If you want to buy a new iPhone second hand, make sure you check it before paying up as you can do nothing with it if it's locked to another apple id.
Up until now there was no page to check if the device is locked or not. Apple has released the "Activation Lock Status" tool which is accesible via iCloud.com which alows users to enter a Device IMEI or Serial Number to check it's activation lock status.
Security researchers from Red Hat have uncovered a new exploit in the common "Bash" command shell found in OS X, Linux, AIX and many other *nix platforms which can be used to deploy malicious code with minimal effort. Due to the ubiquity of the Bash shell, the exploit can also affect a wide variety of different web-connected devices and properties, including unsecured websites, smart home appliances, servers, and more.
As mentioned above, this vulnerability is not limited to only one platform but in the same time in doesn't affect the average consumer because even if they have "bash" in their computers, they do not use it in a way that it can be vulnerable. Unless you are using your computer as a server that accepts commands from untrusted sources (like web servers for example) (and then only if it sets environment variables based on commands from untrusted sources) you do not have to worry about.
I am sure this is well known by the ones working daily with this technology but it's still important to have it around. Of course, those who are not aware have better use for what is written in this article.
A network is a set of devices connected by physical or virtual media links.
A network is a connection of two or more nodes via a physical or virtual link but also two or more networks connected by one or more nodes.
What is a Link?
Link is the virtual or physical medium used to connect two or more computers.
What is a node?
Taking as example the response from the question above, the computers are called Nodes.
In this tutorial I will show you how to repair a sparsebundle image. It's not difficult but it can take some time, depending of the size of your image.
Also, please do note that some images are so damaged that they cannot be repaired so do not throw stones at me if you cannot fix yours.
What I am showing you below is not hard at all but it needs extra attention and the steps must be followed accordingly.
First of all you must have the information regarding the assigned LUNS, either created by you or by the storage admin.
Once you have them, open 3 sessions: one to each VIO and another to the target partition. They will be referred below as gzv1, gzv2 and gzaix.
Let's assume you have your systems farm. From one of them you are able to connect to all others with ssh keys already configured.
Now, you create a list with all these systems in it. If you want to temporary skip one system, just put # in front of it, like in our example (server2 disabled).
The ssh options are there to assure you that even if you have ssh configuration problems or one server is down, you won't get stuck on that and everything will go smooth to the end.