Write (l_body_html, (l_temp) LENGTH, l_offset, l_temp);
----------------------------------------------------
-Write the text of the email part
l_offset: = DBMS_LOB.getlength (l_body_html) + 1;
DBMS_LOB. Write (l_body_html, (p_text) LENGTH, l_offset, p_text);
----------------------------------------------------
-Write the limit HTML
l_temp: = CHR (13) | CHR (10) | CHR (13) | CHR (10) | '--' || l_boundary | CHR (13) | CHR (10);
l_temp: = l_temp | ' content-type: text/html; " || CHR (13) | CHR (10) | CHR (13) | CHR (10);
l_offset: = DBMS_LOB.getlength (l_body_html) + 1;
DBMS_LOB. Write (l_body_html, (l_temp) LENGTH, l_offset, l_temp);
----------------------------------------------------
-Write the HTML part of the message
l_offset: = DBMS_LOB.getlength (l_body_html) + 1;
DBMS_LOB. Write (l_body_html, (p_html) LENGTH, l_offset, p_html);
----------------------------------------------------
-Write the final limit html
l_temp: = CHR (13) | CHR (10) | '--' || l_boundary | '--' || CHR (13).
l_offset: = DBMS_LOB.getlength (l_body_html) + 1;
DBMS_LOB. Write (l_body_html, (l_temp) LENGTH, l_offset, l_temp);
----------------------------------------------------
-Send email in chunks of 1 900 bytes to UTL_SMTP
l_offset: = 1;
l_ammount: = 1900;
UTL_SMTP.open_data (l_connection);
While l_offset < DBMS_LOB.getlength (l_body_html)
LOOP
() UTL_SMTP.write_data
l_connection,
DBMS_LOB. SUBSTR (l_body_html, l_ammount, l_offset));
l_offset: = l_offset + l_ammount;
l_ammount: = the LEAST (1900, DBMS_LOB.getlength (l_body_html) - l_ammount);
END LOOP;
UTL_SMTP.close_data (l_connection);
UTL_SMTP. Quit (l_connection);
DBMS_LOB.freeTemporary (l_body_html);
END;
The likely cause is that your code of beneficiaries is not running (due to controls to null). Which means an incomplete sequence of orders.
In addition, it is false.
UTL_SMTP. HELO (l_connection, p_smtp_hostname);
Code sample Oracle in the manual is WRONG! It's really stupid to send the name of the SMTP server in the SMTP server's host/IP - as if we don't know who he is.
RFC 5321 is very very clear on this:
4.1.1.1 extended HELLO (EHLO) or HELLO (HELO)
These commands are used to identify the SMTP client to the SMTP Protocol
Server. The argument clause contains the complete domain name
of the SMTP client if one is available. In situations where the
SMTP client system doesn't have a significant domain name (for example, when)
its address is dynamically allocated and no reverse mapping record is
available), the client SHOULD send an address literal (see
Section 4.1.3).
You need to identify the SMTP client. Not to tell the server you are the mail server!
-
Corrected the host file corrupted, now showing 2 host files in XP
I have a corrupt host file and 2 host files have now for some reason any. What to do to fix this?
After explaining all this several times, here are some notes:
The hosts file is a read-only file, hidden system. It is just a text file that you can manipulate with WordPad, Notepad or any text editor. Before you modify the hosts file, make a copy of the current in case you need to restore the original.
The hosts file is (or should be) a file read-only, which means that if change you it, you will not be able to save the changes until you remove the read only attribute of the file.
You may be able to create a new one or reset your hosts with Microsoft Help file:
http://support.Microsoft.com/kb/972034 (this does work as expected the last time I tried).
If you use the Fix It from Microsoft, you will have no hosts file when you're done (which is not necessarily a bad thing) so you can just read and follow the instructions to find out how to fix it yourself.
Some third-party software analysis tools (like Spybot) may add entries to the hosts file on purpose to block your browser from loading WWW websites completely or block ads from certain sites WWW. They claim to have a list of sites that most of the people want to block and insert them into your file hosts for you. You can always delete the entries in the hosts file manually if you wish.
Another good option to block ads sites is to use Firefox with the Adblock Plus extension (it is updated regularly with new sites). If you use that combination, you don't have to worry about your hosts file and these two together really do a good job.
Malware can also add entries in the host file to redirect the browser to another site than the one you really want to visit WWW.
For example, if you try to browse to www.google.com, you can find yourself on a WWW site that is inappropriate or simply an advertisement for a product you never heard and do not want. Your browser will always be redirected away from www.google.com until correct you the hosts file.
The malware can also modify your hosts file to block your browser to go to Web sites where you might find a solution for how to remove the malicious software. The malware sometimes knows what you're going to try to find and remove, so it will prevent you to do so.
If your hosts file has been manipulated by malware, edit the hosts file does not remove the malware. You will still need to scan your system with software tools to make sure that the malware has entirely disappeared.
Malware analysis tools can also remove the malicious software and leave the bad entries in the hosts file. Analytical tools cannot tell if the entries in the file hosts were made on purpose or by malware you still may need to edit the file hosts manually in case of redirection of the browser once the malware has been removed.
Some analytical tools will report changes to the hosts as a suspect file and allow you to review the changes and allow you to decide whether the changes are appropriate, and to take action.
Sometimes, analytical tools cannot tell if the entries in the hosts file have been put there by malicious software or you put there on purpose so cannot do not report any problems with the hosts file. This does not mean that the hosts file has not been adjusted by malicious software.
A hosts file is not required for your browser to operate. If you suspect a problem with the hosts file, you can rename the hosts file and test your browsing without it.
Always reboot your system and the navigation test after making changes to the hosts file.
To manipulate the hosts file, you need to make hidden files not hidden and remove the attribute only read the hosts file.
In Explorer, navigate to the following folder (assuming that Windows is installed on your C drive):
c:\Windows\system32\drivers\etc
Click on tools. Of files, display options. In advanced settings, enable (check) the box option for:
Display the hidden files and folders
Click OK.
The hosts file has also no extension (for example, .exe or .doc) and it may be useful to also see the file extensions for all files in
the folder. While you adjust the display of folder options, bring up the file extensions.Click on tools, Options, view. In advanced settings, clear (uncheck) the box:
Hide extensions of known file types
Click OK.
Now the hosts file must be visible and you can also see the file extensions.
Make a copy of the current hosts file and name the copy something he can remember so that you can find it later and cancel
any change if the changes don't work or things get worse.The host file is usually a single reading, so to change it, you must remove the read-only attribute:
Make a right-click the hosts file, properties, uncheck the box that says:
Read-only
Click OK.
Now you can edit the hosts file with a text editor (Notepad, Wordpad). Be sure to save the hosts file after any changes.
You will need to decide what is in your hosts file. The default hosts file has only one entry (and a lot of comments) so if you think that the hosts file are the part of your question, you can remove all but the default entry and save the file.
Always reboot your system and the navigation test after making changes to the hosts file.
You should make hosts read-only folder again when you are finished making changes. Obviously some programs or malware do not pay attention to the attributes of a file read-only, but it is advisable for the host file to be unalterable.
If you want to, reverse explore changes to hide system files and extensions of known file types.
If you think your hosts file is irretrievably, replace the contents with the default values of Windows.
The default for Windows XP hosts file looks like this:
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address must
# be placed in the first column, followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
space #.
#
# In addition, comments (such as these) may be inserted on individual
# lines or following the name of the machine indicated by a symbol "#".
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host127.0.0.1 localhost
There are places on the Internet to download information to your hosts file which is based on what other people think your hosts file must block or allow for your Internet browsing. Sometimes that works very well, but you now need to know more on the manipulation of the hosts file now so that you can decide what's best for your environment.
Here's some additional reading on how to manipulate your hosts file:
http://www.MVPs.org/winhelp2002/hosts.htm
This is a user-friendly tool with a graphical interface (GUI) to help you work on your hosts file:
-
This system had a fake antivirus program. I used the restoration of the system to 01/03/11. However, Hijackthis cannot delete following text was found on a Windows XP system located in c:\WINDOWS\System32\drivers\etc\hosts
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address must
# be placed in the first column, followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
space #.
#
# In addition, comments (such as these) may be inserted on individual
# lines or following the name of the machine indicated by a symbol "#".
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host127.0.0.1 localhost
74.50.127.5 www.google.com
74.50.127.5 www.google.com.au
74.50.127.5 www.google.be
74.50.127.5 www.google.com.br
74.50.127.5 www.google.ca
74.50.127.5 www.google.ch
74.50.127.5 www.google.de
74.50.127.5 www.google.dk
74.50.127.5 www.Google.com
74.50.127.5 www.google.ie
74.50.127.5 www.google.it
74.50.127.5 www.google.co.jp
74.50.127.5 www.google.nl
74.50.127.5 www.google.no
74.50.127.5 www.google.co.nz
74.50.127.5 www.google.pl
74.50.127.5 www.google.se
74.50.127.5 www.google.co.uk
74.50.127.5 www.google.co.za
74.50.127.5 www.bing.com
74.50.127.5 search.yahoo.com
74.50.127.5 uk.search.yahoo.com
74.50.127.5 ca.search.yahoo.com
74.50.127.5 de.search.yahoo.com
74.50.127.5 fr.search.yahoo.com
74.50.127.5 au.search.yahoo.com
74.50.127.5 www.google-analytics.comAny help to eliminate this problem will be greatly appreciated.
The hosts file is a read-only file, hidden system. It is just a text file that you can manipulate with WordPad, Notepad or any text editor. Before you modify the hosts file, make a copy of the current in case you need to restore the original.
You may be able to create a new one or reset your hosts with Microsoft Help file:
http://support.Microsoft.com/kb/972034 (this does work as expected the last time I tried).
If you use the Fix It from Microsoft, you will have no hosts file when you're done (which is not necessarily a bad thing) so you can just read and follow the instructions to find out how to fix it yourself.
Some third-party software analysis tools (like Spybot) may add entries to the hosts file on purpose to block your browser from loading WWW websites completely or block ads from certain sites WWW. They claim to have a list of sites that most of the people want to block and insert them into your file hosts for you. You can always delete the entries in the hosts file manually if you wish.
Malware can also add entries in the host file to redirect the browser to another site than the one you really want to visit WWW.
For example, if you try to browse to www.google.com, you can find yourself on a WWW site that is inappropriate or simply an advertisement for a product you never heard and do not want. Your browser will always be redirected away from www.google.com until correct you the hosts file.
The malware can also modify your hosts file to block your browser to go to Web sites where you might find a solution for how to remove the malicious software. The malware sometimes knows what you're going to try to find and remove, so it will prevent you to do so.
If your hosts file has been manipulated by malware, edit the hosts file does not remove the malware. You will still need to scan your system with software tools to make sure that the malware has entirely disappeared.
Malware analysis tools can also remove the malicious software and leave the bad entries in the hosts file. Analytical tools cannot tell if the entries in the file hosts were made on purpose or by malware you still may need to edit the file hosts manually in case of redirection of the browser once the malware has been removed.
Some analytical tools will report changes to the hosts as a suspect file and allow you to review the changes and allow you to decide whether the changes are appropriate, and to take action.
Sometimes, analytical tools cannot tell if the entries in the hosts file have been put there by malicious software or you put there on purpose so cannot do not report any problems with the hosts file. This does not mean that the hosts file has not been adjusted by malicious software.
A hosts file is not required for your browser to operate. If you suspect a problem with the hosts file, you can rename the hosts file and test your browsing without it.
Always reboot your system and the navigation test after making changes to the hosts file.
To manipulate the hosts file, you need to make hidden files not hidden and remove the attribute only read the hosts file.
In Explorer, navigate to the following folder (assuming that Windows is installed on your C drive):
c:\Windows\system32\drivers\etc
Click on tools. Of files, display options. In advanced settings, enable (check) the box option for:
Display the hidden files and folders
Click OK.
Hosts file has no extension, but some system files have extensions, and it may be useful to also see the file extensions for all files. While you adjust the display of folder options, bring up the file extensions.
Click on tools, Options, view. In advanced settings, check (tick) in the box:
Hide extensions of known file types
Click OK.
Now the hosts file must be visible.
Make a copy of the current hosts file and name the copy something he can remember so that you can find it later and undo the changes if the changes do not work, or worse still, things become.
The host file is usually a single reading, so to change it, you must remove the read-only attribute:
Make a right-click the hosts file, properties, uncheck the box that says:
Read-only
Click OK.
Now you can edit the file hosts with a text editor. Be sure to save the hosts file after any changes.
You will need to decide what is in your hosts file. The default hosts file has only one entry (and a lot of comments) so if you think that the hosts file are the part of your question, you can remove all but the default entry and save the file.
Always reboot your system and the navigation test after making changes to the hosts file.
You should make hosts read-only folder again when you are finished making changes. Of course some programs or malware do not pay attention to the attributes of a file read-only, but it is advisable to
the hosts of the file to be read-only.If you want to, reverse explore changes to hide system files and extensions of known file types.
If you think your hosts file is irretrievably, replace the contents with the default values of Windows.
The default for Windows XP hosts file looks like this:
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address must
# be placed in the first column, followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
space #.
#
# In addition, comments (such as these) may be inserted on individual
# lines or following the name of the machine indicated by a symbol "#".
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host127.0.0.1 localhost
There are places on the Internet to download information to your hosts file which is based on what other people think your hosts file must block or allow for your Internet browsing. Sometimes that works very well, but you must now find out more about the manipulation of the hosts file so that you can decide what's best for your environment.
Here's some additional reading on how to manipulate your hosts file:
http://www.MVPs.org/winhelp2002/hosts.htm
This is a user-friendly tool with a graphical interface (GUI) to help you work on your hosts file:
-
Hi Guyz,
Development of a menu for our IT Department.
I have two points on a list item a canvas where the user choose the command and then executes the command.
I use the below example code when the user pressed the button it opens the command prompt and run the command and I have to show the result in one: block.txt_item instead of a command prompt.
WHEN KEY PRESSED ON THE TRIGGER.
IF :BLOCK2.E_CMD='Command Prompt' THEN HOST('CMD'); ELSIF :BLOCK2.E_CMD='Tracert' THEN HOST('CMD /C Tracert' ||' '||:BLOCK2.R_CMD); ELSIF :BLOCK2.E_CMD='Ping' THEN HOST('CMD /C Ping' ||' '||:BLOCK2.R_CMD); END IF;
There are many commands I want to save the result of the command prompt in the text_item form. IM using forms 6i. Oracle 9i DB.
any help is appreciate.
Concerning
You replace the results in each loop iteration. Concat the results:
:block2.result:=:block2.result|| vcbuffer;
Add a lrtf between
:block2.res:block2.result:=:block2.result || CHR(10) || vcbuffer;
BTW. You should not create the file in the root directory, because it is often writing preserved by the operating system.
-
Comments 2012R2 server crashes host CentOS
Hi all
After you start the Server2012R2 prompt, my host crashes with a kernel panic.
Jules Destrooper coming ALL! seconds after comments started completely and did a user connect.
So it can easily be replicated.
Host: 6.5 CentOS x86_64
Comments: R2 Windows Server 2012 x86_64
VMware Workstation 10.0.1
Here is a screenshot of the kernel panic:
I found KB support with PSODs on ESXi forum discussions and I think that it might be in some way related, but workarounds it (evolution NIC to vmxnet etc.) did not help, so I don't know, it is really related.
BTW: If a VMware person reads this, I tried to open a support request, but after completing the form, I had a 'impossible to apply' after clicking on send. It was a little boring...
Thanks to and best regards
Armin
The same thing happens if you disable vmci for this virtual machine?
set
vmci0. Present = "FALSE".
in the vmxy file -
In the network on a Windows 7 host bridge
Windows 7 makes me Hazel...
Host: windows 7 Home premium, 64-bit
VM server 2.0.1 OS: Fedora 9 (Linux)
OK, I tried in vain to my server using a NAT network configuration, so I have to go with the bridge network. The network bridge works and is accessible from the HOST and other computers on the network.
My problem is that sometimes the host computer cannot be connected to the network, but still need access to the server via the web browser. If the host is not connected to the network, it cannot communicate with the server.
It is my first installation of Windows 7. On other installs with a bridge network, the ip address of the server would be in the same range (subnet) as VMnet8, but in this case, obtaining the IP address directly from the router.
Is there anything that I can take the host on the network and still have it be able to connect with the server vm via the web browser, ssh, etc...
Please remember, this is on Windows 7... I already know that this work on earlier versions of windows.
Thanx
If you need a network connection between the host and the guest so that the host has no active link, add a second card virtual NETWORK at the prompt, type "host-only' (VMnet1). Keep the default gateway to the NAT or comments on the bridge connection.
The host and guest can allways communicate via network "host-only '.
AWo
\[:o]===\[o:]
= You want to have this ad as a ringtone on your mobile phone? =
= Send 'Assignment' to 911 for only $999999,99! =
-
Port 80 connection refused on localhost
Hello
I am trying to solve a problem that I am having with the virtual hosts in Apache 2.4 on one of my two Macs, both running El Capitan. On a Mac, use virtual hosts without a hitch on another, I get connection refused.
↪ curl -I -L test.dev 15:51:08
HTTP/1.1 200 OK
Date: Tue, 08 Dec 2015 14:51:17 GMT
Server: Apache/2.4.16 (Unix)
Last-Modified: Tue, 08 Dec 2015 08:52:04 GMT
ETag: "c-5265f1673f500"
Accept-Ranges: bytes
Content-Length: 12Content-Type: text/html
vs.
↪ curl -I -L test.dev 15:51:01
curl: (7) Failed to connect to test.dev port 80: Connection refusedMy question is not on Apache or the configuration of the vhosts, / etc/hosts, etc. All that is not the issue here. The only difference between the two Macs I can find is in the Port Scan output. The right seems to have port 80 open:
Port Scanning host: 127.0.0.1
Open TCP Port: 22 ssh
Open TCP Port: 53 domain
Open TCP Port: 80 http
Open TCP Port: 88 kerberos
Open TCP Port: 445 microsoft-ds
Open TCP Port: 548 afpovertcp
Open TCP Port: 631 ippСКАНИРОВАНИЕ ПОРТОВ ЗАВЕРШЕНО...
While it is not bad:
Port Scanning host: 127.0.0.1
Open TCP Port: 88 kerberos
Open TCP Port: 445 microsoft-ds
Open TCP Port: 548 afpovertcp
Open TCP Port: 631 ipp
Сканирование портов завершено…Could someone explain why port 80 is not on this machine and how do I enable it?
All the best,
Tench
To make sure that port 80 is open for TCP on all interfaces, I added
pass in proto tcp from any to any port 80
à
/etc.pf.conf
. Reloading of pfctl(8) didn't quite do the trick, but did a reboot. Now, the port appears as open in the port scan, and my virtual hosts are served as it should. -
Problem with the Activision game
Hi Mark
Thanks a lot for your answer. Sorry, it took a lot of time to get back to you, Windows 7, you do not know ;-)Right, I tried both of your suggestions, the first I followed religously, had incorrect switch or waited for bad back prompt [!] I think so. The second went well, but nothing seemed to be the case, no patience, maybe.
In any case, I bought another 1 Tb HDD [Cheap @ Maplins, UK] and tried to the other installation costs. Guess what? Yes, it is true, he went abso-bloody-Marc soft.
No problem. Everything is installed, or almost, and it's all working well.
Thanks again Mark.
p.s. I don't think you know why everyone including Activision AND Microsoft said that Call of Duty: World at War is totally compatible and works on Windows 7 64 bit... and! do you have?All the best
BozsvfrBozsvfr,
COD: World at War is a game compatible with Windows 7 64 bit. A common problem with some games running after moving to Windows 7's hardware drivers. Make sure that your system meets the requirements of the game system and then update your hardware drivers. If make sure that hardware vendors have 64-bit drivers Windows 7 available, usually video and sound drivers cause problems with games when they are not updated.If everything is up to date so you may want to boot your pc and test. Mike - Engineer Support Microsoft Answers
Visit our Microsoft answers feedback Forum and let us know what you think. -
CSACSE-1113-K9 initial configuration for ever
Hi all
I'll put up a new CSACSE-1113-k9 (acs 4.2 device).
1st step is to perform the initial configuration by a connection serial (rs-232 port on the chassis of the device).
I already did, but whenever I try to connect to the serial port, Setup runs allover again.
Account admin, ip address, mask, etc., all that is there, but it keeps cycling through the same sequence of script, and I need to access the CLI to issue certain commands.
Tips/advice appreciated please.
Thanks in advance
JD
Hello
It's because you keep giving Yes for the test running on the initial Setup. When you are asked to test the network connectivity you enter N for which. Hope that clarifies your query.
This step is essentially running a ping command to ensure the connectivity of the ACS.
g. at the prompt, enter host name or IP address:, type the IP address or the host name of the device connected to the ACS SE and then press ENTER.
Result: If successful, the system displays the ping statistics. The system displays the command prompt: test connectivity network [Yes]:.
h. if network connectivity is confirmed in the previous two steps, at the prompt, [Yes] network connectivity Test:, type n, or N, and then press ENTER.
Tip the system continues to provide you with the opportunity to test the network connectivity until you answer No. This means that you can fix the network connections or retyping the IP address.
Concerning
Knockaert
-
Sony handycam 808E freezes mouse and keyboard
I got a sony handycam 808E. When I join a - v lead the USB to the pc it freezes my keyboard and mouse. Has it been met before and someone at - it solution.
Hello
1. have you tried to connect the device to a different USB port and check?
2. What is the brand and model of the computer?
3. do you get an error related to the question message/code?
This issue can be caused by bad/corrupted the USB host controller drivers. It is also possible that your motherboard doesn't have enough power to power to the top of all your USB devices.
I suggest you to disable and re-enable the USB controller and check if it helps.
Use Device Manager to disable and re-enable all the USB controllers. This allows controllers to recover the port USB of his condition does not respond. USB controllers represent the USB ports in Device Manager.
To disable and re-enable the USB controllers, please disconnect all USB devices and then perform the following steps:
a. Click Start, type Device Manager in the start search box and press ENTER.
b. expand Bus USB controllers.
Note: You will need to scroll down to find this point.
c. the first USB controller under Bus USB controllers right click and then click on uninstall to remove it.
d. Repeat steps above for each controller USB is listed under Bus USB controllers.
e. restart the computer. After the computer starts, Windows will automatically check for changes on the hardware and reinstall all USB controllers that you uninstalled.
f. check the USB device to see if it works.If the problem persists, I'll ask allows you to check the chipset driver updates you find on the manufacturer's website. The chipset drivers normally integrate USB controller drivers as well.
Hope this solves the problem. If the problem persists, you can write to us and we will be happy to help you further.
-
Need help setting up a mail server on a pix 501.
User access audit
Password:
Type help or '?' for a list of available commands.
See the pixfirewall config #.
: Saved
:
PIX Version 6.1 (4)
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol 2000 skinny
names of
inside_access_in list of ip 10.0.0.0 access allow 255.255.255.0 any
list of access allowed smtp tcp any host xx.xx.xx.xx eq smtp
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
Outside 1500 MTU
Within 1500 MTU
IP address outside xx.xx.xx.xx 255.255.255.248
IP address inside 10.0.0.1 255.255.255.0
IP verify reverse path to the outside interface
alarm action IP verification of information
alarm action attack IP audit
location of PDM 0.0.0.0 255.255.255.255 outside
location of PDM 0.0.0.0 255.255.255.0 outside
PDM logging 100 information
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
public static tcp (indoor, outdoor) interface smtp 10.0.0.2 netmask 255.255.255.255 www
0 0
inside_access_in access to the interface inside group
Route outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx1
Timeout xlate 0:05:00
Timeout conn 0 half-closed 01:00:10: 00 udp 0:02:00 CPP 0: h323 from 10:00 0:05:00 TR
p 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
RADIUS Protocol RADIUS AAA server
URL-cache dst 1 KB
Enable http server
http 10.0.0.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
No sysopt route dnat
Telnet 10.0.0.0 255.255.255.0 inside
Telnet timeout 5
SSH timeout 5
Terminal width 80
Cryptochecksum:3ae6d538123b8ad8ec4fc5bbd0df3ab0
> outdoor access smtp in interface list
El tema are that he made lo go y sigo don't con el mismo error y no lo tengo claro what me escapa.
OS explico mi arquitectura
Cluster development: 2 hots ESXi HA con 4.1U1 en mi red (the same as el vCenter)
Maybe you are looking for
-
Al Capitan software problem.
Downloaded Al Capitan for my MacBook Pro, it indicates that the computer will restart at the end, but the Apple logo and progress bar, however, there has been no progress on this bar indicating a restart, how can this be overcome, have now tried seve
-
I'm looking for a good malware
What malware ti can I use?
-
Is there something that I can use instead of the photos app?
Frankly I don't like the app photo, id as a possible alternative if this. Does anyone have any reccomendations? Thanks for your help. Chris...
-
Not connected. No connection is available
Product name: HP Pavilion g4-2002tx Notebook PC Operating system: Microsoft Windows 7 (64-bit) My wireless internet was woring fine until recently when the connection with my home internet modem became intermittent. There will be either a computer i
-
Problem caused by the time change this morning. Internal drive is exactly 60 minutes off (earlier) of/that the corresponding files on external drives. Problem always happens to changes in time.