explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon ECS now supports custom container stop signals on AWS Fargate

10 December 2025 @ 8:48 pm

Amazon Elastic Container Service (Amazon ECS) now supports custom container stop signals for Linux tasks running on AWS Fargate, honoring the stop signal configured in Open Container Initiative (OCI) images when tasks are stopped. The enhancement improves graceful shutdown behavior by aligning Fargate task termination with each container’s preferred termination signal. Previously, when an Amazon ECS task running on AWS Fargate was stopped, each Linux container always received SIGTERM followed by SIGKILL after the configured timeout. With the new behavior, the Amazon ECS container agent reads the stop signal from the container image configuration and sends that signal when stopping the task. Containers that rely on signals such as SIGQUIT or SIGINT for graceful shutdown can now run on Fargate with their intended termination semantics. If no STOPSIGNAL is configured, Amazon ECS continues to send SIGTERM by default. Customer

Now generally available: Amazon EC2 C8gb instances

10 December 2025 @ 6:00 pm

Today, AWS announces the general availability of the new Amazon Elastic Block Storage (Amazon EBS) optimized Amazon Elastic Compute Cloud (Amazon EC2) C8gb instances. These instances are powered by AWS Graviton4 processors to deliver up to 30% better compute performance than AWS Graviton3 processors. At up to 150 Gbps of EBS bandwidth, these instances offer higher EBS performance compared to same-sized equivalent Graviton4-based instances. Take advantage of the higher block storage performance offered by these new EBS optimized EC2 instances to scale the performance and throughput of workloads such as high-performance file systems, while optimizing the cost of running your workloads. For increased scalability, these instances offer instance sizes up to 24xlarge, including a metal-24xl size, up to 192 GiB of memory, up to 150 Gbps of EBS bandwidth, up to 200 Gbps of networking bandwidth. These instances support Elastic Fabric Adapter (EFA) networking on the 16xlarge, 24xlarge

Amazon EC2 X8g instances now available in Asia Pacific (Sydney) region

10 December 2025 @ 4:00 pm

Starting today, Amazon Elastic Compute Cloud (Amazon EC2) X8g instances are available in Asia Pacific (Sydney) region. These instances are powered by AWS Graviton4 processors and deliver up to 60% better performance than AWS Graviton2-based Amazon EC2 X2gd instances. X8g instances offer up to 3 TiB of total memory and increased memory per vCPU compared to other Graviton4-based instance. They have the best price performance among EC2 X-series instances, and are ideal for memory-intensive workloads such as electronic design automation (EDA) workloads, in-memory databases (Redis, Memcached), relational databases (MySQL, PostgreSQL), real-time big data analytics, real-time caching servers, and memory-intensive containerized applications. X8g instances offer larger instance sizes with up to 3x more vCPU (up to 48xlarge) and memory (up to 3TiB) than Graviton2-based X2gd instances. They offer up to 50 Gbps enhanced networking bandwidth and up to 40 Gbps of bandwidth to the Amazon

Amazon ElastiCache Serverless now supports same-slot WATCH command

10 December 2025 @ 3:00 pm

Today, we are announcing that Amazon ElastiCache Serverless now supports the WATCH command for same-slot transactions, helping developers build more reliable applications with improved data consistency in high-concurrency scenarios. With this launch, the WATCH command makes transactions conditional, ensuring they execute only when monitored keys remain unchanged. For ElastiCache Serverless, the WATCH command works with transactions that operate on keys within the same hash slot as the watched keys. When applications attempt to watch keys that are not in the same hash slot, they'll receive a CROSSSLOT error. Developers can control key placement by using hash tags in their key names to ensure keys hash to the same slot. The transaction will also be aborted when ElastiCache Serverless cannot guarantee the state of watched keys. WATCH command support is available in all AWS regions where ElastiCache Serv

Amazon CloudWatch SDK supports optimized JSON, CBOR protocols

10 December 2025 @ 12:00 pm

Amazon CloudWatch announces support for both the JSON and Concise Binary Object Representation (CBOR) protocols in the CloudWatch SDK, enabling lower latency and improved performance for CloudWatch customers. The SDK will automatically use JSON or CBOR as its new default communication protocol, offering customers a lower end-to-end processing latency as well as reduced payload sizes, application client side CPU, and memory usage. Customers use the CloudWatch SDK either directly or through Infrastructure as Code solutions to manage their monitoring resources. Reducing control plane operations latency and payload size helps customer optimize their operational maintenance and resources usage and costs. JSON and the CBOR data formats are standards designed to enable better performance over the traditional AWS Query protocol. The CloudWatch SDK for JSON and CBOR protocols support is available in all AWS Reg

AWS Support Center Console now supports screen sharing for troubleshooting support cases

10 December 2025 @ 8:00 am

Today, AWS announces that AWS Support Center Console now support screen sharing for troubleshooting support cases. With this new feature, you can request a virtual meeting while in an active chat or call, join support calls with one click through a meeting bridge link. With the new virtual meetings, you will be able to share your screen during the meeting and maintain seamless access to case details for efficient troubleshooting. This enhancement simplifies your support experience by keeping all support interactions within the AWS Support Center console. To learn more visit the AWS Support page.

Amazon Braket now supports Qiskit 2.0

10 December 2025 @ 8:00 am

Amazon Braket now supports Qiskit 2.0, enabling quantum developers to use the latest version of the most popular quantum software framework with native primitives and client-side compilation capabilities. With this release, Braket provides native implementations of Qiskit's Sampler and Estimator primitives that leverage Braket's program sets for optimized batching, reducing execution time and costs compared to generic wrapper approaches. The native primitives handle parameter sweeps and observable measurements service-side, eliminating the need for customers to implement this logic manually. Additionally, the bidirectional circuit conversion capability enables customers to use Qiskit's extensive compilation framework for client-side transpilation before submitting to Braket devices, providing the control and reproducibility that enterprise users and researchers require for device characterization experiments and custom compilation passes. Qiskit 2.0 support is avai

Amazon EC2 C8gn instances are now available in additional regions

9 December 2025 @ 6:00 pm

Starting today, Amazon Elastic Compute Cloud (Amazon EC2) C8gn instances, powered by the latest-generation AWS Graviton4 processors, are available in the AWS US East (Ohio) and Middle East (UAE) Regions. The new instances provide up to 30% better compute performance than Graviton3-based Amazon EC2 C7gn instances. Amazon EC2 C8gn instances feature the latest 6th generation AWS Nitro Cards, and offer up to 600 Gbps network bandwidth, the highest network bandwidth among network optimized EC2 instances. Take advantage of the enhanced networking capabilities of C8gn to scale performance and throughput, while optimizing the cost of running network-intensive workloads such as network virtual appliances, data analytics, CPU-based artificial intelligence and machine learning (AI/ML) inference. For increased scalability, C8gn instances offer instance sizes up to 48xlarge, up to 384 GiB of memory, and up to 60 Gbps of bandwidth to Amazon Elastic Block Store (EBS). C8gn instan

Amazon EC2 X8g instances now available in Europe (Stockholm) region

9 December 2025 @ 4:00 pm

Starting today, Amazon Elastic Compute Cloud (Amazon EC2) X8g instances are available in Europe (Stockholm) region. These instances are powered by AWS Graviton4 processors, and they offer up to 3 TiB of total memory and increased memory per vCPU compared to other Graviton4-based instances. X8g instances are ideal for memory-intensive workloads, such as electronic design automation (EDA) workloads, in-memory databases (Redis, Memcached), relational databases (MySQL, PostgreSQL), real-time big data analytics, real-time caching servers, and memory-intensive containerized applications. X8g instances offer larger instance sizes with up to 3x more vCPU (up to 48xlarge) and memory (up to 3TiB) than Graviton2-based X2gd instances. They offer up to 50 Gbps enhanced networking bandwidth and up to 40 Gbps of bandwidth to the Amazon Elastic Block Store (Amazon EBS). Elastic Fabric Adapter (EFA) networking support is offered on 24xlarge, 48xlarge, and bare metal sizes, and Elastic Networ

AWS Partner Central now includes opportunity deal sizing

9 December 2025 @ 3:00 pm

Today, AWS announces deal sizing capability in AWS Partner Central. This new feature, available within the APN Customer Engagements (ACE) Opportunities, uses AI to provide deal size estimates and AWS service recommendations. Deal Sizing capability allows Partners to save time on deal management by simplifying the process of estimating AWS monthly recurring revenue (MMR) when creating or updating opportunities. Partners can optionally import AWS Pricing Calculator URLs to automatically populate AWS service selections and corresponding spend estimates into their opportunities, reducing the need for manual re-entry. When a Pricing Calculator URL is provided, deal sizing delivers enhanced insights including pricing strategy optimization recommendations, potential cost savings analysis, Migration Acceleration Program (MAP) eligibility indicators, and modernization pathway analysis. These enhanced insights help Partners refine their technical approach and strengthen funding appli

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Arista goes big with campus wireless tech

10 December 2025 @ 7:38 pm

Arista Networks is making moves in campus mobility, announcing architectural updates designed to help enterprises build large-scale wireless networks. Arista’s new Virtual Ethernet Segment with Proxy ARP (VESPA) for WLAN mobility will let enterprise customers design massive Wi-Fi roaming domain networks with more than 500,000 multivendor clients and 30,000 Arista wireless access points. VESPA is part of Arista’s Cognitive Campus/Cognitive Wi-Fi package, which is based on the cloud-based wireless technology it bought from Mojo Networks in 2018. That technology bypasses the traditional on-premises Wi-Fi controller

Network jobs watch: Hiring, skills and certification trends

10 December 2025 @ 6:21 pm

Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations, multicloud networking, zero trust network access (ZTNA), and SD-WAN. Here’s a recap of some of the latest industry research, hiring s

Cybersecurity skills matter more than headcount in an AI era: ISC2 study

10 December 2025 @ 6:00 pm

Cybersecurity teams are navigating a shift as skills shortages overtake headcount as the primary concern, according to ISC2’s 2025 Cybersecurity Workforce Study. The research, based on responses from some 16,029 cybersecurity professionals globally, reveals that while budget cuts and layoffs have leveled off after last year’s surge, the pressure on security teams has intensified. ISC2, a nonprofit member organization for cybersecurity professionals, found that

Most significant networking acquisitions of 2025

10 December 2025 @ 3:05 pm

This year is shaping up to be an active one for mergers and acquisitions. Goldman Sachs says 2025 is on pace to become the second-biggest in history for announced M&As, Reuters reports. In the networking arena, some of the biggest deals of 2025 were a long time coming — it took more than 18 months for HPE to finally close the Juniper Networks deal, for example. Some come with blockbuster price tags (like Palo Alto Networks’ $25 billion CyberArk buy),

Aviz Networks launches enterprise-grade community SONiC distribution

9 December 2025 @ 8:20 pm

The SONiC network operating system (NOS) was first open-sourced in 2017, and in recent years it has become a mainstay of networking vendors. But there are barriers to deployment in multi-vendor hardware environments. While open-source code is available, actual SONiC operating system distributions — including all the tools needed to run, install and maintain the system — come in the form of vendor-specific implementations. Even though SONiC adoption in enterprise data centers has grown from hyperscaler experiments to mainstream deployments, enterprises face a f

2025 global network outage report and internet health check

9 December 2025 @ 2:32 pm

The reliability of services delivered by ISPs, cloud providers and conferencing services is critical for enterprise organizations. ThousandEyes, a Cisco company, monitors how providers are handling any performance challenges and provides Network World with a weekly roundup of events that impact service delivery. Read on to see the latest analysis, and stop back next week for another update on the performance of cloud providers and ISPs. Note: We have archived prior-year outage updates, including our 2024 report,

US approves Nvidia H200 exports to China, raising questions about enterprise GPU supply

9 December 2025 @ 12:59 pm

The US will allow Nvidia’s H200 AI chips to be exported to China with a 25 percent fee, a policy shift that could redirect global demand toward one of the world’s largest AI markets and intensify competition for already limited GPU inventories. The move raises fresh questions about whether enterprise buyers planning 2026 infrastructure upgrades should brace for higher prices or longer lead times if H200 supply tightens again. “We will protect National Security, create American Jobs, and keep America’s lead in AI,” US President Donald Trump said in a post on

Spotlight: Making the most of multicloud

9 December 2025 @ 10:00 am

Download the December 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.

Intel: Latest news and insights

9 December 2025 @ 1:07 am

More processor coverage on Network World:AMD news and insights | Nvidia news and insights Intel is hoping for a turnaround under its new CEO, Lip-BuTan.  Intel’s Q1 2025 revenue was $12.7 billion, flat year-over-year. While its Client Computing Group (CCG) revenue dropped 8%, the Data Center and AI (DCAI) segment showed an 8% in

AI-driven network management gains enterprise trust

8 December 2025 @ 9:25 pm

One of the largest U.S. insurers is using AI agents to analyze, simulate, and enforce rule changes to security policies in real time. In the past, rule creation and change reviews took hours and required manual validation by multiple analysts, says a senior technology officer at the insurance company. “Now, agentic workflows automatically interpret business requests,” he says. The agents — which are policy automation agents from AI-powered cybersecurity startup Airrived — also assess the impacts across multi-vendor firewalls, validate compliance against internal policies, and generate approved rule sets. And it just takes

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Download of the day: GIMP 3.0 is FINALLY Here!

18 March 2025 @ 3:45 am

Wow! After years of hard work and countless commits, we have finally reached a huge milestone: GIMP 3.0 is officially released! I am excited as I write this and can't wait to share some incredible new features and improvements in this release. GIMP 2.10 was released in 2018, and the first development version of GIMP 3.0 came out in 2020. GIMP 3.0 released on 16/March/2025. Let us explore how to download and install GIMP 3.0, as well as the new features in this version. Love this? sudo share_on: Twitter - Facebook -

How to list upgradeable packages on FreeBSD using pkg

16 March 2025 @ 8:25 pm

See all FreeBSD related FAQ Here is a quick list of all upgradeable packages on FreeBSD using pkg command. This is equivalent to apt list --upgradable command on my Debian or Ubuntu Linux system. Love this? sudo share_on: Twitter -

Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement

16 March 2025 @ 12:17 pm

In a move that has sparked significant discussion within the Ubuntu Linux fan-base and community, Canonical, the company behind Ubuntu, has announced its intention to explore the potential replacement of GNU Core Utilities with the Rust-based "uutils" project. They plan to introduce new changes in Ubuntu Linux 25.10, eventually changing it to Ubuntu version 26.04 LTS release in 2026 as Ubuntu is testing Rust 'uutils' to overhaul its core utilities potentially. Let us find out the pros and cons and what this means for you as an Ubuntu Linux user, IT pro, or developer. Love this? sudo share_on: Twitter -

How to install KSH on FreeBSD

3 March 2025 @ 11:50 pm

See all FreeBSD related FAQ Installing KSH (KornShell) on FreeBSD can be done with either FreeBSD ports or the pkg command. The ports collection will download the KSH source code, compile it, and install it on the system. The pkg method is easier, and it will download a pre-compiled binary package. Hence, it is recommended for all users. KornShell (KSH) has a long history, and many older Unix systems and scripts rely on it. As a result, KSH remains relevant for maintaining and supporting legacy infrastructure. Large enterprises, especially those with established Unix-based systems, continue to use KSH for scripting and system administration tasks. Some industries where KS

Linux Sed Tutorial: Learn Text Editing with Syntax & Examples

3 March 2025 @ 9:47 am

See all GNU/Linux related FAQ Sed is an acronym for "stream editor." A stream refers to a source or destination for bytes. In other words, sed can read its input from standard input (stdin), apply the specified edits to the stream, and automatically output the results to standard output (stdout). Sed syntax allows an input file to be specified on the command line. However, the syntax does not directly support output file specification; this can be achieved through output redirection or editing files in place while making a backup of the original copy optionally. Sed is one of the most powerful tools on Linux and Unix-like systems. Learning it is worthwhile, so in t

How to tell if FreeBSD needs a Reboot using kernel version check

23 February 2025 @ 10:07 pm

See all FreeBSD related FAQ Keeping your FreeBSD server or workstation updated is crucial for security and stability. However, after applying updates, especially kernel updates, you might wonder, "Do I need to reboot my system?" Let's simplify this process and provide a straightforward method for determining whether a reboot is necessary using the CLI, shell script, and ansible playbook. Love this? sudo share_on: Twitter

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure.... The post How to Choose the Perfect Domain Name for Your Business appeared first on Heart Internet.

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet. The post What is a VPS? And is it Time You Got One? appeared first on Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being... The post We’re Now Certified by the Green Web Foundation appeared first on Heart Internet.

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business... The post What is Web Hosting and Why Does Your Business Need It? appeared first on Heart Internet.

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access via SSH on Your VPS for Migration using Plesk appeared first on Heart Internet.

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access on Your VPS Server Using Plesk appeared first on Heart Internet.

Are your website fonts sending the right message?

3 February 2025 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand? The post Are your website fonts sending the right message? appeared first on Heart Internet.

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some... The post Black Friday at Heart Internet appeared first on Heart Internet.

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load,... The post 13 Easy Ways to Optimise Your Website for Speed and Performance appeared first on Heart Internet.

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet. The post Black Friday and Cyber Monday sale now on at Heart Internet appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Determine the IPv4 pMTU to/from a system behind a NAT with directional information

10 December 2025 @ 5:42 pm

Is there an easy way to determine the IPv4 pMTU (path MTU) between two Linux systems, when one of them is behind a NAT and determine in what direction packets are being dropped and where? I have root access to both systems. Situation in detail. xxxx +------+ +------+ xxxxxxxxxx xxx +------+ | | | | x xx | | | A +-----+ NAT +-----x Internet x----+ B | | | | | x xxxxx | | +------+ +------+ x xx +------+ xx xxx xxxxxx x xx xxxx I can ping B from A, but of course cannot ping A from B because of the NAT device. I have access to the NAT device but am sceptical about some of the information it shows and it is not as flexible as a linux s

Microsoft are refusing to deliver our server emails

10 December 2025 @ 4:53 pm

The email feedback stats: > LOG: MAIN cwd=/usr/local/cpanel/whostmgr/docroot 4 args: > /usr/sbin/exim -v -M 1vTFQx-000000006bI-3Seh delivering > 1vTFQx-000000006bI-3Seh LOG: MAIN Unfrozen by forced delivery LOG: > MAIN Sender identification U=mailnull D=-system- S=mailnull > Connecting to outlook-com.olc.protection.outlook.com [52.101.41.25]:25 > ... non-TFO mode connection attempt to 52.101.41.25, 0 data connected > SMTP<< 220 SJ1PEPF0000231A.mail.protection.outlook.com Microsoft ESMTP > MAIL Service ready at Wed, 10 Dec 2025 16:42:29 +0000 > [08DE2E6E2E888588] SMTP>> EHLO basic.coreone.co.uk SMTP<< > 250-SJ1PEPF0000231A.mail.protection.outlook.com Hello [213.171.205.123] > 250-SIZE 49283072 > 250-PIPELINING > 250-DSN > 250-ENHANCEDSTATUSCODES > 250-STARTTLS > 250-8BITMIME > 250-BINARYMIME > 250-CHUNKING >

Get 404 error for rewrite URL

10 December 2025 @ 4:39 pm

I cannot change my URL e.g. /dfdrgr.php?page=dfgfg to /rrrr. I’ve a .txt file contained e.g. /rrrr /dfdrgr.php?page=dfgfg; and a redirected.map file contained: # Redirects map file – auto generated include /home/fxg/conf/web/ron.click/redirects.txt; And a redirects.conf contaned: # Nginx map block – auto generated map $uri $rewrite_target { default ""; include /home/fxg/conf/web/ron.click/redirects.map; } map $rewrite_target $should_redirect { "" 0; default 1; } The nginx.conf is contained: #=========================================================================# Default Web Domain Template DO NOT MODIFY THIS FILE! CHANGES WILL BE LOST WHEN REBUILDING DOMAINS #=========================================================================# server { listen 88.121.229.139:80; server_name ron.

Why is ip6tables blocking ssh?

10 December 2025 @ 1:07 pm

I'm unable to connect to one of my servers using ssh over IPv6. sshd is configured to listen on tcp/922. I found this in my server log: 2025-12-09T13:44:14.917279-05:00 myserver kernel: ip6tables denied: IN=eth0 OUT= MAC=f2:3c:91:70:0d:bb:fe:ff:ff:ff:ff:ff:86:dd SRC=2600:1003:b150:24af:0589:f1e8:c8ea:c9ac DST=2600:3c03:0000:0000:f03c:91ff:fe70:0dbb LEN=72 TC=0 HOPLIMIT=51 FLOWLBL=936002 PROTO=TCP SPT=57992 DPT=922 WINDOW=2056 RES=0x00 ACK FIN URGP=0 Here are my ip6tables rules: $ sudo ip6tables -L -v -n Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 65663 5014K ACCEPT 58 -- * * ::/0 ::/0 194K 30M LOG 0 -- * * ::/0 ::/0 limit: avg 5/min burst 5 LOG flags 0 level 7 prefix "ip6tables denied: " 0 0 ACCEPT 0 -- lo * ::/0 :

Configure NGINX to only use quantum safe ciphers

10 December 2025 @ 12:09 pm

OpenSSL 3.5 supports "Hybrid ML-KEM" in TLS 1.3 to avoid "Harvest now, decrypt later" attacks, when Quantum Computers are capable of defeating the encryption in the future. For testing purposes, how can I configure Nginx to only use "quantum safe" ciphers?

In CheckMK, how do I find how a service check has been configured?

10 December 2025 @ 12:06 pm

In CheckMK, how do I find how a service check has been configured for a specific Linux host "myhost"? After selecting the monitoring page of "myhost" -> Host -> Run Service Discovery, I am shown a page with all the service checks. I'm interested in seeing how the "Java Process" check is configured. There are two icons: "View and edit the parameters for this service" and "Edit and analyze the parameters for this service". The first shows a list of values; the second shows an empty page saying "There are no rules defined in this set.". Version: Checkmk Enterprise Edition 2.3.0p25.

Suspicious xmrig-6.24.0 folder reappears on server after deletion, suspected hidden miner/backdoor [closed]

10 December 2025 @ 9:10 am

I’m running a server under WHM/cPanel with a Next.js + PM2 setup. Over the last few days I’ve had the following persistent and recurring problem, despite repeated cleanup attempts, which makes it different from a “normal” post‑hack cleanup question: What’s happening A folder named xmrig-6.24.0 (containing the XMRig miner) appears inside my project directory automatically, even when I’m not manually deploying or touching that directory. I’ve deleted the folder multiple times; each time the folder reappeared after some time. At the same time, my PM2 instance gets disrupted, the application stops (or PM2 process disappears), and I have to manually run: pm2 start npm --name "website-name" -- start to restore the website. Searching system-wide (systemd, cron, global paths) now turns up no active miner service or cron job, only this folder under the project directory.

Resetting krbtgt account password in a multi-Domain Forest

10 December 2025 @ 8:50 am

We have two Active Directory Domains, the ROOT Domain (Domain A) and the TREE Domain (Domain B). I want to reset the krbtgt account's password in both Domains for security maintenance (not due to a breach of that account). I are planning to perform the process of resetting the krbtgt account password twice. I are asking if I should reset the krbtgt password first in the forest root domain or in the tree domain? In other words, is there a specific order? After each password reset, how long should you wait? I ran it on DC. According to the output, the default is 10 hours. enter image description here When I check the krbtgt account in contoso.domain (TREE Domain (Domain B)), it appears to be in a LOCKED state. Do I need to UNLOCK it before resetting? Or does being locked prevent this process? Can I perform the two password resets

Renewing LDAPS certificate for apps & appliances

10 December 2025 @ 8:45 am

There are applications and/or appliances that work with LDAPS. Here, the Kerberos Authentication template period is 1 year. Normally, it is automatically renewed with auto-enrollment. Will there be an interruption in the applications and/or devices after renewal? 1 - Let's say the Kerberos authentication certificate has expired. And it was automatically renewed within one year via auto-enrollment. Do systems using this certificate need to re-import the new certificate? 2 - Let's say the ROOT CA certificate has expired. And it was automatically renewed within 5 years via auto-enrollment. Do systems using this certificate need to re-import the new certificate?

Migrate to Kerberos Authentication template without downtime

10 December 2025 @ 8:41 am

I have Kerberos Authentication already. Kerberos Authentication template - validity periods : 1 years Domain Controller Authentication - validity periods : 5 years I want to remove Domain Controller Authentication template. The workflow is as follows. Are the steps correct here? 1 - Select the Superseded Templates tab and add the Domain Controller, Domain Controller Authentication for Kerberos Authentication template 2 - To unpublish Domain Controller Authentication -> Delete them from the enterprise CA servers by selecting each template under the Certificate Templates folder, right-click and delete 3 - wait for Windows Active Directory replication to complete 4 - Run gpupdate /force on each DC machine My questions are : 1 - Is it sufficient to only add the Domain Controller Authentication template to superseded, or is it necessary to add a Domain Controller? 2 - The validity period is different for templates like the one

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10