explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon EC2 P6-B300 instances are now available in the AWS GovCloud (US-East) Region

14 April 2026 @ 9:00 pm

Starting today, Amazon Elastic Cloud Compute (Amazon EC2) P6-B300 instances are available in the AWS GovCloud (US-East) Region. P6-B300 instances provide 8x NVIDIA Blackwell Ultra GPUs with 2.1 TB high bandwidth GPU memory, 6.4 Tbps EFA networking, 300 Gbps dedicated ENA throughput, and 4 TB of system memory. P6-B300 instances deliver 2x networking bandwidth, 1.5x GPU memory size, and 1.5x GPU TFLOPS (at FP4, without sparsity) compared to P6-B200 instances, making them well suited to train and deploy large trillion-parameter foundation models (FMs) and large language models (LLMs) with sophisticated techniques. The higher networking and larger memory deliver faster training times and more token throughput for AI workloads. P6-B300 instances are now available in p6-b300.48xlarge size in the following AWS Regions: US West (Oregon) and AWS GovCloud (US-East). To learn more about P6-B300 instances, visit

AWS Transform is now available in Kiro and VS Code

14 April 2026 @ 7:15 pm

AWS Transform is now available through two additional developer tools — including Kiro and VS Code. AWS Transform is an agentic migration and modernization factory designed to compress enterprise transformation timelines from years to months — handling everything from large-scale infrastructure migrations to continuous tech debt reduction, without the manual handoffs and lost context that commonly stall these programs.. With today’s launch, you can get started with AWS Transform custom transformations from wherever you already work: install the AWS Transform Power in Kiro, or install the AWS Transform extension in VS Code . AWS Transform custom transformations help you crush tech debt at scal

AWS Secrets Manager now supports hybrid post-quantum TLS to protect secrets from quantum threats

14 April 2026 @ 6:31 pm

AWS Secrets Manager now supports hybrid post-quantum key exchange using ML-KEM (Module-Lattice-based Key-Encapsulation Mechanism) to secure TLS connections for retrieving and managing secrets. This protection is automatically enabled in Secrets Manager Agent (version 2.0.0+), AWS Lambda Extension (version 19+), and Secrets Manager CSI Driver (version 2.0.0+). For SDK-based clients, hybrid post-quantum key exchange is available in supported AWS SDKs including Rust, Go, Node.js, Kotlin, Python (with OpenSSL 3.5+), and Java v2 (v2.35.11+). With this launch, your applications retrieve secrets over TLS connections that combine classical key exchange with post-quantum cryptography, helping protect against both traditional cryptographic attacks and future quantum computing threats known as "harvest now, decrypt later" (HNDL). No code changes, configuration updates, or migration effort are required for customers using the latest client versions except for Ja

Amazon EC2 C8gn, M8gn, and R8gn instances now support higher Amazon EBS-optimized performance

14 April 2026 @ 2:01 pm

Today, AWS announces increased Amazon Elastic Block Store (Amazon EBS) performance for Amazon EC2 C8gn, M8gn, and R8gn instances in 48xlarge and metal-48xl sizes. EC2 C8gn, M8gn, and R8gn instances are network optimized instances powered by AWS Graviton4 processors and latest 6th generation AWS Nitro Cards. With the latest enhancements to AWS Nitro System, we have doubled the maximum EBS performance on these instances in 48xlarge and metal-48xl sizes, from 60 Gbps of EBS bandwidth and 240,000 IOPS to 120 Gbps of EBS bandwidth and 480,000 IOPS. Customers running network-intensive workloads while requiring additional block storage performance such as data analytics and high-performance file systems can benefit from the improved EBS performance. All existing and new C8gn, M8gn, and R8gn instances in 48xlarge and metal-48xl sizes launched starting today will benefit from this performance increase at no additional cost. For running instances, customers can stop and start

NVIDIA Nemotron-3-Super-120B, Qwen3.5-9B, and Qwen3.5-27B models now available on Amazon SageMaker JumpStart

13 April 2026 @ 11:40 pm

NVIDIA’s Nemotron-3-Super-120B, Qwen3.5-9B, and Qwen3.5-27B models are now available on Amazon SageMaker JumpStart, expanding the portfolio of foundation models available to AWS customers. These three models bring specialized capabilities spanning agentic reasoning, multilingual coding, and advanced instruction following, enabling customers to deploy high-performance, scalable AI solutions on AWS infrastructure. These models address different enterprise AI challenges with specialized capabilities: Nemotron-3-Super-120B is optimized for collaborative agents and high-volume workloads such as IT ticket automation. It employs a hybrid Latent Mixture-of-Experts (LatentMoE) architecture with Mamba-2 and MoE layers, enabling strong agentic, reasoning, and conversational capabilities useful for multi-agent applications like software development and cybersecurity triaging. Qwen 3.5 9B excels in multilingual coding, instruction following, and long-horizon planni

Amazon OpenSearch Serverless now supports Derived Source for storage optimization

13 April 2026 @ 8:55 pm

Amazon OpenSearch Serverless introduces support for Derived Source, a new feature that can help reduce the amount of storage required for your OpenSearch Service collections. With derived source support, you can skip storing source fields and dynamically derive them when required.  With Derived Source, OpenSearch Serverless reconstructs the _source field on the fly using the values already stored in the index, eliminating the need to maintain a separate copy of the original document. This can significantly reduce storage consumption, particularly for time-series and log analytics collections where documents contain many indexed fields. You can enable derived source at the index level when creating or updating index mappings. Derived Source support is available today in all AWS Regions where Amazon OpenSearch Serverless is supported. For more information, see

Amazon Redshift introduces key performance optimization for Top-K queries

13 April 2026 @ 6:58 pm

Amazon Redshift further optimizes the processing of top-k queries (queries with ORDER BY and LIMIT clauses) by intelligently skipping irrelevant data blocks to return results faster, dramatically reducing the amount of data processed. This optimization reorders and efficiently adjusts the data blocks to be read based on the ORDER BY column's min/max values, maintaining only the K most qualifying rows in memory. When the ORDER BY column is sorted or partially sorted, Amazon Redshift now processes only the minimal data blocks needed rather than scanning entire tables, eliminating unnecessary I/O and compute overhead. This enhancement particularly benefits top-k queries when the data permanently stores in descending order (ORDER BY ... DESC LIMIT K) on large tables where qualifying rows are appended at the end of the data storage. Common examples include: Finding the k most recent orders from millions or billio

Amazon Quick now supports document-level access controls for Google Drive knowledge bases

13 April 2026 @ 6:35 pm

Amazon Quick now supports document-level access controls (ACLs) for Google Drive knowledge bases, enabling organizations to maintain native Google Drive permissions when indexing content. Quick combines ACL replication for efficient pre-retrieval filtering with an additional layer of real-time permission checks directly with Google Drive at query time. This dual approach means you get the performance benefits of indexed ACLs while also guarding against stale or incorrectly mapped permission data. When a user submits a query, Quick verifies their current permissions with Google Drive before generating a response—ensuring answers are based on live access rights. With document-level access controls, Amazon Quick now respects individual file and folder permissions from Google Drive. This feature is available in all AWS Regions where Amazon Quick is available. To g

Aurora DSQL launches connector that simplifies building PHP applications

13 April 2026 @ 5:47 pm

Today we are announcing the release of the Aurora DSQL Connector for PHP (PDO_PGSQL) that makes it easy to build PHP applications on Aurora DSQL. The PHP Connector streamlines authentication and eliminates security risks associated with traditional user-generated passwords by automatically generating tokens for each connection, ensuring valid tokens are always used while maintaining full compatibility with existing PDO_PGSQL features. The connector handles IAM token generation, SSL configuration, and connection pooling, enabling customers to scale from simple scripts to production workloads without changing their authentication approach. It also provides opt-in optimistic concurrency control (OCC) retry with exponential backoff, custom IAM credential providers, and AWS profile support, making it easier to develop client retry logic and manage AWS credentials. To get started, visit the

Amazon EC2 R8i and R8i-flex instances are now available in AWS GovCloud (US-West) Region

13 April 2026 @ 5:00 pm

Starting today, Amazon Elastic Compute Cloud (Amazon EC2) R8i and R8i-flex instances are available in the AWS GovCloud (US-West) Region. These instances are powered by custom Intel Xeon 6 processors, available only on AWS, delivering the highest performance and fastest memory bandwidth among comparable Intel processors in the cloud. The R8i and R8i-flex instances offer up to 15% better price-performance, and 2.5x more memory bandwidth compared to previous generation Intel-based instances. They deliver 20% higher performance than R7i instances, with even higher gains for specific workloads. They are up to 30% faster for PostgreSQL databases, up to 60% faster for NGINX web applications, and up to 40% faster for AI deep learning recommendation models compared to R7i. R8i-flex, our first memory-optimized Flex instances, are the easiest way to get price performance benefits for a majority of memory-intensive workloads. They offer the most common sizes, from large to 16xlarge, an

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Cisco just made two moves to own the AI infrastructure stack

14 April 2026 @ 7:41 pm

Cisco’s move to buy Galileo and reportedly Astrix Security is less about filling product gaps and more about rearchitecting how AI is governed, secured, and trusted across the enterprise stack. Taken together, these deals signal Cisco’s intent to lead the AI era the way it once led the internet—by making the underlying infrastructure observable, identity-aware, and inherently secure.

Data centers are moving inland, away from some traditional locations

14 April 2026 @ 4:13 pm

Two completely separate reports indicate data center construction is moving toward the center of the country and away from the coasts. The first report comes courtesy of Synergy Research Group, which found the center of gravity for planning and building data centers is shifting away from some of the traditional coastal locations and moving inland, with the availability and cost of power being a major driving factor. John Dinsdale, chief analyst Synergy, admits this

2026 network outage report and internet health check

14 April 2026 @ 1:46 pm

ThousandEyes, a Cisco company, monitors how ISPs, cloud providers and conferencing services are handling any performance challenges and provides Network World with a weekly roundup of events that impact service delivery. Read on to see the latest analysis, and stop back next week for another update on internet and cloud traffic performance. Note: We have archived prior-year outage updates, including our reports from 2025, 2024,

DNS security is often inadequate, and network engineers should get more involved

14 April 2026 @ 11:00 am

Despite widespread adoption of defensive measures, most IT professionals believe their DNS infrastructure is not secure enough. Enterprise Management Associates (EMA) recently published DDI Directions 2026, a market research report that explores enterprise strategies for DNS, DHCP, and IP address management (DDI). In that report, only 28% of DDI experts said they believe that their DNS infrastructure is completely secure. The risk of insecure DNS This pessimism about

Fixing encryption isn’t enough. Quantum developments put focus on authentication

14 April 2026 @ 8:00 am

We are now entering the era of fault-tolerant quantum computing. The computers are getting better. The qubits are getting faster and more reliable, and there are more of them. NIST published its list of quantum-safe encryption algorithms, and now enterprises are racing to upgrade their encryption before Q-day, the quantum apocalypse that will make the previous generation of encryption protocols obsolete. Many large technology companies, infrastructure providers, and security firms have already committed to encryption upgrades, though enterprises ar

Curious about quantum? Check out training options from ISC2, IBM, AWS and more

14 April 2026 @ 8:00 am

Announcements from quantum computing companies continue to shorten the time before we reach Q-day. That’s the day when quantum computers get powerful enough to use for general business applications—or to break existing encryption standards. According to the latest Forrester projection, that is likely to happen by 2030. “The quantum computing industry crossed an inflection point in 2025,” Forrester analyst Brian Hopkins said in his report. “Vendors moved beyond theoretical fault‑tolerant architectures into early engineering reality.” IBM, for example, has a

Linux 7.0 debuts with some big changes for networking

14 April 2026 @ 1:39 am

The Linux 7.0 kernel is now out, and it’s one of the most impactful releases in years for networking professionals. The Linux kernel is the core of a Linux operating system distribution. Linux is commonly used as a foundation for operating systems in the cloud and as a base for networking. While the 7.0 designation is a big number, Linux creator Linus Torvalds iterates to major version numbers on a somewhat less precise basis, often arbitrarily jumping to a new number after a prior series gets too high.  “We have a new major number purely because I’m easily confused and not good with big numbers,” Torvalds wrote.

Intel: Latest news and insights

13 April 2026 @ 12:00 pm

More processor coverage on Network World:AMD news and insights | Nvidia news and insights Intel is hoping for a turnaround under its new CEO, Lip-BuTan. Intel’s Q1 2025 revenue was $12.7 billion, flat year-over-year. While revenue for its client computing group dropped 8%, the data center and AI segment showed an 8% increase, dr

AI demand is so high, AWS customers are trying to buy out its entire capacity

11 April 2026 @ 12:27 am

The Amazon Web Services (AWS) chip business is “on fire,” Trainium offers better price-performance than Nvidia, and customers are so eager for AI compute capacity that they’re looking to buy up all that’s currently available. These are the takeaways shared by Amazon CEO Andy Jassy in his eight page letter to shareholders in the tech giant’s 2025 annual report.

Intel secures Google cloud and AI infrastructure deal

10 April 2026 @ 7:42 pm

Intel and Google have announced a multi-year collaboration agreement that will see Google will continue to deploy Intel Xeon-based platforms for its next generation of AI and cloud infrastructure. These platforms will use Intel’s upcoming Xeon CPUs and custom infrastructure processing units (IPUs) co-designed by Intel and Google.  In return, Google will continue co-development of the IPUs (referred to as SmartNICs by other firms) which are designed to off

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Unable to load the feed. Please try again later.

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

How to Check for Available Domains

31 March 2026 @ 1:48 pm

The post How to Check for Available Domains appeared first on Heart Internet.

SSL Certificates are changing. Here’s what you need to know.

17 March 2026 @ 10:12 am

The rules around SSL certificates are changing across the whole internet. The good news is that for most customers, very little will change on your side. This is an industry-wide... The post SSL Certificates are changing. Here’s what you need to know. appeared first on Heart Internet.

Hosting VPS Linux vs Windows VPS

9 March 2026 @ 3:03 pm

The post Hosting VPS Linux vs Windows VPS appeared first on Heart Internet.

Domain Name Transfer Checklist: Everything You Need to Know

3 March 2026 @ 2:56 pm

The post Domain Name Transfer Checklist: Everything You Need to Know appeared first on Heart Internet.

Heart Internet Win Gapstars Innovation Award 2026

23 February 2026 @ 11:57 am

We’re incredibly proud to celebrate our Site Reliability Engineering team, who have won the Gapstars Innovation Award for their outstanding work improving platform stability, security, and visibility across our shared... The post Heart Internet Win Gapstars Innovation Award 2026 appeared first on Heart Internet.

A/B Testing Explained: A Practical Guide To Better Results | Part 1

20 February 2026 @ 8:32 am

If you want to improve your website you probably need to do A/B testing, otherwise known as split testing. Instead of guessing, A/B testing allows you to experiment more scientifically.... The post A/B Testing Explained: A Practical Guide To Better Results | Part 1 appeared first on Heart Internet.

How to enable two-factor authentication (2FA) on your Heart Internet account

28 January 2026 @ 12:37 pm

Account security matters, and switching on two-factor authentication (2FA) is a quick win. 2FA adds a second check during the sign-in process, so even if someone compromises your password, they still can’t get in.  To enable 2FA:  Step 1: Open your... The post How to enable two-factor authentication (2FA) on your Heart Internet account appeared first on Heart Internet.

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure.... The post How to Choose the Perfect Domain Name for Your Business appeared first on Heart Internet.

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet. The post What is a VPS? And is it Time You Got One? appeared first on Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being... The post We’re Now Certified by the Green Web Foundation appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

SubCA Not Service Revocation

14 April 2026 @ 6:02 pm

I have a domain stood up with a Subordinate CA. I acquired the SubCA from our CA which is offline. I am using that SubCA to authenticate 802.1X communications and other certificate based securities. For some reason every a week we have an issue with our 802.1X where it says it can't reach the revocation list of the CA which in this case is the Subordinate. We turn off 802.1x on those ports look into it and check the revocation list URL and we can get to it without a problem. We turn 802.1X back on and a week later same problem. Can it be looking for the Revocation list from the original offline CA? And even it won't authenticate we can still get to the revocation list for those 802.1X not connected devices. So what are we missing? It is similar to this thread --> The revocation function was unable to check revocation because the revocation ser

Docker container Tag issue in Openstack Deployment

13 April 2026 @ 3:06 pm

I'm trying deploy openstack on cluster of VMs running Debian 12.13 bookworm. My globals.yml file configuration is: # under kolla options title: config_strategy: "COPY_ALWAYS" kolla_base_distro: "debian" kolla_base_distro_version: "bookworm" openstack_release: "antelope" # for High Availability purposes, the internal VIP address # belong to same subnet of Management Network, # but not used by any VM or service in kolla_internal_vip_address: "192.168.100.254" # external VIP address belong to same subnet as Router and Server, but not used kolla_external_vip_address: "192.168.1.100" # under: Neutron - Networking Options title: network_interface: "enp2s0" neutron_external_interface: "enp1s0" # use OVN (Open Virtual Network) for modern Routing/Switching in openstack neutron_plugin_agent: "ovn" The issue, Kolla-Ansible fail to pull Docker imag

We are evaluating Intel QAT acceleration for QEMU live migration

13 April 2026 @ 11:11 am

QEMU uses GnuTLS for TLS migration, while Intel QAT TLS acceleration is available via OpenSSL engine/provider. Is there any supported way to enable QAT acceleration for migration TLS today, or does this require modifying QEMU to use OpenSSL instead of GnuTLS?

AWS Linux iptables redirecting port 22 timeout

13 April 2026 @ 3:17 am

I am trying to run cowrie honeypot on EC2 AWS Linux instance. Instance is accessible through ssh which is by default on port 22. As instructed in https://github.com/cowrie/cowrie/blob/main/INSTALL.rst, changed ssh port to 22222 (5 2s) by editing /etc/ssh/sshd_config. I was able to connect back to instance by specifying port 22222. And then, to make cowrie listen on port 22 I added the rule: sudo iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222 After that, closed the session and attempted to connect back to instance but connection timed out. I am very new to this. How should configure this?

how can i add contrib repo to debian via cloud-init?

11 April 2026 @ 10:58 pm

One failure moving our servers from deb12 to 13 was some packages moved to contrib repo. After some time debugging our failed upgrade, turns out cloud-init thinks a missing pacakge is no big deal ¯_(ツ)_/¯ cloud-init.log:2026-04-11 22:28:00,694 - apt.py[DEBUG]: The following packages were not found by APT so APT will not attempt to install them: ['geoipupdate'] tried to update our deployment following their example apt: preserve_sources_list: true sources_list: deb $MIRROR $RELEASE main contrib but that doesn't seem to do absolutely anything. I see that line mentioned in /var/log/cloud-init.log but nothing else happens because of it. Nada changes in /etc/apt/**. And cloud-init continue to ignore th

SCCM client push fails when device is managed by MDM [closed]

11 April 2026 @ 3:13 pm

I have a company device that is managed by both SCCM and an MDM solution. When I try to perform a client push installation using SCCM, the operation fails. It seems that the device is fully controlled by the MDM, and SCCM is unable to install or push the client. Has anyone faced this issue before? Is this expected behavior when MDM is managing the device? And is there any workaround to allow SCCM push in this scenario? MDM:airwatch

Internal vs external email server for bulk email delivery [closed]

11 April 2026 @ 10:39 am

I need to send bulk email for a small business application hosted on Ubuntu server. I'm trying to decide between running my own SMTP server (Postfix) or an external email marketing service provider. Problem: Using Postfix locally, many messages either land in spam or do not reach the recipient. I understand this may be related to missing or incorrect SPF, DKIM, reverse DNS configuration, and IP reputation. What I tried: Installed and configured Postfix on Ubuntu Set up basic SMTP authentication Attempted SPF and DKIM configuration Tested sending to Gmail and Outlook accounts Despite this, results are inconsistent. Research: From what I read, many businesses prefer external SMTP or email marketing services companies because they handle infrastructure, IP reputation, and deliverability optimization. Question: In a business environment, is it practical to maintain your own SMTP

Traefik ignores containers with multiple routers?

8 April 2026 @ 4:11 pm

I am fairly new to Traefik, but have managed to set up multiple containers behind it. I am now running into an issue where if I create a container that has more than one router, Traefik doesn't process it. Is this something that should work, or does 3.6 not support it? According to the documentation, this is how I should set up the labels when I have an internal host only route and an external host + prefix route, where I need to strip out the prefix: labels: - "traefik.enable=true" # Local access, host only - "traefik.http.routers.foundry14lan.rule=Host(`vtt.homelab.lan`)" - "traefik.http.routers.foundry14lan.entrypoints=websecure" - "traefik.http.routers.foundry14lan.tls=true" - "traefik.http.services.foundry14lan.loadbalancer.server.port=30000" # External access, https, with path that needs to be stripped - "traefik.http.routers.foundry14web.rule=Host(<redacted>) && PathPref

Cannot add security group to "Remote Desktop Users" permission denied even as Domain Admin

24 March 2026 @ 9:37 am

Environment: Windows Server 2022, single Active Directory domain (e.g. MY.DOMAIN), no Azure AD. Problem: I have a security group called RDP (in MY.DOMAIN/DOMAIN). When I add it to the built-in Remote Desktop Users group, the following error occurs: "You do not have permission to modify the group MY.DOMAIN/Builtin/Remote Desktop Users." What I tried: Adding the group using AD Users and Computers Running PowerShell with Add-ADGroupMember Logging on using user principal name Question: What is the minimum permission required to modify a Builtin group in Active Directory? Is Domain Admins membership required, or can this be delegated? Is there an alternative approach such as Group Policy to grant RDP access through a custom security group without touching Builtin\Remote Desktop Users directly?

Time zone issues with Microsoft 365

7 July 2025 @ 5:41 pm

We recently switched to Microsoft Office 365 and also use Active Directory on a local Primary Domain controller, that syncs with MS365 via Azure AD Synchronization Service. We are experiencing issues with Calendar events winding up in what seems like different time zones after being sent. Example: A manager sent an invite for 9 am, and the meeting shows 6 am on the recipient calendar. When we check the users accounts and machines they are in fact in the same time zones. If anyone has experience with this issue please respond. It may have nothing to do with the AD sync but I though it was worth mentioning.

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10