explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon Q Developer Java upgrade transformation CLI is now generally available

27 June 2025 @ 9:35 pm

We would like to announce the general availability of Amazon Q Developer Java upgrade transformation CLI (command line interface). Using the CLI, customers can invoke Q Developer’s transformation capabilities from the command line and perform Java upgrades at scale. The following capabilities are available: Java application upgrades from source versions 8, 11, 17, or 21 to target versions 17 or 21 (now available in CLI in addition to IDE) Selective transformation with options to choose steps from transformation plans, and libraries and versions to upgrade The ability to convert embedded SQL to complete Oracle-to-PostgreSQL database migration with AWS Database Migration Service (AWS DMS) With this launch, the capabilities are now available in the AWS Regions US East (N. Virginia) and Europe (Frankfurt). They can be accessed in the command line, on Linux and Mac OS. For more details, please visit

Research and Engineering Studio on AWS Version 2025.06 now available

27 June 2025 @ 6:00 pm

Today we announce Research and Engineering Studio (RES) on AWS Version 2025.06, which introduces significant improvements to instance bootstrapping, security configurations, and logging capabilities. This release streamlines the RES deployment process, enhances security controls for infrastructure hosts, adds Amazon CloudWatch logging for virtual desktop instances (VDI), and provides new customization options. RES 2025.06 features a streamlined bootstrapping process that accelerates infrastructure and VDI launch times. The improved process also enables customers to create RES-ready Amazon Machine Images (AMIs) without requiring an active RES deployment, making it easier to apply patches and customizations. Enhanced security configurations for infrastructure hosts now have more granular permissions, helping reduce security risks from compromised hosts. Additionally, a new Amazon CloudWatch Logs integration, enabled by default, centralizes VDI logs to simplify troubleshooting

AWS HealthOmics announces automatic input parameter interpolation for Nextflow workflows

27 June 2025 @ 5:00 pm

Today, AWS HealthOmics introduces automatic interpolation of input parameters for Nextflow private workflows, eliminating the need for manual parameter template creation. This enhancement intelligently identifies and extracts both required and optional input parameters directly from workflow definitions, along with their descriptions. AWS HealthOmics is a HIPAA-eligible service that helps healthcare and life sciences customers accelerate scientific breakthroughs with fully managed biological data stores and workflows. With this new feature, customers can launch bioinformatics workflows more quickly since they no longer need to manually identify, define, and validate each workflow parameter. This also helps reduce configuration errors that can occur when parameters are incorrectly specified or omitted. For specialized requirements, customers can still provide custom parameter templates to over

Amazon EC2 C7i instances are now available in the Middle East (UAE) Region

27 June 2025 @ 5:00 pm

Starting today, Amazon Elastic Compute Cloud (Amazon EC2) C7i instances powered by custom 4th Gen Intel Xeon Scalable processors (code-named Sapphire Rapids) are available in the Middle East (UAE) Region. C7i instances are supported by custom Intel processors, available only on AWS, and offer up to 15% better performance over comparable x86-based Intel processors utilized by other cloud providers. C7i instances deliver up to 15% better price-performance versus C6i instances and are a great choice for all compute-intensive workloads, such as batch processing, distributed analytics, ad-serving, and video encoding. C7i instances offer larger instance sizes, up to 48xlarge, and two bare metal sizes (metal-24xl, metal-48xl). These bare-metal sizes support built-in Intel accelerators: Data Streaming Accelerator, In-Memory Analytics Accelerator, and QuickAssist Technology that are used to facilitate efficient offload and acceleration of data operations and optimize performance for

Amazon EC2 I7ie instances are now available in additional AWS regions

27 June 2025 @ 5:00 pm

Amazon Web Services (AWS) announces the availability of Amazon EC2 I7ie instances in the AWS Asia Pacific (Sydney), Asia Pacific (Malaysia) and AWS GovCloud (US-East) Regions. Designed for large storage I/O intensive workloads, these new instances are powered by 5th generation Intel Xeon Scalable processors with an all-core turbo frequency of 3.2 GHz, offering up to 40% better compute performance and 20% better price performance over existing I3en instances. I7ie instances offer up to 120TB local NVMe storage density—the highest available in the cloud for storage optimized instances—and deliver up to twice as many vCPUs and memory compared to prior generation instances. Powered by 3rd generation AWS Nitro SSDs, these instances achieve up to 65% better real-time storage performance, up to 50% lower storage I/O latency, and 65% lower storage I/O latency variability compared to existing I3en instances. Additionally, the 16KB torn write prevention feature, enables cust

Amazon Route 53 launches capacity utilization metric for Resolver endpoints

27 June 2025 @ 5:00 pm

Starting today, you can enable Amazon CloudWatch metric (ResolverEndpointCapacityStatus) to monitor the status of the query capacity for Elastic Network Interfaces (ENIs) associated with your Route 53 Resolver endpoint in Amazon Virtual Private Cloud (VPC). The new metric enables you to quickly view whether the Resolver endpoint is at the risk of meeting the service limit for query capacity, and take remediation steps like instantiating additional ENIs to meet the capacity needs. Before today, you could enable CloudWatch to monitor the number of DNS queries that were forwarded by Route 53 Resolver endpoints, over a default five-minute interval, and make further estimations on when your endpoints will meet the query limits. With this launch, you can now enable the new metric to get direct alerts on the current status of your Resolver endpoint capacity, without requiring you to make additional estimations for calculating capacity of each endpoint. The status is reported for ea

AWS Firewall Manager provides support for AWS WAF L7 DDOS managed rules

27 June 2025 @ 5:00 pm

AWS Firewall Manager announces security policy support for enhanced application layer (L7) DDoS protection within AWS WAF. The application layer (L7) DDoS protection is an AWS Managed Rule group that automatically detects and mitigates DDoS events of any applications on Amazon CloudFront, Application Load Balancer (ALB) and other AWS services supported by WAF. AWS Firewall Manager helps cloud security administrators and site reliability engineers protect applications while reducing the operational overhead of manually configuring and managing rules. Working with AWS Firewall Manager, customers can provide defense in depth policies to address the full range of web site protections from the newly released AWS WAF (L7) DDoS protections to non-HTTP based threats to web site infrastructure. By looking at the totality of a web-sites’ technology stack, customers can define and deploy all the needed protections. AWS Firewall Manager support for application layer (L7) DDo

AWS WAF announces general availability of Resource-level DDoS protection for Application Load Balancers (ALB)

26 June 2025 @ 9:30 pm

Today, Amazon Web Services (AWS) announced general availability of a new resource-level distributed denial of service (DDoS) mitigation capability for Application Load Balancers (ALB). This new WAF DDoS protection is directly integrated with ALB as an on-host agent to detect and mitigates DDoS attacks from known malicious sources within seconds while maintaining service quality for legitimate traffic. The WAF resource-level DDoS protection for ALBs is built on upon existing IP reputation rule group to provide rapid protection against known attack sources through static rules. This feature efficiently rate limits the traffic based on both direct client IP addresses and proxy networks by inspecting DDoS indicators in X-Forwarded-For (XFF) headers. Resource-level DDoS protection for ALBs can be configured to be active at all times or to be active only during

AWS Elastic Beanstalk is now available in Middle East (UAE) region

26 June 2025 @ 9:05 pm

We are excited to announce the general availability of AWS Elastic Beanstalk in the Middle East (UAE) region. AWS Elastic Beanstalk is a service that simplifies application deployment and management on AWS. The service automatically handles deployment, capacity provisioning, load balancing, auto-scaling, and application health monitoring, allowing developers to focus on writing code. For a complete list of regions and service offerings, see AWS Regions. To get started on AWS Elastic Beanstalk, see the AWS Elastic Beanstalk Developer Guide. To learn more about Elastic Beanstalk, visit the Elastic Beanstalk product page.

Amazon Cognito introduces AWS WAF support for Managed Login

26 June 2025 @ 9:00 pm

Amazon Cognito introduces AWS Web Application Firewall (AWS WAF) support in Cognito Managed Login. This new capability allows customers to protect their Managed Login endpoints configured in Cognito user pools from unwanted or malicious requests and web-based attacks. Managed Login, a fully-managed, hosted sign-in and sign-up experience that customers can personalize to align with their company or application branding, now offers an additional layer of protection against threat vectors through integration with AWS WAF web access control lists (web ACLs). This integration provides customers with powerful new capabilities to safeguard their applications against malicious attacks. With AWS WAF support, you can now define rules that enforce rate limits, gain visibility into web traffic to your applications, and allow or block traffic to Cognito Managed Login based on your specific business or security requirements. Additionally, the AWS WAF integration enables you to optimize c

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Timeline of HPE’s $14 billion bid for Juniper

29 June 2025 @ 6:10 pm

AI is a key factor in one of the tech industry’s most significant M&A developments: HPE’s proposed acquisition of Juniper Networks. The $14 billion deal would shake up the industry, and regulatory watchdogs in the U.S. and worldwide have raised antitrust concerns. Meanwhile, enterprise customers are worried about product discontinuations and roadmap disruptions. We’ve tracked the deal since it was first announced in January 2024. In January 2025, the U.S. Department of Justice moved to block the deal, citing harm to competition. Most recently, the companies

HPE-Juniper deal clears DOJ hurdle, but settlement requires divestitures

29 June 2025 @ 5:58 pm

Hewlett Packard Enterprise’s $14 billion acquisition of Juniper Networks can move forward now that the companies have agreed to settle the lawsuit with the U.S. Department of Justice.  Filed with the United States District Court for the Northern District of California late on June 27, the agreement still needs the approval of a judge. The settlement also requires a unified HPE-Juniper to license the source code for Juniper’s Mist AI Ops software and to divest HPE’s Instant On wireless networking business. In January, the

Data center costs surge up to 18% as enterprises face two-year capacity drought

27 June 2025 @ 2:58 pm

If you’re trying to secure data center space right now, here’s the reality: You’re probably out of luck for the next two years, and what little is available will cost you significantly more than you budgeted. In the first quarter of this year, the average cost of data center space globally was up 3.3% year-over-year to $217.30 per kilowatt per month, according to CBRE’s latest Global Data Center Trends report. But that modest annual price increase masks brutal regional spikes hammering enterprise budgets: Costs jumped 17.6% in Northern Virginia, 17.2% in Chicago, and 18% in Amsterdam. For context, enterprises typically count on 5-7% annual increases in data center cost

Chronosphere unveils logging package with cost control features

26 June 2025 @ 4:53 pm

Chronosphere this week added an upgraded logging product to its observability platform to help enterprises gain greater control over their observability data and the costs associated with managing the volumes of data. Chronosphere Logs 2.0 lets enterprises correlate logs with metrics, events, and traces and offers analytics and recommendations to resolve issues faster, the company says. “Our analysis of how they use the logs is way more sophisticated than anything else out there. We can distill that down and help people see that

Cisco CIO on the future of IT: AI, simplicity, and employee power

26 June 2025 @ 3:48 pm

As Cisco infuses its enterprise infrastructure products with AI, the technology is also infiltrating its internal platforms, directed by Cisco CIO Fletcher Previn. His focus is on developing and using AI tools that can change how Cisco and its employees do business. Cisco is immersed in AI, looking for ways to make life and work better for employees and customers, Previn told Network World. Cisco employees are using AI tools to accelerate software development and ope

AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns

26 June 2025 @ 3:35 pm

A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by attackers, creating urgent pressure for enterprises still waiting for complete vendor patches across their infrastructure. The US Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2024-54085 to its Known Exploited Vulnerabilities catalog on June 25, signaling a dangerous escalation from theoretical risk to confirmed attacks. The vulnerability affects AMI MegaRAC SPx firmware, the behind-the-scenes software that lets IT teams remotely control servers even when they’re powered off. The development puts enterprise IT teams i

Lenovo expands enterprise AI server options

25 June 2025 @ 7:07 pm

The Lenovo Group (HKSE:0992.HK) has introduced an array of data center systems, software, and services optimized for artificial intelligence workloads as a part of its Hybrid AI Advantage product line. At the heart of the announcements is a compute appliance called the ThinkSystem SR680a V4. Lenovo says it features nearly two dozen processors in an air-cooled chassis and can run inference workloads up to 11 times faster than the company’s previous-generation hardware. Eight of the processors in the SR680a V4 are Nvidia Blackwell B200 AI accelerators while another six of the proce

DigitalOcean teams with AMD for low-cost GPU access

25 June 2025 @ 4:18 pm

Cloud infrastructure provider DigitalOcean Holdings (NYSE:DOCN) has announced a collaboration with AMD to provide DigitalOcean customers with low-cost access to AMD Instinct GPUs starting later this year. DigitalOcean already offers access to the Instinct GPUs but in bare metal instances. It will now offer what it calls GPU Droplets, which are built on virtualized hardware.  DigitalOcean offers a Kubernetes package that can be used with GPU Droplets should customers want to use a Kubernetes based system, according to Bratin Saha, chief product and technology officer of DigitalOcean.

Neoclouds roll in, challenge hyperscalers for AI workloads

25 June 2025 @ 3:41 pm

Neocloud is not a term from the Matrix movies. It’s not a product. It’s not a technology. It’s not a service. The neoclouds are vendors that offer GPU processing-as-a-service (GPUaaS). Some are startups. Some began aggregating GPUs for crypto-mining and transitioned to GPUaaS. There are some whose primary business is building and operating data centers. They are all hoping to capitalize on the surging demand for AI, machine learning, data analytics and other use cases that require high-performance computing. They are also operating in a business climate in wh

Cisco: Latest news and insights

24 June 2025 @ 9:21 pm

Cisco (Nasdaq:CSCO) is the dominant vendor in enterprise networking, and under CEO Chuck Robbins, it continues to shake things up.  Cisco is focusing on strategic AI initiatives and partnerships across various regions to build and power AI data centers and ecosystems. This includes collaborations with major players like BlackRock, Global Infrastructure Partners, Microsoft and Nvidia to drive investment and scale AI infrastructure. The networking giant continue

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Download of the day: GIMP 3.0 is FINALLY Here!

18 March 2025 @ 3:45 am

Wow! After years of hard work and countless commits, we have finally reached a huge milestone: GIMP 3.0 is officially released! I am excited as I write this and can't wait to share some incredible new features and improvements in this release. GIMP 2.10 was released in 2018, and the first development version of GIMP 3.0 came out in 2020. GIMP 3.0 released on 16/March/2025. Let us explore how to download and install GIMP 3.0, as well as the new features in this version. Love this? sudo share_on: Twitter - Facebook -

How to list upgradeable packages on FreeBSD using pkg

16 March 2025 @ 8:25 pm

See all FreeBSD related FAQ Here is a quick list of all upgradeable packages on FreeBSD using pkg command. This is equivalent to apt list --upgradable command on my Debian or Ubuntu Linux system. Love this? sudo share_on: Twitter -

Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement

16 March 2025 @ 12:17 pm

In a move that has sparked significant discussion within the Ubuntu Linux fan-base and community, Canonical, the company behind Ubuntu, has announced its intention to explore the potential replacement of GNU Core Utilities with the Rust-based "uutils" project. They plan to introduce new changes in Ubuntu Linux 25.10, eventually changing it to Ubuntu version 26.04 LTS release in 2026 as Ubuntu is testing Rust 'uutils' to overhaul its core utilities potentially. Let us find out the pros and cons and what this means for you as an Ubuntu Linux user, IT pro, or developer. Love this? sudo share_on: Twitter -

How to install KSH on FreeBSD

3 March 2025 @ 11:50 pm

See all FreeBSD related FAQ Installing KSH (KornShell) on FreeBSD can be done with either FreeBSD ports or the pkg command. The ports collection will download the KSH source code, compile it, and install it on the system. The pkg method is easier, and it will download a pre-compiled binary package. Hence, it is recommended for all users. KornShell (KSH) has a long history, and many older Unix systems and scripts rely on it. As a result, KSH remains relevant for maintaining and supporting legacy infrastructure. Large enterprises, especially those with established Unix-based systems, continue to use KSH for scripting and system administration tasks. Some industries where KS

Linux Sed Tutorial: Learn Text Editing with Syntax & Examples

3 March 2025 @ 9:47 am

See all GNU/Linux related FAQ Sed is an acronym for "stream editor." A stream refers to a source or destination for bytes. In other words, sed can read its input from standard input (stdin), apply the specified edits to the stream, and automatically output the results to standard output (stdout). Sed syntax allows an input file to be specified on the command line. However, the syntax does not directly support output file specification; this can be achieved through output redirection or editing files in place while making a backup of the original copy optionally. Sed is one of the most powerful tools on Linux and Unix-like systems. Learning it is worthwhile, so in t

How to tell if FreeBSD needs a Reboot using kernel version check

23 February 2025 @ 10:07 pm

See all FreeBSD related FAQ Keeping your FreeBSD server or workstation updated is crucial for security and stability. However, after applying updates, especially kernel updates, you might wonder, "Do I need to reboot my system?" Let's simplify this process and provide a straightforward method for determining whether a reboot is necessary using the CLI, shell script, and ansible playbook. Love this? sudo share_on: Twitter

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being powered by 100% renewable energy – wind, solar, and hydro, all thanks to our partnership with EDF. So while your website might be generating traffic, [read more...]

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business has an online presence. Web hosts will securely store your website’s files, images, and digital content on a server, making it accessible to the public [read more...]

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The source server does not appear to be a Plesk server” “Plesk Migrator tool requires original ‘root’ user access or root user with GUI/UID = 0.” [read more...]

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The source server does not appear to be a Plesk server” “Plesk Migrator tool requires original ‘root’ user access or root user with GUI/UID = 0.” [read more...]

Are your website fonts sending the right message?

3 February 2025 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand?

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some of our most popular products to get the tools you need at a fraction of the cost. What’s on Offer? Here’s what you can save [read more...]

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load, visitors are likely to abandon it faster than you can say “bounce rate.” But fear not! Here are some tips to help you optimise your [read more...]

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet.

10 of the best WooCommerce plugins

27 October 2022 @ 10:53 am

Including options for optimising your cart, boosting customer loyalty, and selling tickets.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

sshd setting `AcceptEnv HOME` doesn't seem to work

30 June 2025 @ 12:50 pm

I ssh into a running Docker container. This container has mounted home directory to an NFS partition, shared between several containers. Therefore directory /home/username is the same for all users, and everyone has to use common .bashrc, .gitignore, etc. I'd like to avoid this. I can create custom docker image and run the container from it. In my Dockerfile I have a line that adds AcceptEnv HOME to /etc/ssh/sshd_config However, when I try to ssh into a new container, environment variable HOME still points to /home/username $ ssh -v -o SetEnv='HOME=/home/username/subdir' [email protected] OpenSSH_x.xxx Ubuntu-xxx OpenSSL 3.0.13 30 Jan 2024 ... debug1: channel 0: setting env HOME = "/home/username/subdir" Then in the terminal: $ echo $HOME /home/username And I can verify that AcceptEnv HOME is set by issuing c

How to mount(/bind) a host folder for the database files for a Docker-ized SQL Server Express instance?

30 June 2025 @ 11:06 am

I'm executing the following command line on MS Windows 11: docker run -e "ACCEPT_EULA=Y" -e "SA_PASSWORD=Pass@word" -e "MSSQL_PID=Express" -p 1433:1433 --mount type=bind,src=D:/LocalDB/SQLExpress/DataFiles,dst=/var/opt/mssql/data -d --name=mssqlexpress mcr.microsoft.com/mssql/server:latest which results in an error: docker: Error response from daemon: invalid mount config for type "bind": bind source path does not exist: /run/desktop/mnt/host/d/LocalDB/SQLExpress/DataFiles. The D:/LocalDB/SQLExpress/DataFiles folder does exist on my system. I have set Full Permissions for this folder for Everyone. How to solve the subject issue? PS: the following command line works on the same MS Windows host: docker run -e "ACCEPT_EULA=Y" -e "SA_PASSWORD=Pass@word"

GPO network admins as local admins

30 June 2025 @ 10:52 am

I've got a client PC on my domain that has the local administrator account disabled. I've managed to allow the Domain Admins some admin access on client PCs like running cmd as administrator and opening some settings, but they are STILL not members of the local Administrators group despite settings configured in GPO for restricted groups and computer settings to enable the local administrator account. There are some settings that Domain Admins still can't access like opening network settings. It says it requires elevation, so clealry these accounts are not elevated. No other administrators on the client and anything I do with GPO to try and enable it or add Domain Admins to the local admins group just doesn't work. I look at local users and groups on the client and the disabled local admin is the only member of the Administrators group. Please help!

Remote Probe activation not happening on PRTG Core Server

30 June 2025 @ 9:32 am

I would like to preface this by saying that I have not used PRTG a lot. I am doing a PRTG installation with 2 remote probes connecting to the Core server in a offline Windows environment. Summarization of the environment: Browser: Microsoft Edge OS: Windows Server 2016 Host A: Core server, IP: 192.168.1.1/24, Firewall = off (added port 23560 TCP inbound) Host B: Remote probe 1, IP: 192.168.1.100/24, Firewall = off (added port 23560 TCP outbound) Host C: Remote probe 2, IP: 192.168.1.200/24, Firewall = off (added port 23560 TCP outbound) Powershell: Host B & C can do a fully successful Test-NetConnection on port 23560 for Host A. I have opened up all ports necessary for PRTG, but to make it work regardless I have deactivated the firewall as a whole on all 3 hosts. What happens is, the remote probe installer finishes successfully on Host B & Host C. Yet there is no activation screen on Host A. It st

Kubernetes: helm deploys only part of the defined templates

30 June 2025 @ 7:45 am

I use minikube kubernetes cluster installed on a Rocky linux 9.6 VM. I am trying to create a Helm chart for deploying an application, but some of the defined templates are not being deployed inside my cluster. For example: one of my .yaml files inside templates/ defines these secrets: --- apiVersion: v1 kind: Secret type: kubernetes.io/dockerconfigjson metadata: name: dockerconfig namespace: {{ .Values.namespace.name }} data: .dockerconfigjson: {{ (.Files.Get .Values.dockerconfigjson.internalservicespath) | b64enc }} --- apiVersion: v1 kind: Secret metadata: name: rsaencryption namespace: {{ .Values.namespace.name }} type: Opaque data: priv.rsa.pem: {{ (.Files.Get .Values.rsa.privatekeypath) | b64enc }} pub.rsa.pem: {{ (.Files.Get .Values.rsa.pubkeypath) | b64enc }} --- apiVersion: v1 kind: Secret metadata: name: certificates namespace: {{ .Values.namespace.name }} type: kubernete

Don't understand if I should use Cloudflare Tunnels with an Application or just with the Warp Client?

30 June 2025 @ 7:19 am

I'm trying to restrict access to our AWS VPC servers (a few legacy window servers, like DB, IIS, etc) from our developer laptops and wish to do this via Cloudflare Tunnels. We have an tiny EC2 running cloudflared docker image and the connection is "Healthy". Tunnel has no "public hostname" and no "private network" Now is the confusing part. I'm under the impression that if we make an "application" we can then connect (e.g. RDP over port 3389) to the server via a nice DNS name (e.g. myapp.example.com) and we can connect. No warp-client needed? Of course, I need the RDP.exe client but that's fine. Or We can make no application (leave that alone) and somehow expose the small VPC (i think it's something like 172.1.2.25/29 (so ips 25->31) and then just RDP or HTTPS or connect via 1433 (using Sqlserver Managment Studio / Azure DevOps / dotnet application, via dotnet run ..) ? Have I understood this right?

Nagios check command error

30 June 2025 @ 6:53 am

I'm having an issue with a check command.. the command is check_files -a path="D:\\backup pattern=*.* 'filter= written > -24h' 'crit= count < 1' 'empty-state=critical' 'empty-syntax=${status}: *WARNING* Backup within 24hours found' I am using check_nrpe to run the command I get the output: No handler for command: check_files If i run from the command line, i get the same. reading the docs, the check_files is part of Checkdisk, which is enabled in the nsclient config. any help appreciated A

Fail over solution for one server with two ISP [closed]

30 June 2025 @ 12:43 am

I have a web server in my home. I need a backup ISP in case my primary ISP fails. From my understanding, with two IP addresses, I need two 'A' records since there can only be one example.com. Since the website visitors initiate the connection to the server, they need to use the 'A' records to connect. If an ISP failed, the A records do not know which link has failed. I found DNSMadeEasy. It looks like they monitor your connections, then manage the 'A' records, but I think it can take hours to resolve, plus caching is involved. What about the active sessions? I would prefer a solution that would not add a middleman. I am not really concerned with the cost. Everything I read is for advanced setups, not a simple one server two ISP from home. I prefer a backup connection that is not wireless. I don't need load balancing, just a backup.

How to handle a fragmented UDS/UDP message? [closed]

29 June 2025 @ 1:20 pm

I'm building a high velocity distributed database in Rust, using io_uring, eBPF and the NVMe API, which means I cannot use 99% of the existing libraries/frameworks out there, but instead I need to implement everything from scratch, starting from a custom event loop. At the moment I implemented only Unix Domain Socket/UDP/TCP, without TSL/SSL (due to lack of skills), but I would like to make the question as generic as possible (UDS/UDP/TCP/QUIC both in datagram and stream fashion, with and without TLS/SSL). Let's say Alice connect to the database and sends two commands, without waiting for completion: SET KEY1 PAYLOAD1 SET KEY2 PAYLOAD2 And let's say the payloads are big, big enough to not fit one packet. How can I handle this case? How can I detect that two packets belong to the same command? I thought about putting a RequestID / SessionID in each packet, but I would need to know whe

GPG keyrings default configuration

29 June 2025 @ 10:34 am

I am not sure whether GPG supports more than 1 keyring. Is there standard practice for configuration with 2 keyrings - one for users keys and other for system keys (read only for regular user)? If possible with priority for system keyring, i.e. GPG tries to find a key in system keyring first, then user's. In the same time, if new key is added it goes in user's keyring. I know this can be done with keyring path as command line option but expect keyrings can be defined in configuration file and located automatically. At least, is there default file location for system keyring? And one additional question - is there new version of PGP (at least for Windows) or only GPG is supported?

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10