trello.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

For the creation of agile user stories and project collaboration.

hascanvas.com

VN:F [1.9.22_1171]
Rating: 7.0/10 (1 vote cast)

HTML5 Canvas experiments using processing.js

processingjs.org

VN:F [1.9.22_1171]
Rating: 7.0/10 (1 vote cast)

visual programming language, designed for the web. Makes your data visualizations, art, animations, graphs, video games.

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

How to Choose the Perfect Domain Name for Your Business

9 July 2025 @ 9:30 am

Get Your Name Right – The Internet Never Forgets Choosing a domain name might sound simple – until you realise it’s the online equivalent of naming your child. No pressure.... The post How to Choose the Perfect Domain Name for Your Business appeared first on Heart Internet.

What is a VPS? And is it Time You Got One?

25 June 2025 @ 9:30 am

Discover what a VPS server is, how VPS hosting works, and why it’s ideal for small businesses. Learn the benefits and explore VPS plans with Heart Internet. The post What is a VPS? And is it Time You Got One? appeared first on Heart Internet.

We’re Now Certified by the Green Web Foundation

11 June 2025 @ 9:30 am

💚 Hosting that works hard, treads lightly.   Big news: Heart Internet is now officially listed with the Green Web Foundation. That means our hosting services are recognised as being... The post We’re Now Certified by the Green Web Foundation appeared first on Heart Internet.

What is Web Hosting and Why Does Your Business Need It?

6 May 2025 @ 4:54 pm

Without web hosting, your website would not be visible or accessible to users! It is crucial to host your website with a website hosting service to ensure that your business... The post What is Web Hosting and Why Does Your Business Need It? appeared first on Heart Internet.

How to Enable Root Access via SSH on Your VPS for Migration using Plesk

11 March 2025 @ 7:41 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access via SSH on Your VPS for Migration using Plesk appeared first on Heart Internet.

How to Enable Root Access on Your VPS Server Using Plesk

11 March 2025 @ 7:40 am

If you get one of the following messages from the Plesk migrator you should check that you are using root as the username along with the Plesk admin password. “The... The post How to Enable Root Access on Your VPS Server Using Plesk appeared first on Heart Internet.

Are your website fonts sending the right message?

3 February 2025 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand? The post Are your website fonts sending the right message? appeared first on Heart Internet.

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some... The post Black Friday at Heart Internet appeared first on Heart Internet.

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load,... The post 13 Easy Ways to Optimise Your Website for Speed and Performance appeared first on Heart Internet.

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet. The post Black Friday and Cyber Monday sale now on at Heart Internet appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Setting Up Secure Access with port knocking using nftables

15 January 2026 @ 3:37 pm

I’ve been working on securing my home server and I’m exploring port knocking with nftables. The goal is to hide certain services and only allow access after a specific sequence of connection attempts. I’ve set up basic rules, but I’m unsure about: Best practices for sequence complexity Avoiding brute force attempts Logging port knocks efficiently without filling up logs Has anyone successfully implemented port knocking with nftables in a way that’s stable and secure? Any sample rules or guides would be appreciated.

Docker nftables forward rules seem ignored in the context of policy drop despite of priority

15 January 2026 @ 12:27 pm

Context I let docker (29.1.4, build 0e6fee6) produce its own rules { "firewall-backend": "nftables" } and I am working on their cohabitation with my main pretty restrictive table table inet filter { chain input { type filter hook input priority filter; policy drop; iifname "lo" accept ct state established,related accept icmp type echo-request limit rate 5/second burst 5 packets accept tcp dport 22 accept comment "Accept SSH IN" .... log prefix "nftables-INPUT: " counter packets 0 bytes 0 drop } chain forward { type filter hook forward priority -100; policy drop; # Don't want to add those every time I create a # a new docker br-* network

RHEL 10: Windows RDP (mstsc) authentication error with GNOME Remote Desktop, xrdp/tigervnc not available

15 January 2026 @ 12:11 pm

I’m trying to access a RHEL 10 server GUI from Windows using RDP (mstsc). Environment OS: RHEL 10 Desktop: GNOME SELinux: Enforcing Windows client: Remote Desktop Connection (mstsc) What I tried XRDP install sudo dnf install -y xrdp Result: No match for argument: xrdp VNC install sudo dnf install -y tigervnc-server Result: No matches found GNOME Remote Desktop (RDP) Installed: sudo dnf install -y gnome-remote-desktop Enabled Remote Desktop/Remote Login in GUI: Settings → System → Remote Desktop → enabled Firewall opened: sudo firewall-cmd --permanent --add-service=rdp sudo firewall-cmd --reload Firewall status: sudo firewall-cmd --list-all Shows: ports: 3389/tcp services: rdp ssh cockpit Port listening: sudo ss -tulnp | grep 3389 Output:

How to base apache htaccess on folder/file whitelist instead of a blacklist?

15 January 2026 @ 11:04 am

I am trying to set up an access policy in the .htaccess file, note that I am aware of other protection layers like server config in VirtualHosts, file permissions etc. - this question is not about those it's strictly aimed at the .htaccess itself. I would like to base the security on whitelisting folders and files rather than blacklisting. So far I was not able to do this in any other way then through RewriteCond & RewriteRule (or RedirectMatch). My initial attempt was to use <Directory> however that's not allowed in my set up to be placed on the top level and neither in any of <If ...host... - because I need for this to work for the main host but also to be applied for any special host in ADDITION to their special settings. I also tried to put <Files> inside <RequireAll> but that ends up with "<Files> cannot occur within <Limi

Is there any documentation on Ext2 about internal make2fs calculations? For example: Number of GDT Reserved Blocks?

15 January 2026 @ 12:46 am

I am studing ext2~ext4 filesystems (in deep). I got curious about one fact envolving 2 pendrives formatted as ext2 and ext3: The ext2 is about 8 GB disk, the partition has 41 groups, blocks of 4KiB and gd_size 32 bytes, partition size ~ 5.2GB The ext3 is a different pendrive of 16 GB, 42 groups, blocks of 4 KiB and gd_size also 32 bytes, partition size ~ 5.3GB I wondered why for those similar partitions, the first Reserved GDT Blocks are 328 but the second one is 594 (almost twice). Is it related to the existence of ext3 journal? I got these numbers from dumpe2fs and I am sure of these values. Is there any document that explains the exact calculation and variables used internally in make2fs to determine "how many GDT blocks should be reserved" for a certain disk, block_size, etc... ?

Windows 11 client returns "System error 86" when accessing Windows 11 SMB share, while other clients work

14 January 2026 @ 4:02 pm

I have several Windows 11 Pro machines joined to a domain. The domain controller is currently offline, but users can still log in using cached credentials. We temporarily moved some shared folders to a standalone Windows 11 Pro machine (not joined to the domain). Access is done using local accounts on that server. This works fine from most clients, but a few specific Windows 11 machines suddenly stopped working. From the affected clients: net use \\192.168.0.6\share /user:192.168.0.6\user System error 86 has occurred. The specified network password is not correct. The same credentials work: From other Windows 11 clients Against the same server For the same share What I already tried on the failing clients: Remove all stored credentials (cmdkey, Credential Manager) Use explicit local credentials with net use (server\user, IP\user) Test from a local account on the

Active directory Sites and Services - always wrong site

14 January 2026 @ 1:04 pm

hope you're all well. I've recently joined a company as a solo IT, that has offices in couple of geographical location, quite distant from one another. I am not a senior with 20 years of experience, but I do believe am decent and resourceful. I'm setting the local domain and got the domain controller that I joined to the domain. Next step I setup the "Sites and Services", so the devices know which is the closest DC for them. I set up the ADSS with the local subnet 10.151.0.0/16, and also 10.151.1.0/24 and 10.151.5.0/24 which are office client subnet and server subnet respectively. However, the clients do not use the local DC and always go to another site. I believe the DC in this subnet is PDC. I looked through the subnets, none falls within this range so there is no conflict. DNS is on DC (primary self, secondary some other DC - tried swapping these too, no changes), and WiFi controllers are set to point to the local DC as DNS for

Assign Entra ID user Windows VM Role

13 January 2026 @ 11:44 pm

I want an Entra ID group and the users in the group to be able to logon to assigned Entra ID joined machines and assign them a certain role (user, admin, ...). The problem: the Entra ID joined virtual machines are not hosted within Azure, and I am unable to do this conveniently by vm user role assignment in Azure. How would I be able to automate such a process? In summary: by adding an Entra ID User to group -> Entra ID user is able to logon to selected machines and has selected rights (user or admin)

Access IIS Webpage After UAC Authentication

13 January 2026 @ 9:37 pm

I have a COTS software I have had to move to a custom location. That location is in a secured file area limiting who can access the folder. When I go to the webpage it shows me all the titles for everything like "login-btn" or "box.signin.label" and also pops up a UAC window. When I authenticate with the UAC window it refreshes the page with the page looking correctly with the correct data, wording, and pictures. When looking at developer tools it, it says on initial load it says it can't access 2 folders within the same folder as the webpage (i.e. "assets" and "resources" folders). If this webpage is serving the webpage from IIS and pointing to a specific folder, why is it popping UAC to access the resources and what permissions do I need to give the folder be able to access the webpage without UAC? Update: Current Permissions Of The Folder: ALL APPLICATION PACKAGES: Read & Ex

I need to use a jump condition in PAM with sshd

13 January 2026 @ 7:34 pm

I need to skip a line in my pam stack for sshd - if and only if - the $PAM_USER is a member of a group called linux_svc_accts. I'm using Rocky Linux. I've tried: auth [success=1] pam_succeed_if.so user ingroup linux_svc_accts auth required pam_google_authenticator.so nullok What I'm running into only when there is a jump condition in the second column is the "fatal: PAM: pam_setcred(): Permission denied" error that I think is referenced in #583 (https://github.com/linux-pam/linux-pam/issues/583). What is a workaround in order to solve my problem in PAM that is caused by how sshd works?

canvasdemos.com

VN:F [1.9.22_1171]
Rating: 7.0/10 (1 vote cast)

Demos featuring the flash busting canvas HTML5

ie6countdown.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

The countdown to the death of Microsoft Internet Explorer 6 (IE6)

github.com

VN:F [1.9.22_1171]
Rating: 8.2/10 (5 votes cast)

GitHub is the best way to collaborate with others. Fork, send pull requests and manage all your public and private git repositories.

Building an agentic memory system for GitHub Copilot

15 January 2026 @ 9:31 pm

Copilot’s cross-agent memory system lets agents learn and improve across your development workflow, starting with coding agent, CLI, and code review. The post Building an agentic memory system for GitHub Copilot appeared first on The GitHub Blog.

When protections outlive their purpose: A lesson on managing defense systems at scale

15 January 2026 @ 8:54 pm

User feedback led us to clean up outdated mitigations. See why observability and lifecycle management are critical for defense systems. The post When protections outlive their purpose: A lesson on managing defense systems at scale appeared first on The GitHub Blog.

GitHub Availability Report: December 2025

14 January 2026 @ 10:06 pm

In December, we experienced five incidents that resulted in degraded performance across GitHub services. The post GitHub Availability Report: December 2025 appeared first on The GitHub Blog.

Community-powered security with AI: an open source framework for security research

14 January 2026 @ 6:45 pm

Announcing GitHub Security Lab Taskflow Agent, an open source and collaborative framework for security research with AI. The post Community-powered security with AI: an open source framework for security research appeared first on The GitHub Blog.

What AI is actually good for, according to developers

13 January 2026 @ 6:39 pm

AI is designed to help you do what you love most, not replace your expertise. Discover how developer feedback and real-world experience are shaping AI coding tools that keep you in control. The post What AI is actually good for, according to developers appeared first on The GitHub Blog.

Want better AI outputs? Try context engineering.

12 January 2026 @ 5:00 pm

Learn how custom instructions, reusable prompts, and custom agents help GitHub Copilot deliver more accurate results. The post Want better AI outputs? Try context engineering. appeared first on The GitHub Blog.

Light waves, rising tides, and drifting ships: Game Off 2025 winners

10 January 2026 @ 9:36 pm

Out of more than 700 games submitted to Game Off 2025, these ten winners stand out for creativity, craft, and bold interpretations of the WAVES theme. All are free to play, with source code available to explore. The post Light waves, rising tides, and drifting ships: Game Off 2025 winners appeared first on The GitHub Blog.

Why AI is pushing developers toward typed languages

8 January 2026 @ 10:25 pm

AI is settling the “typed vs. untyped” debate by turning type systems into the safety net for code you didn’t write yourself. The post Why AI is pushing developers toward typed languages appeared first on The GitHub Blog.

Agentic AI, MCP, and spec-driven development: Top blog posts of 2025

30 December 2025 @ 5:20 pm

Explore the GitHub Blog’s top posts covering the biggest software development topics of the year. The post Agentic AI, MCP, and spec-driven development: Top blog posts of 2025 appeared first on The GitHub Blog.

Bugs that survive the heat of continuous fuzzing

29 December 2025 @ 10:01 pm

Learn why some long-enrolled OSS-Fuzz projects still contain vulnerabilities and how you can find them. The post Bugs that survive the heat of continuous fuzzing appeared first on The GitHub Blog.

bitbucket.org

VN:F [1.9.22_1171]
Rating: 8.4/10 (5 votes cast)

The alternative to Github, private and open git repositories.

code.google.com

VN:F [1.9.22_1171]
Rating: 3.7/10 (3 votes cast)

Google code homepage

Under the Hood: Universal Commerce Protocol (UCP)

The Universal Commerce Protocol (UCP) is a new, open-source standard for agentic commerce, co-developed by Google and industry leaders. It establishes a common, secure language to connect consumer surfaces (like Gemini and AI Mode in Search) with business backends, enabling seamless shopping from product discovery to purchase. UCP simplifies integration for businesses, supports various payment providers, and is designed to power the next generation of conversational commerce experiences.

MediaTek NPU and LiteRT: Powering the next generation of on-device AI

LiteRT and MediaTek are announcing the new LiteRT NeuroPilot Accelerator. This is a ground-up successor for the TFLite NeuroPilot delegate, bringing seamless deployment experience, state-of-the-art LLM support, and advanced performance to millions of devices worldwide.

Building with Gemini 3 in Jules

Jules, an always-on, multi-step software development agent, now features Gemini 3, offering clearer reasoning and better reliability. Recent improvements include parallel CLI runs, a stable API, and safer Git handling. Upcoming features include directory attachment without GitHub and automatic PR creation. Jules aims to reduce software writing overhead so developers can focus on building.

Building production AI on Google Cloud TPUs with JAX

The JAX AI Stack is a modular, industrial-grade, end-to-end machine learning platform built on the core JAX library, co-designed with Cloud TPUs. It features key components like JAX, Flax, Optax, and Orbax for foundational model development, plus an extended ecosystem for the full ML lifecycle and production. This integration provides a powerful, scalable foundation for AI development, delivering significant performance advantages.

Build with Google Antigravity, our new agentic development platform

Introducing Google Antigravity, a new agentic development platform for orchestrating code. It combines an AI-powered Editor View with a Manager Surface to deploy agents that autonomously plan, execute, and verify complex tasks across your editor, terminal, and browser. Agents communicate progress via Artifacts (screenshots, recordings) for easy verification. Available now in public preview.

Unlocking Peak Performance on Qualcomm NPU with LiteRT

LiteRT's new Qualcomm AI Engine Direct (QNN) Accelerator unlocks dedicated NPU power for on-device GenAI on Android. It offers a unified mobile deployment workflow, SOTA performance (up to 100x speedup over CPU), and full model delegation. This enables smooth, real-time AI experiences, with FastVLM-0.5B achieving over 11,000 tokens/sec prefill on Snapdragon 8 Elite Gen 5 NPU.

New Gemini API updates for Gemini 3

Gemini 3 is available via API with updates for developers: new `thinking_level` for depth control, `media_resolution` for multimodal processing, and enforced `Thought Signatures` for agentic workflows, especially with function calling and image generation. It also introduces combining Google Search/URL Grounding with Structured Outputs and new usage-based pricing for Grounding. Best practices, like using default temperature, are advised for optimal results.

Announcing the Data Commons Gemini CLI extension

The new Data Commons extension for the Gemini CLI makes accessing public data easier. It allows users to ask complex, natural-language questions to query Data Commons' public datasets, grounding LLM responses in authoritative sources to reduce AI hallucinations. Data Commons is an organized library of public data from sources like the UN and World Bank. The extension enables instant data analysis, exploration, and integration with other data-related extensions.

Architecting efficient context-aware multi-agent framework for production

ADK introduces **Context Engineering** to scale AI agents beyond large context windows. It treats context as a compiled view over a tiered, stateful system (**Session, Memory, Artifacts**). This architecture uses explicit processors for transformation, enables efficient compaction and caching, and allows for strict, scoped context handoffs in multi-agent workflows to ensure reliability and cost-effectiveness in production.

Don't Trust, Verify: Building End-to-End Confidential Applications on Google Cloud

Google Cloud enables end-to-end confidential applications, protecting sensitive data 'in-use' with hardware isolation. The solution combines Confidential Space (TEE/attestation), Oak Functions (private sandbox), and Oak Session (attested end-to-end encryption for scale). This framework anchors user trust in open-source components, proving confidentiality for sensitive workloads like proprietary GenAI models, even when running behind untrusted load balancers.