explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon Bedrock Introduces Advanced Prompt Optimization and Migration Tool

14 May 2026 @ 9:50 pm

Customers spend days to weeks optimizing prompts and evaluating responses when they want to migrate to a new model or just get better performance out of their current model. They struggle with changing their prompts quickly and then testing them to prevent regressions and improve on underperforming tasks. These situations call for the same tool – a prompt optimizer with built-in evaluations.  Today, Amazon Bedrock introduces Advanced Prompt Optimization, a new tool that allows customers to optimize their prompts for any model on Bedrock, while comparing their original prompts to their optimized prompts across up to 5 models simultaneously. Customers can use this if they are migrating to a new model or just want to get better performance on their current model. If they’re changing models, they can select their current model as a baseline and up to 4 other models. If they aren’

Amazon CloudFront announces Passthrough Mode for mutual TLS (Viewer)

14 May 2026 @ 9:30 pm

Amazon CloudFront now supports passthrough mode for viewer mutual TLS (mTLS) authentication, enabling customers to forward client certificates to their origin for validation without requiring CloudFront to perform certificate verification. Passthrough mode allows customers with existing mTLS implementations at their origins to use CloudFront without requiring to implement their validation logic at the edge. CloudFront viewer mTLS already supports required mode and optional mode, which offload client certificate authentication to CloudFront using trust stores. Passthrough mode is designed for customers to maintain their existing mTLS validation infrastructure at their origin without requiring any trust store configuration on CloudFront. In passthrough mode, CloudFront forwards every request to the origin along with the client's full certificate chain. Caching is not performed, ensuring each request is authenticated end-to-end by your origin. Connection functions which al

Announcing general availability of Amazon EC2 M3 Ultra Mac instances

14 May 2026 @ 9:23 pm

Amazon Web Services announces general availability of Amazon EC2 M3 Ultra Mac instances, powered by the latest Mac Studio hardware. Amazon EC2 M3 Ultra Mac instances are the next-generation EC2 Mac instances, that enable Apple developers to migrate their most demanding build and test workloads onto AWS. These instances are ideal for building and testing applications for Apple platforms such as iOS, macOS, iPadOS, tvOS, watchOS, visionOS, and Safari.    M3 Ultra Mac instances are powered by the AWS Nitro System, providing up to 10 Gbps network bandwidth and 8 Gbps of Amazon Elastic Block Store (Amazon EBS) storage bandwidth. These instances are built on Apple M3 Ultra Mac Studio computers featuring a 28-core CPU, 60-core GPU, 32-core Neural Engine, and 256GB of unified memory. Compared to EC2 M4 Max Mac instances, M3 Ultra Mac instances provide 2x the unified memory, 1.75x the CPU cores, 1.5x the GPU cores, and 2x the Neural Engine cores, gi

SageMaker AI now supports serverless model customization for Qwen3.6

14 May 2026 @ 7:18 pm

Amazon SageMaker AI now supports serverless model customization for Qwen3.6 27B parameter model using supervised fine-tuning (SFT) and reinforcement fine-tuning (RFT). Qwen3.6 is a popular open-weight model family from Alibaba Cloud. This launch is an addition to our support for fine-tuning Qwen3.5 and other popular models. Before this launch, you could deploy Qwen3.6 base model on SageMaker AI and now, you can also adapt it to your specific domains and workflows. Model customization enables you to tailor foundation models with your proprietary data so they more accurately reflect your domain knowledge, terminology, and quality standards. Rather than building models from scratch, fine-tuning lets you start from a capable base model and specialize it for your use cases, whether that's improving accuracy on domain-specific tasks, aligning outputs with your organization's tone, or improving performance on new tasks using your labeled data. With serverless customization, SageMa

AWS Transform now supports customer-owned artifact stores

14 May 2026 @ 7:00 pm

AWS Transform brings assessment, migration, and modernization into a single AI-powered experience that guides enterprises through their full transformation journey. Today, AWS announces support for customer-owned Amazon S3 buckets, giving customers full control over where their transformation artifacts are stored and how they are secured. With this launch, you can configure your own S3 bucket, optionally encrypt artifacts with your own AWS KMS key, and manage access policies through your own AWS account. Migration practitioners can upload files directly to their bucket for immediate use by transformation agents and centralize artifact storage across multiple AWS accounts. This is designed to help enterprises in regulated industries meet data sovereignty and compliance requirements without changing how they use AWS Transform. This capability is available in all AWS Regions where AWS Transform is offered. To learn more, see the

AWS Transform introduces the agent builder toolkit Kiro power for building customized transformation agents

14 May 2026 @ 7:00 pm

Today, as part of the AWS Transform composability initiative, AWS announces the general availability of the agent builder toolkit Kiro power for AWS Transform. With the agent builder toolkit, AWS Partners and customers can build agents tailored to their specific modernization needs and ensure it works seamlessly within AWS Transform. This capability enables Migration and Modernization Competency Partners, ISVs, or customers to create differentiated transformation solutions by integrating their specialized agents, tools, knowledge bases, and workflows with AWS Transform's agentic AI capabilities. The agent builder toolkit provides the end-to-end lifecycle for transformation agents: build agents using the Kiro power; share them with teams or across partner networks, and register them with AWS Transform for discovery. The agent builder toolkit for AWS Transform is available in the Kiro power marketplace. To learn

AWS Transform agents now available in Kiro, Claude, Cursor, and Codex

14 May 2026 @ 7:00 pm

Today, AWS announces that the AWS Transform agents — built on decades of AWS migration and modernization experience — are now accessible through a Kiro power, agent plugins, and via the AWS Transform MCP server. Developers can now consume all of AWS Transform's capabilities directly from their preferred development environment, whether working interactively in an agentic IDE, managing jobs through the web console, or integrating programmatically via MCP. This launch gives builders flexibility to choose the surface that fits their workflow while gaining the depth of transformation expertise behind the AWS Transform agents for Windows, VMware, mainframe and more. A developer can start a transformation in their agentic IDE, monitor progress and collaborate in the web console, then see results back in their IDE — all against the same underlying job with consistent state. Additionally, AWS Transform now supports IAM role authentication. Customers who start using AWS Transfo

Two new models for agentic coding and efficient AI are now available in Amazon SageMaker JumpStart

14 May 2026 @ 6:00 pm

Today, AWS announced the availability of GLM-5.1-FP8 and Phi-4-mini-instruct in Amazon SageMaker JumpStart, expanding the portfolio of foundation models available to AWS customers. These models from Z.ai and Microsoft bring advanced agentic capabilities and efficient inference to enterprise AI workloads on AWS infrastructure. These models address different enterprise AI challenges with specialized capabilities: GLM-5.1-FP8 excels at agentic software engineering with sustained multi-round optimization, handling repository-level code generation, terminal tasks, and complex debugging workflows that improve with extended reasoning. It is ideal for automated code review pipelines, AI-powered development environments, and long-horizon problem-solving where the model iterates over hundreds of rounds to refine solutions. Phi-4-mini-instruct excels at strong reasoning, math, and logic in memory-constrained and latency-bound environments, supporting 24 la

Three new models for speech recognition and text-to-speech are now available in Amazon SageMaker JumpStart

14 May 2026 @ 6:00 pm

Today, AWS announced the availability of Qwen3-TTS-12Hz-1.7B-CustomVoice, Qwen3-TTS-12Hz-1.7B-Base, and Qwen3-ASR-1.7B in Amazon SageMaker JumpStart, expanding the portfolio of foundation models available to AWS customers. These three models from Qwen bring advanced speech synthesis and recognition capabilities across 10+ languages, enabling customers to build intelligent voice-powered applications on AWS infrastructure. These models address different enterprise speech and audio challenges with specialized capabilities: Qwen3-TTS-12Hz-1.7B-CustomVoice excels at multilingual text-to-speech with customizable voice styles, supporting 10 languages with instruction-driven control over timbre, emotion, and prosody. It is ideal for building real-time interactive voice applications, customer-facing virtual assistants, and content creation workflows that require natural, expressive speech output. Qwen3-TTS-12Hz-1.7B-Base excels at multilingual text-to-sp

Amazon Aurora DSQL now supports change data capture (Preview)

14 May 2026 @ 6:00 pm

Amazon Aurora DSQL introduces support for change data capture (CDC) in preview, enabling you to stream real-time database changes directly to Amazon Kinesis Data Streams. This fully managed capability removes the need to build or maintain custom streaming pipelines, making it easier to build event-driven applications, power real-time analytics pipelines, and synchronize data across systems. Aurora DSQL automatically captures the result of insert, update, and delete operations as change events. You can use these events to synchronize data across microservices, trigger downstream processing with AWS Lambda, or deliver to Amazon S3, Amazon Redshift, and Amazon OpenSearch Service through Amazon Data Firehose for analytics. CDC streaming requires no infrastructure setup and is designed to have zero impact on your database workload, so you can stream changes without affecting database throughput or latency. CDC streaming in preview is available in all AWS Regions where A

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Network outages, power failures strain data center resiliency

14 May 2026 @ 6:25 pm

Data center outages are becoming less frequent overall, but resiliency gains are slowing as data center operators face mounting pressure from AI workloads, aging power infrastructure, and external dependencies, according to Uptime Institute’s newly released 2026 Annual Outage Analysis report. The report marks the fifth consecutive year that outage frequency on a per-site basis has declined, continuing a long-term trend Uptime analysts attribute to improved operational maturity, distributed resiliency strategies, and infras

Five takeaways from Cisco’s blowout quarter and what it means to customers

14 May 2026 @ 2:15 pm

Cisco Systems delivered a blowout Q3 FY2026 performance that surpassed even the most optimistic expectations, posting record revenue of $15.8 billion, up 12% year-over-year, with product revenue surging 17%. The networking giant’s momentum is accelerating across multiple fronts, driven by demand for AI infrastructure, campus modernization, and strategic silicon investments. Here are five key takeaways from what CEO Chuck Robbins described as a quarter when Cisco’s “technology is more relevant than ever in the AI era.” 1. AI infrastructure orde

Cisco to cut nearly 4,000 jobs despite strong growth in AI, enterprise networking

14 May 2026 @ 2:48 am

Despite reporting positive financial news — including record third-quarter revenue of $15.8 billion, a 12% year-over-year increase — Cisco said it will eliminate almost 4,000 jobs. “We are making changes today that will result in the reduction of our overall workforce in Q4 by fewer than 4,000 jobs, representing less than 5 percent of our total employee base. Most notifications will begin on May 14…” Cisco CEO Chuck Robbins wrote in a blog post about the changes.  “While we are reducing roles in some areas, we are making clear, strategic investment

Startup SPAN teams with Nvidia to put data center nodes in your backyard

13 May 2026 @ 5:58 pm

Even though many communities are in open revolt against massive data centers needed to power artificial intelligence, a startup is betting that homeowners will welcome miniature data centers in their backyards. The startup, an intelligent power management company called SPAN, has partnered with Nvidia and homebu

Hard drive shortage affecting enterprise storage needs

13 May 2026 @ 4:50 pm

It is no secret that there is a considerable shortage of storage devices, both traditional spinning media and SSDs. It’s always been hard to quantify beyond the “they are out of stock” complaints, but now some companies are getting tangible stats. Large-capacity hard drives, measuring 18TB or more, now cost up to three times more than their typical prices due to production capacities being entirely booked by hyperscalers. Among those feeling t

Wi-Fi 8 is closer than you think. Here’s what you need to know

13 May 2026 @ 4:41 pm

Wi-Fi 8 is still a couple of years away from broad enterprise deployment, but the work underway in the IEEE and silicon ecosystems will shape wireless LAN design for the next decade. For network engineers, Wi-Fi 8 is more than “Wi-Fi 7, but faster.” It’s a reliability-driven release that begins to turn access points into an edge AI compute platform. From speed to reliability Wi-Fi was a major topic at Extreme Connect, Extreme Networks’ flagship user event. David Coleman, arguably one of the most knowledgeable people

Cisco open-sources agentic AI security spec

13 May 2026 @ 12:11 pm

Cisco has turned over an internally developed specification for agentic AI security evaluation to the GitHub open-source community. The Foundry Security Spec is meant to be used with GitHub’s spec-kit, which is an industry-wide set of development workflows that can be used with different AI agents. The idea is to help customers and the industry create a common framework for evaluating and governing AI agents used in cybersecurity, according to Anthony Grieco

HPE revamps private cloud stack for enterprises rethinking VMware

12 May 2026 @ 5:18 pm

HPE this week announced updates to its private cloud, storage, and data-protection portfolio aimed at enterprise customers who are reevaluating their VMware strategies and looking to ready their infrastructure to handle AI workloads. The updates are delivered through

Versa takes aim at fragmented enterprise security with CSPM, orchestration update, and AI agent controls

12 May 2026 @ 3:11 pm

Traffic patterns are shifting, agent deployments are multiplying, and cloud environments keep expanding. The point tools enterprises use to manage each layer are not keeping pace. Versa Networks is addressing those challenges with three coordinated updates to its VersaONE Universal SASE Platform. The first is a Cloud Security Posture Management (CSPM) capability that brings cloud risk visibility into the same view as access security. The second is a significant update of its Concerto orchestration platform. The third is an AI agent trust and verif

Red Hat opens Ansible to AI agents, within limits

12 May 2026 @ 2:23 pm

Red Hat on Tuesday opened its Ansible Automation Platform to AI agents while adding new controls intended to keep them under tight control. The company made its Model Context Protocol (MCP) server for Ansible generally available, allowing any AI tool to access the platform, and it introduced a new automation orchestrator, in technology preview, that routes actions through human-approved, deterministic playbooks. The goal is to allow enterprises to start using AI to automate their workflows while keeping a firm hand on what the AI agents can and can’t do with it, since there have recently been a series of reports about

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Unable to load the feed. Please try again later.

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

Business Email and Website Hosting

8 May 2026 @ 10:30 am

The post Business Email and Website Hosting appeared first on Heart Internet.

What Is the Future of the Internet?

1 May 2026 @ 10:30 am

The post What Is the Future of the Internet? appeared first on Heart Internet.

Copy Fail Linux Vulnerability (CVE-2026-31431)

30 April 2026 @ 2:43 pm

On 29 April 2026, security researchers at Theori (Xint Code) publicly disclosed CVE-2026-31431, known as “Copy Fail.” It is a local privilege escalation flaw in the Linux kernel’s AF_ALG cryptographic... The post Copy Fail Linux Vulnerability (CVE-2026-31431) appeared first on Heart Internet.

How to Reduce the Bounce Rate of Your WordPress Site

24 April 2026 @ 10:30 am

The post How to Reduce the Bounce Rate of Your WordPress Site appeared first on Heart Internet.

How to Check for Available Domains

31 March 2026 @ 1:48 pm

The post How to Check for Available Domains appeared first on Heart Internet.

SSL Certificates are changing. Here’s what you need to know.

17 March 2026 @ 10:12 am

The rules around SSL certificates are changing across the whole internet. The good news is that for most customers, very little will change on your side. This is an industry-wide... The post SSL Certificates are changing. Here’s what you need to know. appeared first on Heart Internet.

Hosting VPS Linux vs Windows VPS

9 March 2026 @ 3:03 pm

The post Hosting VPS Linux vs Windows VPS appeared first on Heart Internet.

Domain Name Transfer Checklist: Everything You Need to Know

3 March 2026 @ 2:56 pm

The post Domain Name Transfer Checklist: Everything You Need to Know appeared first on Heart Internet.

Heart Internet Win Gapstars Innovation Award 2026

23 February 2026 @ 11:57 am

We’re incredibly proud to celebrate our Site Reliability Engineering team, who have won the Gapstars Innovation Award for their outstanding work improving platform stability, security, and visibility across our shared... The post Heart Internet Win Gapstars Innovation Award 2026 appeared first on Heart Internet.

A/B Testing Explained: A Practical Guide To Better Results | Part 1

20 February 2026 @ 8:32 am

If you want to improve your website you probably need to do A/B testing, otherwise known as split testing. Instead of guessing, A/B testing allows you to experiment more scientifically.... The post A/B Testing Explained: A Practical Guide To Better Results | Part 1 appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Cobian backup - native error 00059

15 May 2026 @ 2:38 am

I have these 2021-2022 backup files (.pbd) made with Cobian Backup Gravity 11. Now I'm trying to restore its contents, but I'm getting "Hashed list of file names is invalid - Native error". At binwalk I can see files within, which seems to indicate a healthy unencrypted file. The hexdump shows head contains "FIMG" and "ADDI". Edit This post here (https://flammlin.com/blog/2022/11/06/hashed-list-of-file-names-is-invalid) shows this error, and his solution was to disable CRC after compression. My case is that files are already created, therefore I still don't know how to solve this.

How can I automatically delete any deployment of a fine-tuned OpenAI model on Azure that hasn't been used in the past x hours?

14 May 2026 @ 11:58 pm

How can I automatically delete any deployment of a fine-tuned OpenAI model on Azure that hasn't been used in the past x hours? I am aware of 15-day timeout. However, this is too long for me, as this represents a cost of. 15 days * 24 hours/day * 2 USD/hour = 720 USD, and I have often several fine-tuned OpenAI model on Azure, so I am looking at a 4-digit monthly bill for unused models.

How to truncate a zipped file?

14 May 2026 @ 8:02 pm

I have very large log files and I often truncate them with: truncate -s 20M filename.log However, I also have some files that have been zipped and they are smaller, but I want to shrink them further or trim them further. Ideally I would have truncated them before they were zipped. filename.log.gz I have not tried to truncate directly on the file as I am not sure it is safe, and I also don't want to unzip the file as it might be too large to fit. Is there a way to truncate so it truncates the file in the zip to make the final final much smaller.

Can Ansible list all hosts that use a specific role?

14 May 2026 @ 1:59 pm

I am using Ansible roles to configure certain aspects of a wide variety of servers. A good example is the webserver. I have a playbook per server (e.g. server1.yml) which uses the role webserver if server1 should have a webserver configured. This works fine. But when I make a change to the webserver role, I want to update all servers which run a webserver. I struggle to convince Ansible to give me a list of the relevant servers (i.e. all servers that run a webserver, which is all servers that use the role webserver). The options I came up with until now are: have a group of all servers that run a webserver in the inventory -> I can use this group have a playbook to deploy the webserver (instead of or in addition to the "per server" approach I currently have?) find the hidden knob in Ansible that can do just what I want :) The issue with t

Serve Django static content from container with local webserver and SELinux

14 May 2026 @ 1:39 pm

I have a Django application that is running in a container. On container startup, collectstatic is called and static files are collected into a volume that is mounted in the container. I want to serve these static files using the webserver running on the host (not in a container). So basically the webserver on the host should forward everything but /static to the container and serve /static from disk. The setup is working when I disable SELinux. But not with SELinux enabled... The SELinux type of the directory where static files are collected to is container_file_t. With this SELinux type, the webserver cannot read the files (it needs httpd_sys_content_t). The other way around (setting the directory to httpd_sys_content_t) would not allow the container to write the static files there. So either way, one of the parties (either the container or the webserver) is unable to

Is it possible to configure recursing bind9 to try alternate authoritative servers on rejected queries?

14 May 2026 @ 1:03 pm

Context Obviously reality is subject to change, but as I write this, the authoritative nameservers for achewood.com are in an interesting state. According to com., there are 2 authoritative servers: achewood.com. 172800 IN NS ns1.korehosting.net. achewood.com. 172800 IN NS ns2.korehosting.net. ns2 is currently refusing all requests, but ns1 is working fine and shows there are actually 3 authoritative servers: achewood.com. 86400 IN NS ns1.korehosting.net. achewood.com. 86400 IN NS ns3.korehosting.net. achewood.com. 86400 IN NS ns2.korehosting.net. My problem is that my recursive dns server appears to be only trying ns2 (which, again, is refusing all requests), with this showing up in the logs (67.205.174.156 is ns2):

How do I know if I'm using Google Cloud Shielded Virtual Machines

13 May 2026 @ 9:27 am

Having received an email from Google about Secure Boot certificates expiring, I'm not sure if my servers are affected! I'm pretty sure I'm unaffected as these are the Shielded VM settings. If someone could confirm I'd be happy :) Secure Boot Off vTPM Off Integrity Monitoring Off Thanks

Zabbix cannot fetch disk usage from a host

12 May 2026 @ 10:50 am

I set up Zabbix on my infrastructure and added a host. Attempting to fetch disk usage details from the host results in this error: Latest data Details Cannot execute operation Cannot send request: item "FS [(C:)]: Get data" on host "CS-COK-LAP-036" is not monitored. Error Message But it can fetch other metrics. What is the cause?

Windows Server 2025 cannot rejoin Active Directory 2019 domain, due to "The request is not supported" [closed]

11 May 2026 @ 7:05 pm

I have a Windows Server 2025 machine I am trying to rejoin to an Active Directory 2019 domain that is healthy and has all FSMO roles. Attempting to join, results in "The request is not supported". Some background -- this Server 2025 machine was previously a domain controller on this same domain, but was decommissioned due to replication was broken. I had the worst time trying to gracefully remove the Server. To attempt to clean up the old metadata, I went into ADUC on the 2019 DC, navigated to the Domain Controllers OU, right clicked the Server 2025 machine and deleted it. It warned me that it was a global catalog and I confirmed the deletion. I uninstalled the The AD DS and DNS roles, but I'm not sure how much is remaining. The server is in WORKGROUP. The old computer object was cleaned up from AD on the 2019 DC. Here is what I have tried and verified: Discovered replication was broken between the two domain controllers Ran dcdiag /te

After phishing incident, some entra devices have registration time stamp = activity. Odd?

11 May 2026 @ 6:48 pm

In Microsoft Entra, are equivalent timestamps for registered and last activity and signed on and last password reset an indication of a persistence play by an attacker or is it a normal activity? Example: Registered / Activity (phishing mail, eg. 5th May 07:00): BCC dispenser user account device: 5/5/2026, 08:27 and AM / 5/10/2026, 08:27 AM Some other user account device: 5/5/2026, 08:45 AM and / 5/10/2026, 08:45 AM ... etc, 1:1 matching timestamp, close proximity to sending phishing event. Looking at these user accounts properties, they all show timestamps like this: User 1 properties: Sign in sessions valid from date time: 5/5/2026, 07:21 AM Last password change date time: 5/5/2026, 07:21 AM User 2 properties: Sign in sessions valid from date time: 5/5/2026, 07:12 AM Last password change date time: 5/5/2026, 07:12 AM Lets assume the attack happ

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10