Displaying 3 results from an estimated 3 matches for "teractive".
Did you mean:
iteractive
2008 Jul 28
4
RHEL 5.2 i386 image - Xen kernel doesn''t recognize the total amount of system memory
Hello,
We have installed RHEL 5.2 Server ( i386 image ) on a machine with 64GB of
RAM.
When booting the default PAE kernel ( 2.6.18-92.el5PAE ) that is shipped
with RHEL 5.2 installation the OS detects 64GB of RAM.
But when booting the Xen kernel ( 2.6.18-92.el5xen ) the OS detects only
14GB of the total amount of available RAM.
Did anyone encounter this problem before ?
Is it a normal
2002 Aug 09
0
[Bug 383] New: PublicKeyAuthentication failure when rlogin set to false
...ey
debug1: attempt 2 failures 2
debug2: input_userauth_request: try method publickey
debug2: userauth_pubkey: disabled because of invalid user
Failed publickey for illegal user root from xxx.xxx.xxx.xxx port 45624 ssh2
debug1: userauth-request for user root service ssh-connection method keyboard-in
teractive
debug1: attempt 3 failures 3
debug2: input_userauth_request: try method keyboard-interactive
debug1: keyboard-interactive devs
debug1: auth2_challenge: user=root devs=
debug1: kbdint_alloc: devices ''
debug2: auth2_challenge_start: devices
Failed keyboard-interactive for illegal user root f...
2007 Oct 20
0
No subject
...or Internet.=
This has both business and personal applications. In terms of business, =
it can be used for presentations, reviewing designs, etc. In terms of pers=
onal use, it would open a new area to social networking, desktop surfing. =
End users could store images, videos and a range of interactive items that =
members of the public can view or download. I realise that this can prove =
to be a bandwidth hog, but like everything in computer world, this will onl=
y improve with time and become less of an issue.=20
The next generation of MSN Hotmail has arrived - Windows Live Hotmail______=
__...