Search For:
- Home
- Search For:
This article covers how to resolve the error sudo: sorry you must have a tty to run sudo which happens because the sudo command tries to execute a command that requires a tty.
To fix "sudo: sorry, you must have a tty to run sudo" error:
You have to run your ssh command as follows to avoid error that read as sudo: Sorry, you must have a tty to run sudo Error:
ssh -t hostname sudo command
ssh -t user@hostname sudo command
ssh -t user@box.example.com sudo command1 /path/to/file
The -t option force pseudo-tty allocation. This can be used to execute arbitrary screen-based programs on a remote machine, which can be very useful, e.g., when implementing menu services.
Multiple -t options force tty allocation, even if ssh has no local tty.
The requiretty option in sudoers file
The requiretty if set in sudo config file sudoers, sudo will only run when the user is logged in to a real tty.
When this flag is set, sudo can only be run from a login session and not via other means such as cron, shell/perl/python or cgi-bin scripts.
This flag is set on many distores by default. Edit /etc/sudoers, file, enter:
# visudo
Find line that read as follows:
Defaults requiretty
Either comment it out the line or delete the line:
#Defaults requiretty
Save and close the file.
This article covers add MySQL database in Websitepanel and fix a common errors related to this task.
A database interface allows you to create and manage the existing MySQL databases. If you are creating a PHP based application or any application that uses a database, then you will need to create a database and a database user to access this database.
To create a MySQL database in WebsitePanel:
1. Click on the plan you want to add a MySQL database to.
2. Then click Databases.
3. Click MySQL.
4. Click Create Database.
5. Enter a name for your database.
6. Click Save.
7. You can click on the database you just added to edit it.
8. You can view existing users or delete or backup the database.
9. Click Save when you are finished
Success! You can view your added databases and see how many allowed databases you've used.
This article covers fix the Code 9c57 Windows Update Error. Error Code 9c57 generally corresponds to a failed installation of Internet Explorer 11. In addition to that, the KB 2882822 update requires validation of genuine Windows installed on the system, so you may visit the link referred in the third question and check if your Windows requires activation.
What is 'Error code 9c57' in Windows Update?
Windows Update error 9c57 is an error that may occur when you are trying to install “Windows IE9 in Windows 7 for x64 Based System” update.
How can you fix ‘Error code 9c57’ in Windows Update?
Some of the common fixes include:
1. Manually installing Internet Explorer
2. Deleting SoftwareDistribution and running DISM command and sfc/ scannow command
Causes of Windows Update Error 9C57 - Error 9C57:
During software design, programmers code anticipating the occurrence of errors.
However, there are no perfect designs, as errors can be expected even with the best program design. Glitches can happen during runtime if a certain error is not experienced and addressed during design and testing.
To fix Windows Update Error 9C57 - Error 9C57:
1. When you get a runtime error, keep in mind that it is happening due to programs that are conflicting with each other.
The first thing you can do to resolve the problem is to stop these conflicting programs.
2. Update / Reinstall Conflicting Programs
3. Virus infection causing runtime error on your computer must immediately be prevented, quarantined or deleted. Make sure you update your virus program and run a thorough scan of the computer or, run Windows update so you can get the latest virus definition and fix.
4. You might be getting the error because of an update, like the MS Visual C++ package which might not be installed properly or completely. What you can do then is to uninstall the current package and install a fresh copy.
5. You might also be experiencing runtime error because of a very low free space on your computer.
6. If the error is related to a bad graphics driver, then you may do the following:
Open your Device Manager, locate the graphics driver
Right click the video card driver then click uninstall, then restart your computer
This article covers the different methods to encrypt email messages in Outlook: using certificates (S/Mime), Office 365 Message Encryption (OME), and using encryption add-ins.
To Encrypt a single message:
1. In message that you are composing, click File > Properties.
2. Click Security Settings, and then select the Encrypt message contents and attachments check box.
3. Compose your message, and then click Send.
In Outlook, All attachments are encrypted.
Recipients who access the encrypted email via the Office Message Encryption portal can view attachments in the browser.
Note that if the recipient of the file is using an Outlook.com account, they can open encrypted Office attachments on the Office apps for Windows.
To view an encrypted email in Outlook:
1. Select Read the message.
2. You'll be redirected to a page where you can sign in and receive a single-use code.
3. Check your email for the single-use code. Enter the code in the browser window, then select Continue to read your message.
To encrypt a message in Office 365:
1. Sign in with Global Admin credentials.
2. Click on Admin.
3. Click on Settings.
4. Click on Services & add-ins.
5. Click on Microsoft Azure Information Protection.
This article covers easy to follow methods to resolve WordPress 401 error.
The 401 error has multiple names including Error 401 and 401 unauthorized error.
These errors are sometimes accompanied by a message ‘Access is denied due to invalid credentials’ or ‘Authorization required’.
To fix the 401 error in WordPress:
1. Temporarily Remove Password Protection on WordPress Admin
2. Clear Firewall Cache to Solve 401 Error in WordPress
3. Deactivate All WordPress Plugins
4. Switch to a Default WordPress Theme
5. Reset WordPress Password
This article covers how to create keytab files for Kerberos. Active Directory uses Kerberos version 5 as authentication protocol in order to provide authentication between server and client. Kerberos protocol is built to protect authentication between server and client in an open network where other systems also connected.
The Kerberos Keytab file contains mappings between Kerberos Principal names and DES-encrypted keys that are derived from the password used to log into the Kerberos Key Distribution Center (KDC).
The Kerberos Keytab file contains mappings between Kerberos Principal names and DES-encrypted keys that are derived from the password used to log into the Kerberos Key Distribution Center (KDC).
The keytab is generated by running kadmin and issuing the ktadd command. If you generate the keytab file on another host, you need to get a copy of the keytab file onto the destination host ( trillium , in the above example) without sending it unencrypted over the network.
To Create a Kerberos principal and keytab files for each encryption type you use:
1. Log on as theKerberos administrator (Admin) and create a principal in the KDC.
You can use cluster-wide or host-based credentials.
The following is an example when cluster-wide credentials are used. It shows MIT Kerberos with admin/cluster1@EXAMPLE.COM as the Kerberos administrator principal:
bash-3.00$ kadmin -p admin@EXAMPLE.COM
kadmin: add_principal vemkd/cluster1@EXAMPLE.COM
Enter password for principal "vemkd/cluster1@EXAMPLE.COM": password
Re-enter password for principal "vemkd/cluster1@EXAMPLE.COM": passwordCopy code
If you do not create a VEMKD principal, the default value of vemkd/clustername@Kerberos_realm is used.
2. Obtain the key of the principal by running the subcommand getprinc principal_name.
3. Create the keytab files, using the ktutil command:
Create a keytab file for each encryption type you use by using the add_entry command.
For example, run ktutil: add_entry -password -p principal_name -k number -e encryption_type for each encryption type.