explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon SageMaker Unified Studio now supports AWS Glue 5.1 for data processing jobs

3 March 2026 @ 11:00 pm

Amazon SageMaker Unified Studio now supports AWS Glue 5.1 for Visual ETL, notebook, and code-based data processing jobs. With AWS Glue 5.1 in Amazon SageMaker Unified Studio, data engineers and data scientists can run jobs on Apache Spark 3.5.6 with Python 3.11 and Scala 2.12.18, and use updated open table format libraries including Apache Iceberg 1.10.0, Apache Hudi 1.0.2, and Delta Lake 3.3.2. You can use AWS Glue 5.1 in Amazon SageMaker Unified Studio when creating data processing jobs by selecting Glue 5.1 from the version dropdown in job settings. This applies to Visual ETL jobs, notebook jobs, and code-based jobs, so you can take advantage of the latest Spark runtime and open table format libraries across all your data processing workflows. US East (N. Virginia), US East (Ohio), US West (Oregon), Europe (Ireland), Europe

Amazon SageMaker Unified Studio adds metadata sync with third-party catalogs

3 March 2026 @ 11:00 pm

Amazon SageMaker Unified Studio now supports metadata and context sync across Atlan, Collibra, and Alation. These integrations synchronize catalog metadata between Amazon SageMaker Catalog and each partner platform, giving teams a consistent view of their data and AI assets regardless of which tool they use day to day. Organizations can maintain aligned glossary terms, asset descriptions, and ownership information across platforms without manual reconciliation. All three integrations synchronize key metadata elements including projects, assets, descriptions, glossary terms, and their hierarchies. With the Collibra integration, you can synchronize metadata in both directions between SageMaker Catalog and the partner platform, so updates you make in one are reflected in the other. Also, you can manage SageMaker Unified Studio data access requests from Collibra

Amazon SageMaker Unified Studio launches support for remote connection from Kiro IDE

3 March 2026 @ 7:39 pm

Today, AWS announces the ability to remotely connect from Kiro IDE to Amazon SageMaker Unified Studio. This new capability allows data scientists, ML engineers, and developers to leverage their Kiro setup - including its spec-driven development, conversational coding, and automated feature generation capabilities - while accessing the scalable compute resources of Amazon SageMaker. By connecting Kiro to SageMaker Unified Studio using the AWS toolkit extension, you can eliminate context switching between your local IDE and cloud infrastructure, maintaining your existing agentic development workflows within a single environment for all your AWS analytics and AI/ML services. SageMaker Unified Studio, part of the next generation of Amazon SageMaker, offers a broad set of fully managed cloud interactive development environments (IDE), including JupyterLab and Code Editor based on Code-OSS (Open-Source Software). Start

 Policy in Amazon Bedrock AgentCore is now generally available

3 March 2026 @ 6:00 pm

Policy in Amazon Bedrock AgentCore is now generally available, providing organizations with centralized, fine-grained controls for agent-tool interactions. Policy operates outside your agent code, enabling security, compliance, and operations teams to define tool access and input validation rules without modifying agent code. Teams can author policies using natural language that automatically converts to Cedar, the AWS open-source policy language. Policies are stored in a policy engine and attached to an AgentCore Gateway, which intercepts agent-tool traffic and evaluates each request against the policies before allowing or denying tool access. Policy helps ensure agents operate within defined parameters while maintaining organizational visib

AWS Batch now supports configurable scale down delay

2 March 2026 @ 7:05 pm

AWS Batch now allows you to configure a scale down delay for managed compute environments, helping reduce job processing delays for intermittent and periodic workloads. With the new minScaleDownDelayMinutes parameter, you can specify how long AWS Batch keeps instances running after their jobs complete (from 20 minutes to 1 week), preventing unnecessary instance terminations and relaunches that can delay subsequent job processing. You can configure the scale down delay when creating or updating a compute environment via the AWS Batch API (CreateComputeEnvironment or UpdateComputeEnvironment) or the AWS Batch Management Console. The delay is applied at the instance level, based on when each instance last completed a job. Scale down delay is supported today in all AWS Regions where AWS Batch is available. For more information, see the

AWS Config now supports 30 new resource types

2 March 2026 @ 4:00 pm

AWS Config now supports 30 additional AWS resource types across key services including Amazon Bedrock AgentCore and Amazon Cognito. This expansion provides greater coverage over your AWS environment, enabling you to more effectively discover, assess, audit, and remediate an even broader range of resources. With this launch, if you have enabled recording for all resource types, then AWS Config will automatically track these new additions. The newly supported resource types are also available in Config rules and Config aggregators. You can now use AWS Config to monitor the following newly supported resource types in all AWS Regions where the supported resources are available: Resource Types: AWS::AppSync::DataSource

AWS announces pricing for VPC Encryption Controls

1 March 2026 @ 11:41 pm

AWS is launching pricing for VPC Encryption Controls, a security and compliance feature that enables you to audit and enforce encryption-in-transit of all traffic flows within and across Virtual Private Clouds (VPCs) in a region. VPC Encryption controls can be enabled in two modes: Monitor mode detects presence of any unencrypted traffic within your VPCs, and Enforce Mode ensures all data-in-transit is encrypted and prevents the bring up of any resources that allow unencrypted traffic within your VPC.  Starting March 1, 2026, VPC Encryption Controls will transition from a free preview to a paid feature. You will be charged a fixed hourly rate for every non-empty VPC (VPC that has network interfaces in them) that has Encryption Controls enabled in either monitor or enforce mode. There will be no charge for empty VPCs that have encryption controls enabled. When you enable encryption support on a Transit Gateway, standard VPC Encryption Controls charges apply to all VPCs

AWS Elemental MediaLive Now Supports SRT Listener Mode

28 February 2026 @ 12:14 am

AWS Elemental MediaLive now supports Secure Reliable Transport (SRT) Listener mode for both inputs and outputs. With SRT Listener mode, MediaLive waits for connections rather than initiating them. Upstream sources push live video directly to MediaLive, and downstream systems pull encoded streams on demand. This simplifies network setup by removing the need for complex firewall configurations or static, publicly accessible IP addresses on the source or destination side. SRT Listener mode complements MediaLive's existing SRT Caller mode, giving you full control over which side of the connection initiates the SRT handshake. SRT Listener mode enables flexible contribution and distribution workflows. On the input side, you can push streams from on-premises encoders or remote production sites, including MediaLive Anywhere deployments, directly to MediaLive in the cloud without coordinati

Amazon Lightsail expands blueprint selection with a new WordPress blueprint

27 February 2026 @ 11:28 pm

Amazon Lightsail now offers a new WordPress blueprint, making it easier than ever to launch and manage a WordPress website on the cloud. With just a few clicks, you can create a Lightsail virtual private server (VPS) preinstalled with WordPress, and follow a guided setup wizard to get your site fully configured and running in minutes. This new blueprint has Instance Metadata Service Version 2 (IMDSv2) enforced by default. With Lightsail, you can easily get started on the cloud by choosing a blueprint and an instance bundle to build your web application. Lightsail instance bundles include instances preinstalled with your preferred operating system, storage, and monthly data transfer allowance, giving you everything you need to get up and running quickly. The new WordPress blueprint includes a step-by-step setup workflow that walks you through connecting a custom domain, configuring DNS, attaching a static IP address, and enabling HTTPS encryption using a free Let's Encrypt S

EC2 Image Builder enhances lifecycle policies with wildcard support and simplified IAM

27 February 2026 @ 10:10 pm

EC2 Image Builder, a service that helps you automate the creation, distribution, and management of customized Amazon Machine Images, now supports wildcard patterns in lifecycle policies and simplifies IAM role creation. You can now use wildcard patterns to manage images from multiple recipes within a single lifecycle policy, and create IAM roles with pre-populated default permissions directly from the console. Previously, you had to create separate lifecycle policies for each new recipe or manually select individual recipes, making it difficult to scale as new recipes were added. Now with wildcard pattern support, you can specify patterns like my-recipe-1.x.x to automatically apply lifecycle policies to all matching recipes—including new recipes created in the future. Additionally, creating IAM roles for lifecycle management previously required manually configuring the required permissions. Now when creating a new role in the console, EC2 Image Builder automatically popul

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Cisco: AI is a double-edged sword in industrial networks

3 March 2026 @ 9:10 pm

AI can be a double-edged sword for industrial networking teams, creating both problems and benefits, according to Cisco’s newly released 2026 State of Industrial AI Report. For example, AI cybersecurity is both the biggest barrier and the top asset for industrial networking teams, according to the 1,000 industry professionals who were surveyed for the report. Among respondents, 40% cite cybersecurity concerns as a top obstacle to AI adoption, and 48% identify security

AMD accelerates telecom network AI

3 March 2026 @ 7:52 pm

AMD is helping telecom operators move from AI pilots to production deployments with the transition from traditional Radio Access Network (RAN) to open, virtualized architectures. At the Mobile World Conference 2026 show AMD is showing end-to-end technologies that can carry

2026 network outage report and internet health check

3 March 2026 @ 2:26 pm

ThousandEyes, a Cisco company, monitors how ISPs, cloud providers and conferencing services are handling any performance challenges and provides Network World with a weekly roundup of events that impact service delivery. Read on to see the latest analysis, and stop back next week for another update on internet and cloud traffic performance. Note: We have archived prior-year outage updates, including our reports from 2025, 2024,

Nvidia: Latest news and insights

3 March 2026 @ 8:59 am

More processor coverage on Network World:Intel news and insights | AMD news and insights With its legacy of innovation in GPU technology, Nvidia

Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

3 March 2026 @ 1:28 am

Nvidia on Monday announced strategic partnerships with Lumentum Holdings and Coherent, which it said are designed to accelerate the development of advanced optics technologies used in AI data center infrastructure. The agreements will see Nvidia invest $2 billion in each company to support their research and development and operations, and to build out or expand their US-based manufacturing capabilities. [ Related: More Nvidia news and insights ] In its announcements, Nvidia noted that optical

Intel: Latest news and insights

2 March 2026 @ 9:02 pm

More processor coverage on Network World:AMD news and insights | Nvidia news and insights Intel is hoping for a turnaround under its new CEO, Lip-BuTan. Intel’s Q1 2025 revenue was $12.7 billion, flat year-over-year. While revenue for its client computing group dropped 8%, the data center and AI segment showed an 8% increase, dr

Intel aims advanced Xeon 6+ at AI edge computing

2 March 2026 @ 8:33 pm

At the Mobile World Conference show in Barcelona, Intel showcased its most advanced processor yet, the Xeon 6+ processor, codenamed “Clearwater Forest.” Technically, it is one of Intel’s most complex chiplet designs, with a package that combines a total of 12 compute chiplets manufactured on a mix of Intel 18A node, Intel 7, and Intel 3 manufacturing processes. [ Related: More Intel news and

Nvidia partners with telecom providers for open 6G networks

2 March 2026 @ 5:16 pm

Nvidia has partnered with a variety of global telecom providers for a commitment to build 6G on open and secure artificial intelligence-native platforms, bringing software-defined networking to telecommunications. Announced at the Mobile World Congress conference, the list of Nvidia partners is

Why network bandwidth matters a lot

2 March 2026 @ 3:14 pm

What do enterprises wish for the most when it comes to networking? Ok, if you guessed “that is could be free” you’d be right, but they don’t really think that’s realistic. Their biggest feasible wish is more capacity. Networks push bits, and of 372 enterprises who offered comments on their 2026 wishes, 328 put more capacity at the top. It’s not all about AI either. This group thinks that, while there’s no universal cure for network ills, having more capacity comes close. So why is that? Enterprises have three networks: the data center network, the W

OpenAI launches stateful AI on AWS, signaling a control plane power shift

28 February 2026 @ 1:48 am

Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has announced that it will soon offer a stateful runtime environment in partnership with Amazon, built to simplify the process of getting AI agents into production. It will run natively on Amazon Bedrock, be tailored for agentic workflows, and optimized for AWS infrastructure. Interestingly, OpenAI also felt the need to make

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Download of the day: GIMP 3.0 is FINALLY Here!

18 March 2025 @ 3:45 am

Wow! After years of hard work and countless commits, we have finally reached a huge milestone: GIMP 3.0 is officially released! I am excited as I write this and can't wait to share some incredible new features and improvements in this release. GIMP 2.10 was released in 2018, and the first development version of GIMP 3.0 came out in 2020. GIMP 3.0 released on 16/March/2025. Let us explore how to download and install GIMP 3.0, as well as the new features in this version. Love this? sudo share_on: Twitter - Facebook -

How to list upgradeable packages on FreeBSD using pkg

16 March 2025 @ 8:25 pm

See all FreeBSD related FAQ Here is a quick list of all upgradeable packages on FreeBSD using pkg command. This is equivalent to apt list --upgradable command on my Debian or Ubuntu Linux system. Love this? sudo share_on: Twitter -

Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement

16 March 2025 @ 12:17 pm

In a move that has sparked significant discussion within the Ubuntu Linux fan-base and community, Canonical, the company behind Ubuntu, has announced its intention to explore the potential replacement of GNU Core Utilities with the Rust-based "uutils" project. They plan to introduce new changes in Ubuntu Linux 25.10, eventually changing it to Ubuntu version 26.04 LTS release in 2026 as Ubuntu is testing Rust 'uutils' to overhaul its core utilities potentially. Let us find out the pros and cons and what this means for you as an Ubuntu Linux user, IT pro, or developer. Love this? sudo share_on: Twitter -

How to install KSH on FreeBSD

3 March 2025 @ 11:50 pm

See all FreeBSD related FAQ Installing KSH (KornShell) on FreeBSD can be done with either FreeBSD ports or the pkg command. The ports collection will download the KSH source code, compile it, and install it on the system. The pkg method is easier, and it will download a pre-compiled binary package. Hence, it is recommended for all users. KornShell (KSH) has a long history, and many older Unix systems and scripts rely on it. As a result, KSH remains relevant for maintaining and supporting legacy infrastructure. Large enterprises, especially those with established Unix-based systems, continue to use KSH for scripting and system administration tasks. Some industries where KS

Linux Sed Tutorial: Learn Text Editing with Syntax & Examples

3 March 2025 @ 9:47 am

See all GNU/Linux related FAQ Sed is an acronym for "stream editor." A stream refers to a source or destination for bytes. In other words, sed can read its input from standard input (stdin), apply the specified edits to the stream, and automatically output the results to standard output (stdout). Sed syntax allows an input file to be specified on the command line. However, the syntax does not directly support output file specification; this can be achieved through output redirection or editing files in place while making a backup of the original copy optionally. Sed is one of the most powerful tools on Linux and Unix-like systems. Learning it is worthwhile, so in t

How to tell if FreeBSD needs a Reboot using kernel version check

23 February 2025 @ 10:07 pm

See all FreeBSD related FAQ Keeping your FreeBSD server or workstation updated is crucial for security and stability. However, after applying updates, especially kernel updates, you might wonder, "Do I need to reboot my system?" Let's simplify this process and provide a straightforward method for determining whether a reboot is necessary using the CLI, shell script, and ansible playbook. Love this? sudo share_on: Twitter

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

Domain Name Transfer Checklist: Everything You Need to Know

3 March 2026 @ 2:56 pm

The post Domain Name Transfer Checklist: Everything You Need to Know appeared first on Heart Internet.

Heart Internet Win Gapstars Innovation Award 2026

23 February 2026 @ 11:57 am

We’re incredibly proud to celebrate our Site Reliability Engineering team, who have won the Gapstars Innovation Award for their outstanding work improving platform stability, security, and visibility across our shared... The post Heart Internet Win Gapstars Innovation Award 2026 appeared first on Heart Internet.

A/B Testing Explained: A Practical Guide To Better Results | Part 1

20 February 2026 @ 8:32 am

If you want to improve your website you probably need to do A/B testing, otherwise known as split testing. Instead of guessing, A/B testing allows you to experiment more scientifically.... The post A/B Testing Explained: A Practical Guide To Better Results | Part 1 appeared first on Heart Internet.

How to enable two-factor authentication (2FA) on your Heart Internet account

28 January 2026 @ 12:37 pm

Account security matters, and switching on two-factor authentication (2FA) is a quick win. 2FA adds a second check during the sign-in process, so even if someone compromises your password, they still can’t get in.  To enable 2FA:  Step 1: Open your... The post How to enable two-factor authentication (2FA) on your Heart Internet account appeared first on Heart Internet.

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure.... The post How to Choose the Perfect Domain Name for Your Business appeared first on Heart Internet.

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet. The post What is a VPS? And is it Time You Got One? appeared first on Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being... The post We’re Now Certified by the Green Web Foundation appeared first on Heart Internet.

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business... The post What is Web Hosting and Why Does Your Business Need It? appeared first on Heart Internet.

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access via SSH on Your VPS for Migration using Plesk appeared first on Heart Internet.

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access on Your VPS Server Using Plesk appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

TLSA/DANE via Let’s Encrypt wildcard certificate in Plesk on domain with external DNS

3 March 2026 @ 5:06 pm

Disclaimer: I am not a professional server admin, but I’m all we have at the company where I work. Please gear answers to novice level. I manage a domain with multiple subdomains. The DNS for the domain is handled through Simply.com and the zone is signed by DNSSEC; the domain is hosted on a Windows Server 2019 VPS through a different host, running Plesk with a MailEnable e-mail server. We’ve used free wildcard certificates from Let’s Encrypt to secure the domain and all subdomains (including e-mail) for years, installing them manually via the Plesk browser GUI. Since the DNS is handled externally, Plesk cannot automatically re-issue wildcard certificates, so I need to do this manually every three months, updating the ACME challenge record in the DNS to the value generated by Plesk. This has never caused any issues. When I went to re-issue last week, however, the Let’s Encrypt form had gained a new field relating to DANE support

Error when demoting Active Directory Domain Controller

3 March 2026 @ 4:11 pm

I have two Windows servers acting as Domain Controllers, MAIN (Windows Server 2012-R2) and SECONDARY (Windows Server 2022). SECONDARY was unplugged for a long time, and now has stale records. This is causing problems in my domain. I want to remove SECONDARY as a DC altogether. I tried to use the Remove Roles and Features¹ on SECONDARY to demote it, but every time I do this I get the nondescript error of Managing the network session with MAIN.dc.local failed. "The target account name is incorrect" To perform the operation, I'm using the login dc.local\developer. Despite the stale records, the password for this account is the same on SECONDARY and MAIN. I have tried many different ways to remove this rouge Domain Controller, but all of them seem to fail. How can I remove it? ¹This is the same as if I ran Uninstall-ADDSDomainController -DemoteOperationMasterRol

AD DNS: CNAME Flattening / ANAME records?

3 March 2026 @ 3:57 pm

This will be a bit of an... interesting... question. At $DAYJOB, we have a bit of an interesting situation. We have split-horizon DNS where inside our corporate network we have differing records for domain.example.com and example.com than we do for the public DNS for example.com. Inside the corporate network, all DNS records are provided by Microsoft Active Directory DNS Services, while external to our network is Cloudflare. One of the root domain records - example.com and www.example.com - uses CNAME Flattening (aka "ANAME" records) via Cloudflare to send traffic to the third party provider for our base domain website. While we can make www.example.com a CNAME entry in the AD DNS environment, we don't have a way to create an ANAME record (which we could do with Cloudflare which uses CNAME flattening, or at home where I use Technitium DNS server which can do the sa

Custom action <bantime> sometimes incorrect in fail2ban with increment

3 March 2026 @ 2:06 pm

I have a custom jail with a custom action. The custom action is banning the IP in our firewall. I've removed everything related to unban to not have too much code here. The firewall_ban is writing into the same fail2ban.log file, logging details there as well. I'm using an increment with factor 2. It works for the first incremental bans, but for the third increase it for some reason is back to the time of first ban as you can see in the last 3 lines. The reason I use bantime in the custom action is because there is a cleanup which cleans old entries in case they were for some reason not unbanned properly or if we manually add entries directly into the firewall. Jail: [DEFAULT] bantime.increment = true bantime.maxtime = 120d bantime.factor = 2 [login] enabled = true port = http,https filter = login action = firewall[name=login] %(action_)s logpath = /var/log/login-error.log maxretry = 10 findtime = 600 bantime = 10800

How to identify a process occasionally calling a suspicious IP address?

3 March 2026 @ 11:05 am

I need to find the process responsible for calling a certain IP address rated as suspicious by my ISP. A connection to that address is made occasionally from my Windows 11 machine and I don't know what triggers it. I've captured UDP traffic to that IP with Wireshark, but Wireshark doesn't capture any process metadata. I've used the command netsh trace start persistent=yes capture=yes tracefile=c:\temp\nettrace-boot.etl and opened the trace in Network Monitor. The trace shows PIDs but not process names. I can find the process name from a PID of a running process but I don't know how to retrieve it if the process has already stopped. The local port used by the process seems to change each time the connection is made. Please suggest a way to capture the process name involved in establishing a connection to a given IP address.

How do I allow external Entra Id app registrations to use my app roles

2 March 2026 @ 10:39 pm

I have an API that allows a variety of auth methods including OAuth2.0. When using OAuth2.0, it currently requires callers to have one of a couple of roles defined by my service's Entra Id app registration. Right now, I'm creating a new app registration for each client application that wants to call my API; and that requires me to manage all of the client secrets and send them to the devs of the calling client apps. This isn't really scalable, and I would like it if some of them could manage their own secrets. Some of the clients have their own Entra Id tenants. I'd like to allow them to create their own app registrations that can request the roles defined in my service's app registration, and I want to approve their requests for roles that I've defined. Is this possible? I've tried creating a multi-tenant service app registration, but it seems like any tenant can request my roles and approve their own requests. I was really hoping to avoid checking for a l

Bulk software deployment on Entra-joined devices without MDM or RMM access

2 March 2026 @ 9:55 pm

I am looking for a sanity check on a deployment constraint. I need to deploy a new RMM agent to about 100 Windows endpoints across two tenants. Environment and constraints: Identity: 100% Microsoft Entra ID joined. Not hybrid. Configuration Management: No Intune or other MDM enrollment. No Group Policy. No line of sight to a domain controller. Existing tools: None. A third-party RMM is installed, but we do not have access to its console. It is controlled by a former MSP. Remote access: Only native Windows Quick Assist under our control. Note: Administrative access to the existing RMM is currently unavailable due to contractual disputes, and collaboration with the former MSP is not an option. Goal: Perform a bulk, silent installation of the RMM agent. My assessment: From what I

Windows cluster + generic service + lost quorum -> which timeout?

2 March 2026 @ 2:23 pm

I have a Windows Server 2019 cluster with two nodes, a witness, and one generic service. Sometimes when the active node loses communication with the other node and witness, the cluster service on this node waits for the service to be shut down. Sometimes it takes 60 seconds for the service to clean up and end, but that's fine, it always waits. At the same time, the second node connected to the witness has quorum and brings up the service. That's fine too, even though two services run simultaneously for a while. The important thing is that the service always shuts down gracefully. Unfortunately, sometimes the node on which the service is being shut down kills it with force after 30 seconds before the service finishes shutting down gracefully and I don't want that. I tested this in a DEV environment and observed that when I move the service too many times one of the nodes enters the quarantine state and at that point if I move the service to the quarantined node

RAID 5 catastrophic failure [closed]

2 March 2026 @ 10:27 am

We have server HP Proliant DL380 Gen9. After a server was powered off, a RAID 5 18TB x 6 disks (created by OS Windows) had a multiple disk failure. I want to import foreign disks (like I did before), but this option is not available. I tried to restore the array with different recovery programs, but was unsuccessful. I can see the structure of directories and files in one of these programs but many of the files are not available. As result, in disk management i see 3 disks dynamic unsuccesfully, 3 not distributed and 3 is missing unsuccesfully. Unfortunately, we have no backup copies left, so I would like to know what are the ways of restoring our array.

Why does DKIM fail in this email?

2 March 2026 @ 9:20 am

I have an email address [email protected], the domain DNS records (CNAME, TEXT, etc) are hosted with Spaceship, and the sending mailbox is hosted with Microsoft 365. When I send an email from this address using Outlook, it is often sent to spam. I tried sending an email to another Gmail address, and when I clicked "show original" I saw this (note that I replaced the custom domain email with [email protected] and my Gmail address with [email protected]): SPF: PASS with IP 2a01:111:f403:c40d:0:0:0:2 Learn more DKIM: 'FAIL' with domain mydomain.com Learn more DMARC: 'PASS' Learn more The full text of the email looks like this: Delivered-To: [email protected] Received: by 2002:a05:6124:16a4:b0:433:4212:fb0b with SMTP id dg36csp1736394vlb; Mon, 2 Mar 2026 01:03:00 -0800 (PST) X-Received: by 2002:a05:690c:c50b:b0:796:2fde:5def with SMTP id 00721157ae682-798855da730mr102188707b3.45.177244

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10