explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

AWS Amplify enhances developer tooling with refined output and CDK-style notices

28 April 2025 @ 9:45 pm

AWS Amplify introduces two key improvements to its backend tooling: streamlined deployment output using the AWS CDK Toolkit and a new notice system for local development. These updates optimize how developers receive deployment status information and important messages directly in their terminal when executing Amplify commands. These enhancements improve the development experience by focusing on essential information while proactively surfacing critical notices. Frontend developers can now focus on relevant deployment information without the distraction of underlying infrastructure details. The notice system, similar to CDK's approach, delivers important messages about potential issues, compatibility concerns, and other noteworthy items related to Amplify backends, enabling developers to address problems early in the development process. These features are available in all AWS Regions where AWS Amplify is supported. To learn more about these developer expe

Automated HTTP validated public certificates with Amazon CloudFront

28 April 2025 @ 9:00 pm

AWS Certificate Manager (ACM) announces automated public TLS certificates for Amazon CloudFront. CloudFront customers can now simply check a box to receive required public certificates to enable TLS when creating new CloudFront content delivery applications. ACM and CloudFront work together to automatically request, issue and associate the required public certificates with CloudFront. ACM will also automatically renew these certificates as long as the certificate is in use and traffic for the certificate domain is routed to CloudFront. Previously, to set up a similar secure CloudFront distribution, customers had to request a public certificate through ACM, validate the domain, and then associate the issued certificate with the CloudFront distribution. This option remains available to customers. ACM uses a domain validation method commonly referred to as HTT

Amazon EC2 High Memory instances now available in US East (Ohio) Region

28 April 2025 @ 5:00 pm

Starting today, Amazon EC2 High Memory instances with 24TB of memory (u-24tb1.112xlarge) are available in the US East (Ohio) region. Customers can start using these new High Memory instances with On Demand and Savings Plan purchase options. Amazon EC2 High Memory instances are certified by SAP for running Business Suite on HANA, SAP S/4HANA, Data Mart Solutions on HANA, Business Warehouse on HANA, and SAP BW/4HANA in production environments. For details, see the Certified and Supported SAP HANA Hardware Directory. For information on how to get started with your SAP HANA migration to EC2 High Memory instances, view the Migrating SAP HANA on AWS to an EC2 High Memory Instance documentation.

Introducing Amazon EC2 I7i high performance Storage Optimized instances

28 April 2025 @ 5:00 pm

Amazon Web Services is announcing the general availability of next generation high performance Storage Optimized Amazon EC2 I7i instances. Powered by 3rd generation AWS Nitro SSDs, I7i instances offer up to 45TB of NVMe storage with up to 50% better real-time storage performance, up to 50% lower storage I/O latency, and up to 60% lower storage I/O latency variability compared to I4i instances. Powered by 5th generation Intel Xeon Scalable processors with an all-core turbo frequency of 3.2 GHz, I7i instances offer the best compute and storage performance for x86-based storage optimized instances in Amazon EC2, delivering up to 23% better compute performance and more than 10% better price performance over previous generation I4i instances. I7i instances are ideal for I/O intensive and latency-sensitive workloads such as transactional databases, real-time and NoSQL databases, real-time analytics, AI/ML pre-processing for training, indexing and search engines requiring high ran

Announcing SaaS Manager for Amazon CloudFront

28 April 2025 @ 5:00 pm

Today, AWS announces CloudFront SaaS Manager, a new Amazon CloudFront feature designed to efficiently manage content delivery across multiple websites for Software-as-a-Service (SaaS) providers, web development platforms, and companies with multiple brands/websites. CloudFront SaaS Manager provides a unified experience, alleviating the operational burden of managing multiple websites at scale, including TLS certificate management, DDoS protection, and observability. CloudFront SaaS Manager introduces reusable configuration settings, eliminating redundant configurations and allowing customers to maintain consistent settings across their websites. This not only saves time but also reduces the potential for errors in configuration. With CloudFront SaaS Manager, customers benefit from optimal CDN and security defaults, ensuring high performance and secure protections following AWS best practices. Additionally, CloudFront SaaS Manager can automate requesting, issuing, and associ

Writer’s Palmyra X5 and X4 models are now available in Amazon Bedrock

28 April 2025 @ 5:00 pm

Writer's enterprise-grade foundation models, Palmyra X5 and X4, are now available as fully managed, serverless models in Amazon Bedrock. AWS is the first cloud provider to offer fully managed models from Writer, allowing organizations to leverage enterprise AI capabilities with serverless scalability and cost optimization. Palmyra X5 has a one million token context window, while Palmyra X4 features a 128,000 token context window, both designed for sophisticated business applications. These models, top-ranked on Stanford's HELM benchmark, excel at complex tasks including advanced reasoning, multi-step tool-calling, and built-in RAG (Retrieval-Augmented Generation). Both models support multiple languages including English, Spanish, French, German, and Chinese, making them ideal for global enterprise deployments. Organizations can use Palmyra models to automate sophisticated workflows across various industries—financial services teams can analyze extensive market researc

AWS Client VPN now supports Client Routes Enforcement

28 April 2025 @ 5:00 pm

Today, AWS announced a new AWS Client VPN feature that monitors device networking routes, prevents VPN traffic leaks, and strengthens remote access security. The feature continuously tracks your users' device routing tables to ensure outbound traffic flows through the VPN tunnel according to your configured settings. If the feature detects any modified networking route settings, it automatically restores the routes to your original configuration. AWS Client VPN allows admins to configure routes on users' devices to route traffic through the VPN. For example, an admin might configure end users' devices to connect to the 10.0.0.0/24 network using VPN connectivity while the rest of the traffic breaks out locally from the device. However, connected devices could deviate from the organization's configurations, causing VPN leaks. For example, even if you configure traffic to the 10.0.0.0/24 network to go via VPN, users or other clients running on the device can modify settings an

Amazon Bedrock Data Automation now supports modality controls, hyperlinks and larger documents

25 April 2025 @ 6:20 pm

Amazon Bedrock Data Automation (BDA) now supports modality enablement, modality routing by file type, extraction of embedded hyperlinks when processing documents in Standard Output, and an increased overall document page limit of 3,000 pages. These new features give you more control over how your multimodal content is processed and improve BDA’s overall document extraction capabilities. With Modality Enablement and Routing, you can configure which modalities (Document, Image, Audio, Video) should be enabled for a given project and manually specify the modality routing for specific file types. JPEG/JPG and PNG files can be processed as either Images or Documents based on your specific use case requirements. Similarly, MP4/M4V and MOV files can be processed as either video files or audio files, allowing you to choose the optimal processing path for your content. Embedded Hyperlink Support enables BDA to detect and return embedded hyperlinks found in PDFs as part of

Amazon EventBridge cross-account event delivery now in the AWS GovCloud (US) Regions

25 April 2025 @ 6:00 pm

Starting today, in the AWS GovCloud (US-East) and AWS GovCloud (US-West) Regions, you can now deliver events from an Amazon EventBridge Event Bus directly to AWS services in another account. Using multiple accounts can improve security and streamline business processes while reducing the overall cost and complexity of your architecture. Amazon EventBridge Event Bus is a serverless event broker that enables you to create scalable event-driven applications by routing events between your own applications, third-party SaaS applications, and other AWS services. This launch allows you to directly target services in another account, without the need for additional infrastructure such as an intermediary EventBridge Event Bus or Lambda function, simplifying your architecture and reducing cost. For example, you can now route events from your EventBridge Event Bus directly to a different team's SQS queue in a different account. The team receiving events does not need to learn about or

Amazon Q Developer operational investigations (preview) now available in additional regions

25 April 2025 @ 5:00 pm

Starting today, Amazon Q Developer operational investigations is available in preview in 11 additional regions. With this launch, Amazon Q Developer operational investigations is now available in US East (N. Virginia), US East (Ohio), US West (Oregon), Europe (Ireland), Europe (Frankfurt), Europe (Stockholm), Europe (Spain), Asia Pacific (Tokyo), Asia Pacific (Hong Kong), Asia Pacific (Sydney), Asia Pacific (Singapore), and Asia Pacific (Mumbai). Amazon Q Developer helps you accelerate operational investigations across your AWS environment in just a fraction of the time. With a deep understanding of your AWS cloud environment and resources, Amazon Q Developer looks for anomalies in your environment, surfaces related signals for you to explore, identifies potential root-cause hypotheses, and suggests next steps to help you remediate issues faster. The new operational investigation capability within Amazon Q Developer is available at no additional cost during preview

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

HPE Aruba boosts NAC security, adds GreenLake ‘kill switch’

29 April 2025 @ 7:29 pm

The latest moves by HPE Aruba Networking are aimed at bolstering coordination among security and networking teams to more effectively protect access to enterprise resources. At RSA Conference 2025, the vendor announced a variety of updates, including a new policy manager for network access control (NAC), tighter integration between Aruba Networking Central and HPE OpsRamp, and new security components for its SD-WAN and SSE packages. “The network is increasingly looked at by bo

Nvidia AI supercluster targets agents, reasoning models on Oracle Cloud

29 April 2025 @ 6:27 pm

Oracle has deployed thousands of Nvidia GPUs across its Oracle Cloud Infrastructure cloud service to be used develop and run next-generation reasoning models and AI agents. This is the first wave of liquid-cooled NVIDIA GB200 NVL72 racks in OCI data centers, involving thousands of Nvidia Grace CPUs and Blackwell GPUs. The Nvidia GB200 NVL72 is a supercomputer made up of 36 Arm-based Nvidia Grace CPUs, each one paired with two Blackwell GPUs and connected via NVLink. Each GB200 NVL72 offers more than one exaflop of training performance. Oracle aims to eventually build a cluster of more than 100,000 Blackwell GPUs which will form one of its “OCI Superclusters.” In addition t

Palo Alto unpacks security platform to protect AI resources

29 April 2025 @ 6:14 pm

Palo Alto Networks this week at the RSA Conference unveiled its Prisma AIRS AI security platform that the company says is designed to protect the developing enterprise AI ecosystem from attacks. As enterprise companies embrace AI, they must also protect their environments and AI initiatives from security blind spots, risks, and vulnerabilities. AI represents a new attack surface for malicious actors, and enterprises need new approaches to secure components across their environments. An AI security platform will provide customers with the tools needed to prevent security incidents as customers deploy agents, apps, models, and more in their environments, according to Palo Alto Networks.

Alert to Kali Linux admins: Get the new signing key or no distro updates for you

29 April 2025 @ 5:36 pm

Kali Linux administrators who haven’t manually updated the signing key for the operating system’s repository are going to find that they can’t get updates. This comes after the overseers of the open source distribution aimed at penetration testers and other infosec pros admitted this week that they lost access to the signing key for the Kali repository, and had to roll out a new one. “This is entirely our fault,” Kali acknowledged in a blog. In fact, the incident happened over a week ago, and Kali had to freeze the update repository on April 18, w

Top network and data center events 2025

29 April 2025 @ 4:25 pm

Ready to travel to gain hands-on experience with new networking and infrastructure tools? Tech conferences – in person and virtual – give attendees a chance to access product demos, network with peers, earn continuing education credits, and catch a celebrity keynote or live entertainment. Check out our calendar of upcoming network, I&O, and data center conferences, and

Palo Alto Networks to buy Protect AI, strengthen AI security platform

29 April 2025 @ 1:48 pm

Palo Alto Networks Monday announced plans to acquire AI security platform vendor Protect AI in a deal that will strengthen its Prisma AIRS security platform, which includes AI agent capabilities. The financial details of the deal were not disclosed, but analysts from investment banking and capital markets firm Jeffries reportedly estimated Palo Alto Networks will spend between $650 million to $700 million to acquire Protect AI and its platform for securing AI and machine learning models and applications. Seattle-based

Brocade Fabric OS flaw could allow code injection attacks

29 April 2025 @ 1:33 pm

A high severity flaw affecting Broadcom’s Brocade Fabric OS (FOS) has allowed attackers to run arbitrary code on affected environments with full root-level privileges. The flaw, tracked as CVE-2025-1976, is particularly dangerous as it can allow complete takeover of FOS devices, including Fibre switches and directors, which are core to Storage Area Networks (SANs), potentially enabling attackers to modify system files, configuration data, firmware, security mechanisms, and install persistent malware.

Juniper Beyond Labs tackles AI networking, quantum security

29 April 2025 @ 1:24 pm

Juniper Beyond Labs is set up to identify and cultivate promising new network and security technologies. CTO Raj Yavatkar took the helm in 2023, when Juniper Networks launched the lab with the goal of incubating technologies that could lead to new products and help customers move their enterprises into the future. “If nothing else, we also get to explore some great new technology strains before they become well established,” Yavatkar told Network World. Among the current areas of focus for Yavatkar and the lab are AI networking, application performance, and quantum networking and security. Building AI networks

IBM aims for autonomous security operations

28 April 2025 @ 8:24 pm

IBM has added new agentic and automation capabilities to its managed detection and response (MDR) services to help customers more quickly and efficiently secure enterprise resources. Specifically, Big Blue is launching an agentic AI system called Autonomous Threat Operations Machine (ATOM), which is designed to provide automated threat triage, investigation, and remediation and reduce the need for human intervention when responding to threats. ATOM uses AI-based agents and an orchestration engine to augment an organization’s existing security analytics systems and accelerate threat detection, analyze alerts, perform risk analysis, and execute investigation plans. The agents

Cisco automates AI-driven security across enterprise networks

28 April 2025 @ 5:36 pm

Cisco today announced a range of AI-driven security enhancements, including improved threat detection and response capabilities in Cisco XDR and Splunk Security, new AI agents, and integration between Cisco’s AI Defense platform and ServiceNow SecOps. In addition, Cisco launched a new group called Foundation AI to focus on advancing AI and security technologies within the company and across the industry. The group’s first act is the launch of an open-source AI reasoning model built to enhance security applications. Cisco announced its news at RSA Conference 2025, which is g

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Download of the day: GIMP 3.0 is FINALLY Here!

18 March 2025 @ 3:45 am

Wow! After years of hard work and countless commits, we have finally reached a huge milestone: GIMP 3.0 is officially released! I am excited as I write this and can't wait to share some incredible new features and improvements in this release. GIMP 2.10 was released in 2018, and the first development version of GIMP 3.0 came out in 2020. GIMP 3.0 released on 16/March/2025. Let us explore how to download and install GIMP 3.0, as well as the new features in this version. Love this? sudo share_on: Twitter - Facebook -

How to list upgradeable packages on FreeBSD using pkg

16 March 2025 @ 8:25 pm

See all FreeBSD related FAQ Here is a quick list of all upgradeable packages on FreeBSD using pkg command. This is equivalent to apt list --upgradable command on my Debian or Ubuntu Linux system. Love this? sudo share_on: Twitter -

Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement

16 March 2025 @ 12:17 pm

In a move that has sparked significant discussion within the Ubuntu Linux fan-base and community, Canonical, the company behind Ubuntu, has announced its intention to explore the potential replacement of GNU Core Utilities with the Rust-based "uutils" project. They plan to introduce new changes in Ubuntu Linux 25.10, eventually changing it to Ubuntu version 26.04 LTS release in 2026 as Ubuntu is testing Rust 'uutils' to overhaul its core utilities potentially. Let us find out the pros and cons and what this means for you as an Ubuntu Linux user, IT pro, or developer. Love this? sudo share_on: Twitter -

How to install KSH on FreeBSD

3 March 2025 @ 11:50 pm

See all FreeBSD related FAQ Installing KSH (KornShell) on FreeBSD can be done with either FreeBSD ports or the pkg command. The ports collection will download the KSH source code, compile it, and install it on the system. The pkg method is easier, and it will download a pre-compiled binary package. Hence, it is recommended for all users. KornShell (KSH) has a long history, and many older Unix systems and scripts rely on it. As a result, KSH remains relevant for maintaining and supporting legacy infrastructure. Large enterprises, especially those with established Unix-based systems, continue to use KSH for scripting and system administration tasks. Some industries where KS

Linux Sed Tutorial: Learn Text Editing with Syntax & Examples

3 March 2025 @ 9:47 am

See all GNU/Linux related FAQ Sed is an acronym for "stream editor." A stream refers to a source or destination for bytes. In other words, sed can read its input from standard input (stdin), apply the specified edits to the stream, and automatically output the results to standard output (stdout). Sed syntax allows an input file to be specified on the command line. However, the syntax does not directly support output file specification; this can be achieved through output redirection or editing files in place while making a backup of the original copy optionally. Sed is one of the most powerful tools on Linux and Unix-like systems. Learning it is worthwhile, so in t

How to tell if FreeBSD needs a Reboot using kernel version check

23 February 2025 @ 10:07 pm

See all FreeBSD related FAQ Keeping your FreeBSD server or workstation updated is crucial for security and stability. However, after applying updates, especially kernel updates, you might wonder, "Do I need to reboot my system?" Let's simplify this process and provide a straightforward method for determining whether a reboot is necessary using the CLI, shell script, and ansible playbook. Love this? sudo share_on: Twitter

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The source server does not appear to be a Plesk server” “Plesk Migrator tool requires original ‘root’ user access or root user with GUI/UID = 0.” [read more...]

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The source server does not appear to be a Plesk server” “Plesk Migrator tool requires original ‘root’ user access or root user with GUI/UID = 0.” [read more...]

Are your website fonts sending the right message?

3 February 2025 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand?

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some of our most popular products to get the tools you need at a fraction of the cost. What’s on Offer? Here’s what you can save [read more...]

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load, visitors are likely to abandon it faster than you can say “bounce rate.” But fear not! Here are some tips to help you optimise your [read more...]

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet.

10 of the best WooCommerce plugins

27 October 2022 @ 10:53 am

Including options for optimising your cart, boosting customer loyalty, and selling tickets.

9 creative alternatives to .com and .co.uk domains

5 October 2022 @ 2:37 pm

Discover the appeal of .ninja, .coffee, .guru and more - all available in our domain name sale.

Save up to 43% on WordPress Hosting in our latest sale

20 September 2022 @ 3:23 pm

We’ve just slashed the price of WordPress Hosting at Heart Internet.

What to do once you’ve bought a domain

7 September 2022 @ 12:48 pm

A guide to what to do next once you've chosen your perfect domain name.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Administrative lockdown

29 April 2025 @ 11:48 pm

I am looking for a gentleman that answers questions, he answered a question about changing the admin in powershell? He has a profile on this site. He spoke about disabling the UAC.

Connect two of my offices via VPN tunnel automatically over WiFi

29 April 2025 @ 11:19 pm

I have a home office in Los Angeles, and a home office in Miami. The majority of my technology resources are in Los Angeles. I'm very often finding myself in my home office in Miami. I have a Raspberry Pi in each location and I want to think I'm technically savvy enough to figure this out but needed advice on the roadmap. Here's my wish. I'd like to create a VPN tunnel between my to Pis (the one in Los Angeles and the one in Miami). However, I'd like to make the Miami Pi so that it broadcasts a WiFi network so that when I or my guests connect to this WiFi network, all the traffic is routed to my network in Los Angeles so that we have access to my networked resources (plotting printer, network shares, other printers, etc) there. What might be the recipe book for doing this? I know I can do a B2B VPN but how might I enable the "automatic VPN through WiFi" feature I'm looking for?

Setting up traffic routing for Linux

29 April 2025 @ 3:20 pm

I can't solve the problem with traffic routing on Linux on this system: root@fl-imx6ull:~# uname -a Linux fl-imx6ull 4.1.15 #1 SMP PREEMPT Tue Apr 8 08:26:30 MSK 2025 armv7l armv7l armv7l GNU/Linux root@fl-imx6ull:~# I have two connections. One is implemented via ppp (connected modem SIMCOM A7682E with SIM card), the other via Ethernet. root@fl-imx6ull:~# ip route default dev eth0 scope link default via 192.168.3.1 dev eth0 default dev ppp0 scope link 10.64.64.64 dev ppp0 proto kernel scope link src 10.184.51.81 169.254.0.0/16 dev eth0 proto kernel scope link src 169.254.220.182 192.168.3.0/24 dev eth0 proto kernel scope link src 192.168.3.200 root@fl-imx6ull:~# Ethernet is designed to work in a local network with other devices (all in the 192.168.3.0/24 subnet) ppp in turn is designed to access the external Internet network (i.e. have priority for all requests except 192.168.3.0/24) Now it works for me as fo

Read access denied on System Volume Information directory for web deploy - running as administrator

29 April 2025 @ 3:17 pm

I am getting the following error when trying to export a server package with web deploy: Unable to perform the operation ("Read File") for the specified directory ("O:\System Volume Information{34i6uh346-6i34h-643hoi463-6oiuh}{6346n346-6346n6-43643n-63463463joij}" The error code was 0x80070005. Access to the path ... is denied This drive is where I am hosting an FTP server. Manually navigating to that folder does not work, and it is not actually listed in the server directory. I am using an administrator account and running IIS Manager as admin. How can I get around this error?

How to unwrap tcpdump PCAP by piping it and forwarding the raw packet data?

29 April 2025 @ 2:50 pm

I have a bind9 DNS server running, and I have it blocking ads through a block list for the whole network. I want to log the blocking, so I tried to listen to the UDP port. I used tcpdump and forwarded it with netcap, but it was packaged in a pcap format, which can't be read by the logging server I made since it only recognizes raw DNS request packets. Is there any command line tool where I can pipe the tcpdump in between the netcap, which unwraps the packet from the pcap format? This is the command I used: tcpdump -i $INTERFACE -U -s0 -w - "udp port 53" | nc -u $LOG_SERVER $LOG_PORT I'm trying to find an elegant solution here, and I can't believe no one has made a command-line tool for this kind of purpose yet. If there's no luck, I will be forced to write the pcap packets to files, then read them with the Java library I'm using because it doesn't support directly reading pcap data.

Disable EFS encryption for every Active Directory User via Group Policy

29 April 2025 @ 12:29 pm

is there a way to prevent active directory users to encrypt files? I made a group policy following this guide: https://www.top-password.com/blog/disable-efs-encrypting-file-system-in-windows/ but it refers only to the machine's settings, I would like to do that for the user and not for the machine. Thanks a lot!!!

RHEL-9 Apache (httpd) and ZeroMQ SELinux blocking communication

29 April 2025 @ 12:04 pm

i have a problem with selinux enabled (set to enforcing) on our new RHEL-9 machine. We use there apache webserver (httpd) and ZeroMQ. In our custom apache *.conf file we load a module for ZeroMQ. With selinux enabled (enforcing) the communication will not work, because selinux seems to block loading the module or the communication. In our custom apache config there is the following configuration: LoadModule redirect_module $(PROG_MESSAGEQUEUE)/libmod_redirect.so <Location "/auth"> RequestHeader set X-Forwarded-Proto "https" RequestHeader set X-Forwarded-Port "443" RequestHeader set X-Forwarded-Host "$(HOST_ADDRESS)" ZMQRedirectAddress tcp://127.0.0.1:2417 </Location> So the ZeroMQ MessageQueue runs on the same system and service is running. A look inside the apache error_log shows that there seems to be a problem with our loaded module libmod_redirec

redhat + NICs are stop functioning from time to time

29 April 2025 @ 11:12 am

We have a cluster with Huawei machines running RHEL 7.9. and mellanox network cards From time to time, we notice that the NICs on these servers stop functioning, and the only way to resolve the issue is by physically re-seating the card. (Before re-seating, we power off the machine and then power it back on.) or init 0 linux machine , unplug machine from power, wait couple seconds, plug back and power on We don't understand the root cause, but the network driver details are as follows: driver: mlx5_core driverversion: 5.0-0 What is the best approach to address this issue? Could it be that Red Hat has resolved this problem with a newer patch? when the issue is happened (NIC became down) , we can see from the console the following exceptions mlx5_core 0000:82:00.1: cmd_work_handler:856:(pid 48980): failed to allocate command entry mlx5_core 0000:82:00.1 enp130s0f1: mlx5e_open_locked failed

gcloud CLI: Permission denied moving project between organizations

29 April 2025 @ 10:11 am

I’m trying to move a Google Cloud project from our org (Org ID: ORG_ID_1) into the client’s org (Org ID: ORG_ID_2) with: gcloud beta projects move PROJECT_ID --organization=ORG_ID_2 but I immediately get: ERROR: (gcloud.beta.projects.move) [USER_EMAIL] does not have permission to access projects instance [PROJECT_ID] (or it may not exist): The caller does not have permission. This command is authenticated as USER_EMAIL which is the active account specified by the [core/account] property I then tried read-only check to confirm I truly can’t even see the project: gcloud projects describe PROJECT_ID But it works, I can see it. At project level I have: roles/editor roles/owner roles/resourcemanager.projectMover On my organization export is allowed to client’s org constraints/resourcemanager.allowedExportDestinations = under:organiz

redhat + how to revert TCP BBR congestion changes

29 April 2025 @ 10:09 am

We have configured the BBR settings on all our RHEL 8.6 machines as follows: (according to Red Hat's documentation [https://access.redhat.com/solutions/3713681]). The goal is to assess whether the BBR configuration provides any network improvements. If not, we plan to revert to the default Cubic settings sysctl -w net.ipv4.tcp_congestion_control=bbr echo "net.ipv4.tcp_congestion_control = bbr" >> /etc/sysctl.conf modprobe tcp_bbr in order to revert the changes I wrote the following steps sysctl -w net.ipv4.tcp_congestion_control=cubic delete from /etc/sysctl.conf the line with net.ipv4.tcp_congestion_control = bbr but I am not sure how to revert the changes about modprobe tcp_bbr do we need just do: modprobe tcp_cubic or rmmod tcp_bbr rmmod: ERROR: Module tcp_bbr is in use or else ?

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10