explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

AWS Deadline Cloud now supports direct job submission from the Deadline Cloud Monitor

22 December 2025 @ 10:00 pm

AWS Deadline Cloud now lets you submit rendering jobs directly from the Deadline Cloud Monitor desktop application. This new feature makes it easier to submit renders for applications that don’t have built-in Deadline Cloud plugins or submission scripts, expanding compatibility with content creation tools and streamlining your rendering workflows. Previously, you needed the command line interface (CLI) to submit job bundles. With this update, you can submit job bundles directly from Deadline Cloud Monitor desktop interface, managing jobs from start to finish in one place. It is particularly useful for legacy applications, specialized rendering tools, or custom workflows that lack built-in Deadline Cloud integration. To access direct job submission, download the latest Deadline Cloud Monitor desktop application (version 1.1.7) in the AWS Console. To learn more a

Oracle Database@AWS now supports sharing of AWS Marketplace entitlements across accounts

22 December 2025 @ 6:00 pm

Today, Oracle Database@AWS announced ability to share AWS Marketplace entitlements across accounts within an AWS Organization. With this feature, customers can now accept an Oracle Database@AWS AWS Marketplace offer in one AWS account, and share that entitlement with additional accounts in their AWS Organization. This allows customers to consume Oracle Database@AWS services from multiple AWS accounts using a single AWS Marketplace entitlement purchased for their organization. Many Oracle Database@AWS customers use separate AWS accounts for their development and production environments, and for different business units within their organization. Customers want a single buyer agreement to use Oracle Database@AWS within their organization, and use the purchased AWS Marketplace entitlement across multiple business units, and across their development and production environments. With

Amazon Kinesis Video Streams now supports IPv6 for WebRTC

22 December 2025 @ 6:00 pm

Amazon Kinesis Video Streams (Amazon KVS) now supports Internet Protocol version 6 (IPv6) addressing for WebRTC. This release introduces dual-stack endpoint support, enabling developers to use both IPv4 and IPv6 addresses to stream video from millions of devices. The dual-stack support is designed to ensure that existing IPv4 implementations continue to work reliably while gaining IPv6 connectivity benefits. Moreover, the update simplifies transition to IPv6 addresses while eliminating the need for address translation equipment. This feature is available in all commercial AWS Regions where Amazon KVS is offered, except Asia Pacific (Singapore) and China (Beijing, operated by Sinnet). For implementation details, refer to the Amazon KVS Develo

Amazon ECS Service Connect enhances observability with Envoy Access Logs

22 December 2025 @ 6:00 pm

Amazon Elastic Container Service (Amazon ECS) Service Connect now supports Envoy access logs, providing deeper observability into request-level traffic patterns and service interactions. This new capability captures detailed per-request telemetry for end-to-end tracing, debugging, and compliance monitoring. Amazon ECS Service Connect makes it simple to build secure, resilient service-to-service communication across clusters, VPCs, and AWS accounts. It integrates service discovery and service mesh capabilities by automatically injecting AWS-managed Envoy proxies as sidecars that handle traffic routing, load balancing, and inter-service connectivity. Envoy Access logs capture detailed traffic metadata enabling request-level visibility into service communication patterns. This enables you to perform network diagnostics, troubleshoot issues efficiently, and maintain audit trails for compliance requirements. You

Amazon GameLift Streams launches Gen6-based stream classes and enhanced autoscaling for better performance and pricing

22 December 2025 @ 5:00 pm

Today, Amazon GameLift Streams launched two new capabilities to optimize performance and cost: Gen6 stream classes and enhanced autoscaling with warm buffer. The new Gen6 stream classes provide a wider range of price performance options, while autoscaling enables customers to dynamically manage capacity scaling.  The seven new Gen6 stream classes available today are based on EC2 G6 instances powered by NVIDIA L4 Tensor Core GPUs, which provide up to 2x higher performance over Gen4 stream classes. The pro and ultra stream class deliver improved performance for graphics-intensive AAA games, while the medium and small stream class offer cost-efficient options for casual games. The gen6n_small stream class is available at $0.16/hour in us-east-2.  The enhanced autoscaling capabilities provide automatic capacity management that scales provisioned capacity dynamical

Amazon GameLift Streams launches real-time performance stats and improved API error messaging

22 December 2025 @ 5:00 pm

Today, Amazon GameLift Streams launched new powerful observability capabilities with session performance stats that provide real-time data for individual stream sessions, offering insights into application performance issues. Game developers requested deeper visibility into session performance and resource utilization. The new stats we're delivering today help developers understand how their applications perform on specific stream classes and GPUs, giving them the data to make optimal GPU selections, optimize performance, and troubleshoot individual user experiences. Developers can now access detailed data on CPU, memory, GPU, and VRAM usage for active sessions through the GameLift Streams Web SDK, or view them in the AWS console's built-in overlay on the "Test stream" page. These performance stats can also be exported to a file for post-session analysis. GameLift Streams also launched improved session status reasons and error messaging. Game developers now have deep

AWS Storage Gateway now supports Nutanix AHV hypervisor

22 December 2025 @ 3:00 pm

The AWS Storage Gateway service now supports the Nutanix AHV hypervisor as a deployment option for S3 File, Tape and Volume gateways. If you use Nutanix AHV hypervisor-based on-premises infrastructure, you can now deploy Storage Gateway in your environment to access virtually unlimited cloud storage.
 Nutanix AHV (Acropolis Hypervisor) is a KVM-based virtualization platform that is integrated into the Nutanix hyper-converged infrastructure (HCI) solution. With this launch, you have the option to deploy Storage Gateway on a Nutanix AHV hypervisor.
 Storage Gateway is a hybrid cloud storage service that provides on-premises applications access to virtually unlimited cloud storage using NFS, SMB, iSCSI, and iSCSI-VTL interfaces. You can use the service to backup and archive data to AWS, shift on-premises storage to cloud-backed file shares, and provide on-premises applications low-latency access to

Research and Engineering Studio on AWS Version 2025.12 now available

22 December 2025 @ 3:00 pm

Today we announce Research and Engineering Studio (RES) on AWS version 2025.12, which introduces tag propagation for CloudFormation resources, enhanced Windows domain configuration options, default session scheduling, and security improvements. Research and Engineering Studio on AWS is an open source solution that provides a web-based portal for administrators to create and manage secure cloud-based research and engineering environments. RES enables scientists and engineers to access powerful Windows and Linux virtual desktops with pre-installed applications and shared resources, without requiring cloud expertise. Tags applied to the CloudFormation stack now propagate to all resources created during RES deployment, making it easier to track costs and manage resources across your organization. Administrators can disable automatic Windows domain joining for hosts, providing flexibility to implement custom domain-join logic when needed. You can now set a default sched

AWS Wickr launches admin APIs for programmatic network management at scale

22 December 2025 @ 8:00 am

AWS Wickr now provides a suite of admin APIs that empower administrators to programmatically manage secure communication networks at scale. These APIs enable you to automate critical administrative workflows including user lifecycle management, network configuration, and security group administration. With user lifecycle management APIs, you can automatically create users and assign security groups when employees join, or deactivate accounts when they leave. Network configuration APIs allow you to quickly create or delete networks on demand as your organization scales or restructures, and push standardized retention and federation policies across departments. Security group administration APIs enable automatic user placement based on directory attributes such as job function or clearance level. By connecting Wickr administration directly into your identity management systems, policy management frameworks, and automation pipelines, you can now manage secure communications infrastruct

Announcing AWS Neuron SDK 2.27.0

22 December 2025 @ 8:00 am

Today, AWS announces Neuron SDK 2.27.0, introducing support for Trainium3 UltraServer with expanded open source components. Neuron also introduces the Neuron Explorer tools suite, Enhanced NKI with open source NKI Compiler built on MLIR (private beta), the NKI Library of optimized kernels, native PyTorch support through TorchNeuron (private beta), and Neuron DRA for Kubernetes-native resource management (private beta). These updates enable standard frameworks to run unchanged on Trainium, removing barriers for researchers to experiment and innovate. For developers requiring deeper control, the enhanced Neuron Kernel Interface (NKI) Beta 2 provides direct access to hardware-level optimizations, enabling customers to scale AI workloads with improved performance. If you're interested in early access to new NKI features and improvements, you can join the Neuron pri

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Data center investments break all records

22 December 2025 @ 4:33 pm

New data centers are being built around the world in connection with AI initiatives. According to a compilation by S&P Global, spending will reach a record $61 billion in 2025, with the US and Canada accounting for the vast majority. Europe, on the other hand, accounts for only a small fraction of spending on data center construction. “In Europe, the buildout of data centers is expected to grow at a lower rate than other regions,” S&P Global Market Intelligence analyst Iuri Struta told

Top 5 enterprise tech priorities for 2026

22 December 2025 @ 10:00 am

It’s the season for “looking ahead to next year” articles that tell some group or another what they should be doing or what some “expert” says they should do. Let’s take a different slant and focus on what one group— arguably the most important tech buyer group — actually says they’re going to do. I’ve collected 284 comments on tech priorities for 2026 from enterprises, and here are the top five. 1. AI optimization and uncertainty Let’s start with a priority that embraces two unsurprising sentiments. The first is that the top priority, cited by 211 of the enterprises, is to

WatchGuard fixes ‘critical’ zero-day allowing firewall takeover

19 December 2025 @ 5:48 pm

WatchGuard has issued an urgent patch alert for its Firebox firewall appliances after discovering a critical-rated vulnerability that is under exploit by threat actors. Tracked as CVE-2025-14733, with a CVSS score of 9.3, the flaw is an Out-of-bounds Write vulnerability affecting the iked process, a WatchGuard Fireware OS component responsible for the IKEv2 key exchange in IPSec VPNs. According to the WatchGuard advisory, this weakness could “allow a remot

Attackers bring their own passwords to Cisco and Palo Alto VPNs

19 December 2025 @ 3:28 pm

Security researchers have flagged a coordinated credential-based campaign targeting VPN authentication endpoints from Cisco and Palo Alto Networks. Over just two days in mid-December, attackers launched large-scale automated login attempts against Cisco’s SSL VPN and Palo Alto Networks’ GlobalProtect services. A GreyNoise analysis noted that the campaign does not exploit software bugs, but instead relies on churning through username and password combos at scale.“Consistent infrastructure usage and timing indicate a single campaign pivoting across multiple VPN platforms,” the researchers said in a blog post. GreyNoise confirmed millions of login sessions acros

Cisco: Latest news and insights

19 December 2025 @ 3:25 pm

Cisco (Nasdaq:CSCO) is the dominant vendor in enterprise networking, and under CEO Chuck Robbins, it continues to shake things up.  Cisco is focusing on strategic AI initiatives and partnerships across various regions to build and power AI data centers and ecosystems. This includes collaborations with major players like BlackRock, Global Infrastructure Partners, Microsoft and Nvidia to drive investment and scale AI infrastructure. The networking giant continue

Snowflake software update caused 13-hour outage across 10 regions

19 December 2025 @ 2:40 pm

A software update knocked out Snowflake’s cloud data platform in 10 of its 23 global regions for 13 hours on December 16, leaving customers unable to execute queries or ingest data. Customers saw “SQL execution internal error” messages when trying to query their data warehouses, according to Snowflake’s incident report. The outage also disrupted Snowpipe and Snowpipe Streaming file ingestion, and data clustering appeared unhealthy. “Our initial investigation has identified that our most recent release introduced a backwards-incompatible database schema update,�

HPE OneView vulnerable to remote code execution attack

19 December 2025 @ 1:53 am

A maximum severity remote code execution vulnerability in Hewlett Packard Enterprise (HPE) OneView network and systems management suite is “bad” and needs to be patched immediately, says a cybersecurity expert. “Vendors typically downplay the severity of a vulnerability,” says Curtis Dukes, executive VP for security best practices at the Center for Internet Security, “but HPE did not – it’s a 10.” The vulnerability is remotely executable by an unauthenticated user, he added, and it impacts every recent version of the suite. On top of that, he pointed out, OneView

Networking terms and definitions

18 December 2025 @ 6:21 pm

To find a brief definition of the networking term you are looking for user your browser’s “Find” feature then follow links to a fuller explanation. Abstraction interface (SAI) An abstraction interface (SAI) is an API designed to allow network software (such as an operating system) to control the hardware of a network switch. Traditionally, if you bought a switch from a specific vendor, you had to use its software to run it. If you wanted to switch hardware, you had to redo management system. SAI c

Breaking the ransomware kill chain: Why distributed lateral security is no longer optional

18 December 2025 @ 5:59 pm

Ransomware attacks in 2025 have caused business operations to cease for weeks and months at a time, resulting in massive financial losses in organizations around the globe in sectors such as retail, manufacturing, and healthcare. These major breaches go well beyond the purview of the security team alone. They demand boardroom attention and a fundamental rethinking of enterprise defense strategies. Much of the urgency stems from how artificial intelligence (AI) has rapidly transformed the threat landscape. AI-powered autonomous attacks now probe enterprise networks with minimal human intervention, discovering thousands of potential entry points where human attackers might find

Cisco confirms zero-day exploitation of Secure Email products

18 December 2025 @ 11:02 am

Cisco has warned that a China-linked hacking group is actively exploiting a previously unknown vulnerability in its Secure Email appliances to gain persistent access, forcing affected organizations to consider disruptive rebuilds of critical security infrastructure while patches remain unavailable. Cisco Talos said the campaign has been active since at least late November, raising concerns for security leaders about unseen compromise and how far incident response efforts may need to extend beyond the affected devices. The vulnerability affects Cisco Secure Email Gateway, C

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Download of the day: GIMP 3.0 is FINALLY Here!

18 March 2025 @ 3:45 am

Wow! After years of hard work and countless commits, we have finally reached a huge milestone: GIMP 3.0 is officially released! I am excited as I write this and can't wait to share some incredible new features and improvements in this release. GIMP 2.10 was released in 2018, and the first development version of GIMP 3.0 came out in 2020. GIMP 3.0 released on 16/March/2025. Let us explore how to download and install GIMP 3.0, as well as the new features in this version. Love this? sudo share_on: Twitter - Facebook -

How to list upgradeable packages on FreeBSD using pkg

16 March 2025 @ 8:25 pm

See all FreeBSD related FAQ Here is a quick list of all upgradeable packages on FreeBSD using pkg command. This is equivalent to apt list --upgradable command on my Debian or Ubuntu Linux system. Love this? sudo share_on: Twitter -

Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement

16 March 2025 @ 12:17 pm

In a move that has sparked significant discussion within the Ubuntu Linux fan-base and community, Canonical, the company behind Ubuntu, has announced its intention to explore the potential replacement of GNU Core Utilities with the Rust-based "uutils" project. They plan to introduce new changes in Ubuntu Linux 25.10, eventually changing it to Ubuntu version 26.04 LTS release in 2026 as Ubuntu is testing Rust 'uutils' to overhaul its core utilities potentially. Let us find out the pros and cons and what this means for you as an Ubuntu Linux user, IT pro, or developer. Love this? sudo share_on: Twitter -

How to install KSH on FreeBSD

3 March 2025 @ 11:50 pm

See all FreeBSD related FAQ Installing KSH (KornShell) on FreeBSD can be done with either FreeBSD ports or the pkg command. The ports collection will download the KSH source code, compile it, and install it on the system. The pkg method is easier, and it will download a pre-compiled binary package. Hence, it is recommended for all users. KornShell (KSH) has a long history, and many older Unix systems and scripts rely on it. As a result, KSH remains relevant for maintaining and supporting legacy infrastructure. Large enterprises, especially those with established Unix-based systems, continue to use KSH for scripting and system administration tasks. Some industries where KS

Linux Sed Tutorial: Learn Text Editing with Syntax & Examples

3 March 2025 @ 9:47 am

See all GNU/Linux related FAQ Sed is an acronym for "stream editor." A stream refers to a source or destination for bytes. In other words, sed can read its input from standard input (stdin), apply the specified edits to the stream, and automatically output the results to standard output (stdout). Sed syntax allows an input file to be specified on the command line. However, the syntax does not directly support output file specification; this can be achieved through output redirection or editing files in place while making a backup of the original copy optionally. Sed is one of the most powerful tools on Linux and Unix-like systems. Learning it is worthwhile, so in t

How to tell if FreeBSD needs a Reboot using kernel version check

23 February 2025 @ 10:07 pm

See all FreeBSD related FAQ Keeping your FreeBSD server or workstation updated is crucial for security and stability. However, after applying updates, especially kernel updates, you might wonder, "Do I need to reboot my system?" Let's simplify this process and provide a straightforward method for determining whether a reboot is necessary using the CLI, shell script, and ansible playbook. Love this? sudo share_on: Twitter

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure.... The post How to Choose the Perfect Domain Name for Your Business appeared first on Heart Internet.

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet. The post What is a VPS? And is it Time You Got One? appeared first on Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being... The post We’re Now Certified by the Green Web Foundation appeared first on Heart Internet.

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business... The post What is Web Hosting and Why Does Your Business Need It? appeared first on Heart Internet.

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access via SSH on Your VPS for Migration using Plesk appeared first on Heart Internet.

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access on Your VPS Server Using Plesk appeared first on Heart Internet.

Are your website fonts sending the right message?

3 February 2025 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand? The post Are your website fonts sending the right message? appeared first on Heart Internet.

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some... The post Black Friday at Heart Internet appeared first on Heart Internet.

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load,... The post 13 Easy Ways to Optimise Your Website for Speed and Performance appeared first on Heart Internet.

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet. The post Black Friday and Cyber Monday sale now on at Heart Internet appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Postfix: multiple different sender_relay_restrictions

22 December 2025 @ 8:09 pm

I am looking to restrict which client can send mail to which domain (i.e., use my postfix server as a relay), and am struggling to figure it out. This needs to work on multiple OS and postfix versions (all modern, 3.5 or higher, on EL8 and Ubuntu 22.04 or later). My clients are identified by either host name (or corresponding IP address, of course), or by subdomain. Here is, simplified, what I'd like to accomplish: host1.example.com 192.168.10.5 host2.example.com 172.18.5.18 192.168.12.0/24 --> can send emails anywhere. host3.example.com 192.168.10.6 host4.example.com 172.18.5.19 *.printers.example.com --> can send emails only to @example.com Bonus (I can live without this for now, but anticipate a future need): host5.example.com 192.168.10.7 host6.example.com 172.18.5.20 --> can send emails only to @example.net Anything not listed --> cannot use this server to relay em

DDoS from almost all internet IP range

22 December 2025 @ 6:53 pm

I'm having a high volume of traffic blocking my apache web server due reaching of MaxRequest of the MPM. In access log I found an huge numbers of request 90% of that are unique IPs from 34.0.0.0 to 223.255.255.255. Each request is received from an IP of each subnet from that range. I tried to find a logic, an user agent or something other to trigger a fail2ban filter, but without success. I can't block all the IP ranges because also legit IP are inside this big range. Any suggestion on how to handle this type of attack ?

Anyone know why libvirt-lxc command lxc-enter-namespace works bad?

22 December 2025 @ 4:53 pm

The command lxc-enter-namespace don't work Distribution: Debian 13 Type of container: unprivileged (same error if run privileged) Run with: libvirt As root virsh -c lxc:///system lxc-enter-namespace node3 --noseclabel --cmd ls libvirt: Cgroup error : Unable to write to '/sys/fs/cgroup/machine.slice/machine-lxc\x2d84518\x2dnode3.scope/cgroup.procs': Device or resource busy error: internal error: Child process (310154) unexpected exit status 125 As unprivileged user (same who run container) virsh -c lxc:///system lxc-enter-namespace node3 --noseclabel --cmd ls libvirt: Cgroup error : Unable to write to '/sys/fs/cgroup/machine.slice/machine-lxc\x2d84518\x2dnode3.scope/cgroup.procs': Permission denied error: internal error: Child process (310299) unexpected exit status 125 Any idea about those errors?

Technical differences between type1/2 hypervisors in the way trap-and-emulate work [closed]

22 December 2025 @ 4:40 pm

I know the commonly used type1 vs type2 definition, and I also know that this definition is not clear-cut, and that the relevance of that definition is disputed by some. Still, I have some technical questions with the actual differences on how the inner works (mostly about the trap-and-emulate mechanism) between the most common definition of "hosted" and "baremetal" hypervisors: From my experience, the most common definition is something that sounds like this: List item Type 1 "interacts directly with the hardware" (whatever it means) "manages the hardware directly" Type 2 negotiates with the OS to obtain the underlying resources. Let's not consider hardware-assisted virtualization for this question. Both type 1 and type 2 run unprivileged instructions of the guests OS on the CPU without any form of emulation in-between¹. In both cases, Guests aren't run

What’s the best NGINX “redirect” solution from the following options?

22 December 2025 @ 4:36 pm

NGINX doesn’t do Apache-style redirects. We want to replace these three URL queries "/grid/grid.html", "grid/grid.html", "grid.html" with just "/grid/". We have separate domain-specific config files inside "/etc/nginx/sites-available", and use CertBot for SSL. The RegEx in the examples below captures all the URL variations listed above. But which of these two is best practice: a location block inside the existing server block: server { ... location ~ ^(((/?)grid/)?grid.html) { return 301 $scheme://grid/; # OR https://grid/; } ... } add a rewrite block inside the existing server block, using the site root: server { ... rewrite ^(((/?)grid/)?grid.html) /grid/ last; return 403; ... } When updating the cert, Certbot writes to the existing

Limiting connection to Docker with whitelist on iptables

22 December 2025 @ 10:09 am

I'm trying to limit the access of IPs to my Docker service with iptables. Let's say my public IP is 1.2.3.4 and the range of IPs that I want to allow is 5.6.7.224/28. I don't want any other range accessing the service. My hostname is hello.com DOCKER-USER iptables: sudo iptables -L DOCKER-USER --line-numbers Chain DOCKER-USER (1 references) num target prot opt source destination 1 ACCEPT tcp -- hello.com/28 anywhere tcp dpt:8008 2 DROP tcp -- anywhere anywhere tcp dpt:8008 Docker container info 758e3dac5b23 vshiny "shiny run --host 0.…" 3 days ago Up 3 days 8008/tcp, 1.2.3.4:8008->8000/tcp This configuration prevents any IP from being allowed to enter the service, even the ones which are in the range I specified to be allowed (5.6.7.224/28

Parsec setup for remote access to Mac Studio and Windows PC from a silent client - Questions about free tier and performance

22 December 2025 @ 1:41 am

I'm planning to move my work machines (a Mac Studio and a Windows PC) from my studio to a rack room to reduce noise in my workspace. The idea is to use a silent client (fanless or similar) next to the monitor, speakers, keyboard, and mouse, and access the machines via remote desktop software. I'm considering Parsec and have some specific questions, especially about the free version: For daily intensive use with AutoCAD, is the free version sufficient or is the paid license required? I'd like to avoid software that behaves like some programs (e.g., Supremo Control) which stop working after a trial period. With two monitors connected to the host PC, does the free version block access or simply not project one of the displays? Same question for a MacBook Air M1 (2020) with an additional external monitor. Is it true that the free version limits color depth, making professional Photoshop work difficult? With a graphics tablet sensitive to pr

problems with openssh sftp chroot folder

21 December 2025 @ 4:25 pm

i am currently working on ubuntu 22.04 with openSSH, i made SFTP server for users so they can connect to their projects/bots/servers etc. So far, most things are working as they should, but i have a problem with one thing. My path is looking like this .../bots/botX/data. When i logged in my SFTP using FileZilla, on this tree with all layers of folders i see / is my main folder, like home, but i cant create anything there. folder botX is CHROOT, and thats why i cant do anything there, and only folder data is assigned for user. I'm sorry for writing this way, but its hard for me to describe it. So when i get into this SFTP server as user, in this tree i see /, and under / i see folder Data, and its the only way it works, in / i cannot create anything, in Data i can, when i assign BotX for CHROOT and user, SFTP doesnt start. Sorry, now lets get to the question. I saw on

How to best protect against bit rot on a frequently powered-on SSD? [migrated]

21 December 2025 @ 3:56 pm

I am running a Linux system that is frequently powered-on with a single SSD disk. I would like to protect both the system and the data on this disk from bit rot without resorting to Btrfs, which doesn't seem to be stable enough, or out-of-tree filesystems like ZFS (OpenZFS). My first question here is whether additional measures are even required, given that all modern SSDs seem to have ECC and powering them on for a sufficient amount of time frequently enough allows the controller to do maintenance and bit rot prevention. So far my best idea is to make use of LVM RAID5 with integrity, and create a logical volume with relatively high amount of stripes (10-15) and allocation option that would allow the stripes to be on the same physical volume: lvcreate --type raid5 --raindintegrity y -i $N_STRIPES --alloc anywhere ... The way I understand this configuration is that the integrity layer provided by dm-integrity and managed by LVM will raise

NTFS volume on Windows 10 is not journaling changed ranges

21 December 2025 @ 3:32 pm

The setup - Windows 10 LTSC 2022, the system in on the C: drive with NTFS journal enabled and 'write range tracking' disabled. Enabled write tracking via fstuil usn enablerangetracking c: Confirmed that it was enabled with fsutil usn queryjournal c:, the Chunk size is 16K and the file size threshold is 1M. Noted the Start Usn value from the above command. Ran echo 123 >> C:\Temp\file, where file is ~11MB in size. Listed records with fsutil usn readjournal c: startusn=... using Start Usn from above. ... and: There were no V4 records for the file, only V3 ones ! There were however V4 records for other files, e.g. some internal Windows logs. There clearly should've been a V4 like this : Usn : 5356784 Reason

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10