Author Archives: George Valentin Voina

EdgeRouter POE: Power 48V POE switches

By | May 25, 2016

I got my EdgeRouter POE from UbiQuiti EdgeRouter, 5-port Router POE and came with the 24VAC power supply. Because the Ubiquity devices are all using the strange low power POE for which 24VAC is enough they ship the EdgeRouter POE with the 24VAC power supply. As a result the device is useless in powering “normal”… Read More »

CVS: Add a missing tag by date for a CVS project release

By | February 8, 2017

Sometimes you discover that you forgot to tag on CVS a test release that made it on the production system. The issue starts when you discovered that in the mean time you or someone else already added new functionality on the development branch. In the following I will create a tag only based on the… Read More »

Owncloud 8.1.5: File upload error Table ‘homeclouddb.oc_locks’ doesn’t exist”

By | February 9, 2017

After an OwnCloud upgrade I was getting complains from my users that WebDav and OwnCloud windows client were no longer able to upload files. By looking into owncloud.log the following was the repeated error: {“app”:”remote”,”message”:”An exception occurred while executing ‘SELECT * FROM `oc_locks` WHERE `userid` = ? AND (`created` + `timeout`) > 1456517102 AND ((… Read More »

Internet: Subresource Integrity (SRI)

By | February 9, 2017

Yes our friends from China invented a new type of DDOS attack. The great firewall changed unencrypted traffic that contained 3rd party javascript libraries to DDOS GitHub. There is already a testing tool SRI Test developed and deployed by Gabor Szathmari see for more details his blog To protect my blog I found out that… Read More »

Java: Inspect Websphere Application Server Logs with Ostros Log Viewer

By | February 8, 2017

Working with Enterprise applications deployed on Websphere Application Server ND and having to determine some issues from the logs sometimes can be a handful. The sheer amount of information that is spilled by the container in the logs is overwhelming. Usually I end up having to find the needle in the haystack looking into 5… Read More »

Fedora Linux: Remove graphical mode boot and auto X start

By | February 18, 2016

On my servers I want to completely get read of graphical boot. I do not like fancy graphics that are not compatible with my basic Matrox integrated card and I do not want my system to start directly in X and load the server with unwanted stuff. STEP 1: Remove graphical boot Completely un-install the… Read More »

Fedora Linux: Boot a system from grub prompt

By | February 19, 2016

I had a situation when from a strange reason a default grub setup as a result of a system recovery was missing the lvm and raid modules so I was not able to boot. I have the following setup on the server: – my boot partition is in fact an ext4 partition over a mdraid… Read More »

Fedora Linux: Recover a corrupted system with a RAID1 boot partition with a lvm RAID1 root partition

By | February 19, 2016

There are times when even experimented sysadmins do stupid things. One of that moments happened to me when I tried some speed tests on my ssd RAID1. The result was not so satisfactory. Corrupted /boot partition with missing files and orphan inodes. To make things more complicated I have the following constraints that make this… Read More »

DB2 SQL Error: SQLCODE=-302, SQLSTATE=22001, SQLERRMC=null

By | February 21, 2019

This error is the DB2 cryptic way of informing you that a value which an insert query tries to insert in a table is too large. Usually when using java + hibernate we can define a member of an EJB as: @Column(length = 10) protected String receiver; If somehow when the object is created we… Read More »

A+ Security for WordPress Blog – HTTP Strict Transport Security

By | February 9, 2017

Keeping the installation of your own WordPress blog highly secure is very important. In today’s fast pace discovery of security vulnerabilities you must keep an eye on all the new security threats and update as soon as possible the security to try to cover the new threat. An invaluable tool is the security test from… Read More »