explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Certificate-Based Authentication is now available on Amazon AppStream 2.0 multi-session fleets

21 February 2025 @ 10:30 pm

Amazon AppStream 2.0 improves the end-user experience by adding support for certificate-based authentication (CBA) on multi-session fleets running the Microsoft Windows operating system and joined to an Active Directory. This functionality helps administrators to leverage the cost benefits of the multi-session model while providing an enhanced end-user experience. By combining these enhancements with the existing advantages of multi-session fleets, AppStream 2.0 offers a solution that helps balance cost-efficiency and user satisfaction. By using certificate-based authentication, you can rely on the security and logon experience features of your SAML 2.0 identity provider, such as passwordless authentication, to access AppStream 2.0 resources. Certificate-based authentication with AppStream 2.0 enables a single sign-on logon experience to access domain-joined desktop and application streaming sessions without separate password prompts for Active Directory. This feat

Announcing fine-grained access control via AWS Lake Formation with EMR on EKS

21 February 2025 @ 6:00 pm

We are excited to announce the general availability of fine-grained data access control (FGAC) via AWS Lake Formation for Apache Spark with Amazon EMR on EKS. This enables you to enforce full FGAC policies (database, table, column, row, and cell-level) defined in Lake Formation for your data lake tables from EMR on EKS Spark jobs. We are also sharing the general availability of Glue Data Catalog views with EMR on EKS for Spark workflows. Lake Formation simplifies building, securing, and managing data lakes by allowing you to define fine-grained access controls through grant and revoke statements, similar to RDBMS. The same Lake Formation rules now apply to Spark jobs on EMR on EKS for Hudi, Delta Lake, and Iceberg table formats, further simplifying data lake security and governance. AWS Glue Data Catalog views with EMR on EKS allows customers to create views from Spark jobs that can be queried from multiple engines without requiring access to referenced tables. Admi

You can now use your China UnionPay credit card to create an AWS account

21 February 2025 @ 6:00 pm

Amazon Web Services, Inc. now supports China UnionPay credit cards for creating new AWS accounts, eliminating the need for international credit cards for customers in China. To use China UnionPay for creating your AWS account, enter your address and billing country in China, then provide your local China UnionPay credit card details and verify your personal identity or business license. All subsequent AWS charges will be billed in Chinese Yuan currency, providing convenient payment experience for customers in China. To get started, select China UnionPay as your payment method when creating a new AWS account. For more information on using China UnionPay credit cards with AWS, visit Set up a Chinese yuan credit card.  

Amazon MSK adds support for Apache Kafka version 3.8

21 February 2025 @ 6:00 pm

Amazon Managed Streaming for Apache Kafka (Amazon MSK) now supports Apache Kafka version 3.8. You can now create new clusters using version 3.8 with either KRAFT or ZooKeeper mode for metadata management or upgrade your existing ZooKeeper based clusters to use version 3.8. Apache Kafka version 3.8 includes several bug fixes and new features that improve performance. Key new features include support for compression level configuration. This allows you to further optimize your performance when using compression types such as lz4, zstd and gzip, by allowing you to change the default compression level. For more details and a complete list of improvements and bug fixes, see the Apache Kafka release notes for version 3.8. Amazon MSK is a fully managed service for Apache Kafka and Kafka Connect that makes it easier for you to build and

Amazon RDS for PostgreSQL supports minor versions 17.4, 16.8, 15.12, 14.17, 13.20

21 February 2025 @ 6:00 pm

Amazon Relational Database Service (RDS) for PostgreSQL now supports the latest minor versions 17.4, 16.8, 15.12, 14.17, and 13.20. Please note, this release supports the versions released by the PostgreSQL community on February, 20,2025 to address the regression that was part of the February 13, 2025 release. We recommend that you upgrade to the latest minor versions to fix known security vulnerabilities in prior versions of PostgreSQL, and to benefit from the bug fixes added by the PostgreSQL community. You can use automatic minor version upgrades to automatically upgrade your databases to more recent minor versions during scheduled maintenance windows. You can also use Amazon RDS Blue/Green deployments for RDS for PostgreSQL using physical replication for your mi

AWS CodePipeline adds native Amazon EC2 deployment support

21 February 2025 @ 6:00 pm

AWS CodePipeline introduces a new action to deploy to Amazon Elastic Compute Cloud (EC2). This action enables you to easily deploy your application to a group of EC2 instances behind load balancers. Previously, if you wanted to deploy to EC2 instances, you had to use CodeDeploy with an AppSpec file to configure the deployment. Now, you can simply use this new EC2 deploy action in your pipeline to deploy to EC2 instances, without the necessity of managing CodeDeploy resources. This streamlined approach reduces your operational overhead and simplifies your deployment process. To learn more about using the EC2 deploy action in your pipeline, visit our tutorial and documentation. For more information about AWS CodePipeline, visit our

AWS Database Migration Service now supports Multi-ENI networking for homogeneous migrations.

21 February 2025 @ 6:00 pm

Amazon Database Migration Service (DMS) now supports the Multi-ENI networking model and Credentials Vending System for DMS Homogenous Migrations. Customers can now choose the Multi-ENI connection type and use the Credentials Vending System, providing a simplified networking configuration experience for secure connectivity to their on-premises database instances. For information see documentation for AWS DMS Homogeneous Migrations. For AWS DMS regional availability, please refer to the AWS Region Table.  

AWS CodePipeline adds native Amazon EKS deployment support

20 February 2025 @ 6:35 pm

AWS CodePipeline introduces a new action to deploy to Amazon Elastic Kubernetes Service (Amazon EKS). This action enables you to easily deploy your container applications to your EKS clusters, including those in private VPCs. Previously, if you wanted to deploy to a EKS cluster within a private network, you had to initialize and maintain a compute environment within the private network. Now, you can simply provide the name of the EKS cluster and add this action to your pipeline. The pipeline will automatically establish a connection into your private network to deploy your container application, without additional infrastructure needed. This streamlined approach reduces your operational overhead and simplifies your deployment process. To learn more about using the EKS action in your pipeline, visit our tutorial and

AWS announces Backup Payment Methods for invoices

20 February 2025 @ 6:00 pm

Today, AWS announces the introduction of Backup Payment Methods for AWS invoices in all commercial AWS Regions. This feature enables customers to set up alternate payment methods that will be automatically charged for their invoices if the primary payment method fails. This will help customers make timely invoice payments without the need for manual intervention or last-minute payment updates. There are several benefits this feature brings to AWS customers. Firstly, it reduces the risk of missed or late payments due to issues with the primary payment method. Backup payment method provides peace of mind, knowing that there's a fallback payment method in place for invoice payments, reducing the risk of failed invoice payments. This can help maintain uninterrupted access to AWS services and avoid potential service disruptions. Secondly, it saves time and effort for customers by eliminating the need to manually update payment details or coordinate with their finance and account

Amazon EC2 G6e instances now available in Stockholm region

20 February 2025 @ 6:00 pm

Starting today, the Amazon EC2 G6e instances powered by NVIDIA L40S Tensor Core GPUs is now available in Europe (Stockholm) region. G6e instances can be used for a wide range of machine learning and spatial computing use cases. Customers can use G6e instances to deploy large language models (LLMs) with up to 13B parameters and diffusion models for generating images, video, and audio. Additionally, the G6e instances will unlock customers’ ability to create larger, more immersive 3D simulations and digital twins for spatial computing workloads. G6e instances feature up to 8 NVIDIA L40S Tensor Core GPUs with 48 GB of memory per GPU and third generation AMD EPYC processors. They also support up to 192 vCPUs, up to 400 Gbps of network bandwidth, up to 1.536 TB of system memory, and up to 7.6 TB of local NVMe SSD storage. Developers can run AI inference workloads on G6e instances using AWS Deep Learning AMIs, AWS Deep Learning Containers, or managed services such as Amazon Elas

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Do data centers threaten the water supply?

21 February 2025 @ 4:50 pm

With all the focus on power consumption, the water consumption of data centers has been somewhat overlooked. However, red flags are being raised in the United Kingdom, and those concerns that have application in the US as well and elsewhere. Data centers are already wearing out their welcome in certain areas. They are enormous buildings and even with modern designs are considered an eyesore, especially when you have dozens of them in one area like in Northern Virginia. And they draw heavily on local power resources, which is the main complaint, but now they’re also taking up lots of water. A BBC report cites research from Venkatesh Uddameri, a professor of civil &a

Versa Networks launches sovereign SASE, challenging cloud-only security model

20 February 2025 @ 2:22 pm

SASE since its inception has typically been deployed in a software-as-a-service (SaaS) model, delivering network security services from the cloud. Some organizations, however, have strict security and regulatory compliance needs that require SASE be deployed and managed under the direct control of an organization. That’s where the concept of sovereign SASE comes in. Sovereign SASE allows enterprises and service providers to deploy a SASE platform within their own on-premises or private cloud environments, rather than relying on a shared cloud-based service. Tod

‘No computation without generation,’ say Irish authorities

20 February 2025 @ 2:26 am

Irish authorities are proposing strict new rules for data center operators that will require new facilities “to provide generation and/or storage capacity to match the requested data center demand capacity.” Ireland is a popular location for data processing because of its low corporate taxation and relatively relaxed approach to data protection compared to the rest of the European Union, and this has led to a glut in demand for data center capacity that, in turn, has put pressure on the electricity grid. The new recommendation is an example of the strict approach to data center expansion plans many nations are having to take. It‘s contained in the

VMware by Broadcom: Product, service and support news

19 February 2025 @ 7:05 pm

News of Broadcom’s plans to acquire VMware triggered concerns among customers, partners, and industry watchers, many of whom recalled Broadcom’s track record with prior high-profile acquisitions, including network switching vendor Brocade in 2016 for almost $6 billion, software firm CA Technologies in 2018 for $19 billion, and Symantec’s enterprise security business in 2019 for $10 billion. So far, the $60 billion Broadcom-VMware deal has led to some layoff

Fortinet speeds threat detection with improved FortiAnalyzer

19 February 2025 @ 6:07 pm

Fortinet has reinforced its FortiAnalyzer security analytics and log management platform with capabilities that enhance enterprise threat detection and automate incident response. FortiAnalyzer securely collects logs from Fortinet devices such as FortiGate firewalls and endpoint security agents. It uses AI to look for trends, anomalies and potential security threats to then build security analyses, network traffic reports and incident response playbooks. The enhanced FortiAnalyzer is targeted at midsize enterprises and teams impacted by the cyber skills shor

Microsoft’s quantum ambition: One million qubits in the palm of your hand

19 February 2025 @ 4:02 pm

Microsoft announced a breakthrough in quantum computing today, unveiling a new kind of quantum processing unit, using a new type of material, to create what it says is a “radically different type of qubit.” The Majorana 1 – named after the Majorana quasiparticle – is designed to scale to a million qubits on a single chip that can fit in the palm of a hand. The goal is to bring the timeline for practical, reliable, large-scale quantum computers from decades down to years. The new chip uses a new state of matter. Instead of solid, liquid, or gas, it is in a topological state. The breakthrough required developing a new material made of indium arsenide and aluminum, which

Aryaka adds AI-powered observability to SASE platform

19 February 2025 @ 2:39 pm

SASE vendor Aryaka is looking to alleviate network alert fatigue with a little help from AI. Today Aryaka announced its Winter 2025 platform update, introducing its new AI Observe tool for advanced threat detection and prevention. The new update follows the company’s last update from 2024, which introduced cloud access security broker (CASB) capabilities and the AI Perform feature for optimizing network performance for AI applications. Aryaka has

More used Seagate HDDs disguised as new: Fraudsters make it tough to spot the difference

19 February 2025 @ 12:38 pm

The controversy surrounding used Seagate hard drives has significantly widened, with fraudsters now targeting the company’s IronWolf and IronWolf Pro NAS drives alongside the previously affected Exos server-grade HDDs. According to recent investigations, fraudsters have developed more sophisticated methods to manipulate used drives to make them appear new, making detection increasingly challenging for buyers. Initially limited to server-grade drives, the scandal now encompasses 8TB and 16TB NAS drives from Seagate’s IronWolf series. Unlike earlier cas

Hackers gain root access to Palo Alto firewalls through chained bugs

19 February 2025 @ 11:45 am

A high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS software, patched last week, is now being actively exploited by threat actors to gain root-level access to affected firewall systems. Tracked as CVE-2025-0108, the vulnerability allows an unauthenticated attacker with network access to the PAN-OS management web interface to bypass authentication requirements.

7 time-saving Linux commands

18 February 2025 @ 3:37 pm

Some Linux commands can make your time on the command line easier and more productive. This post covers some commands that can come in very handy. 1. Using the tldr command to simplify man pages The tldr command displays simplified man pages, providing practical examples of how to use a command and its options. It helps users to learn about a command without having to read through what might be an extensive man page. For example, if you want a quick view of how you can use the date command, you could use a command like what is shown below. Note that explanations of

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems

15 January 2025 @ 6:04 pm

Rsync is a opensource command-line tool in Linux, macOS, *BSD and Unix-like systems that synchronizes files and directories. It is a popular tool for sending or receiving files, making backups, or setting up mirrors. It minimizes data copied by transferring only the changed parts of files, making it faster and more bandwidth-efficient than traditional copying methods provided by tools like sftp or ftp-ssl. Rsync versions 3.3.0 and below has been found with SIX serious vulnerabilities. Attackers could exploit these to leak your data, corrupt your files, or even take over your system. There is a heap-based buffer overflow with a CVSS score of 9.8 that needs to be addressed on both the client and server sides of rsync package. Apart from that info leak via uninitialized stack contents defeats ASLR protection and rsync server can make client write files outside of destination directory using symbolic links. Love this? sudo share_on:

How to control the SSH multiplexing with the control commands

15 January 2025 @ 8:29 am

See all GNU/Linux related FAQ Multiplexing will boost your SSH connectivity or speed by reusing existing TCP connections to a remote host. This is useful when you frequently connect to the same server using SSH protocol for remote login, server management, using IT automation tools over SSH or even running hourly backups. However, sometimes your SSH command (client) will not respond or get hung up on the session when using multiplexing. Typically, this happens when your public IP changes (IPv4 to IPv6 changes when using DNS names), VPN issues, or firewall cuts connections. Hence, knowing SSH client control commands can save you time and boost your productivity when such gotc

ZFS Raidz Expansion Finally, Here in version 2.3.0

14 January 2025 @ 9:19 am

After years of development and testing, the ZFS raidz expansion is finally here and has been released as part of version 2.3.0. ZFS is a popular file system for Linux and FreeBSD. RAIDz is like RAID 5, which you find with hardware or Linux software raid devices. It protects your data by spreading it across multiple hard disks along with parity information. A raidz device can have single, double, or triple parity to sustain one, two, or three hard disk failures, respectively, without losing any data. Hence, expanding or adding a new HDD is a very handy feature for sysadmins in today's data-sensitive apps. Love this? sudo share_on: Twitter -

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

MySQL Change root Password Command

9 December 2024 @ 4:19 pm

See all MySQL Database Server related FAQ How do I change MySQL root password under Linux, FreeBSD, OpenBSD and UNIX-like like operating system over the ssh session? Love this? sudo share_on: Twitter - Facebook - Link

How to enable mouse to copy & paste in vim

28 November 2024 @ 1:44 pm

See all VI / Vim text editor related FAQs/HowTos Some Linux distro like Debian or specific BSD variants provide very little configuration support for mouse out of the box for Vim. Let us see how to paste in Vim using a mouse by enabling support, which is useful for new developers and sysadmin coming from Windows background. Love this? sudo share_on: Twitter -

How to install vnstat on Debian 12/11 to monitor network interface bandwidth usage

27 November 2024 @ 7:07 pm

See all Debian/Ubuntu Linux related FAQ Do you need to keep track of the network traffic (bandwidth) usage for the Network interface controller (NIC) of your Debian Linux-based cloud or bare metal server? Look no forward. Try the vnStat, a free and open-source console-based network traffic monitor that keeps a log of 5-minute intervals, hourly, daily, monthly, and yearly network traffic for the selected interface. Once installed, vnStat can be used even without root permissions on most systems. Love this? sudo share_on:

How to find hard disk (SSD) serial numbers in Linux

16 November 2024 @ 9:38 pm

See all GNU/Linux related FAQ You need to use the smartctl command to display the hard disk (SSD) serial numbers in Linux. This is useful when changing your hard disk if it goes bad. Love this? sudo share_on: Twitter - Facebook -

How to install kvm-ok on Debian or Ubuntu Linux

16 November 2024 @ 6:54 am

See all Linux Kernel Based Virtual Machine related FAQs/Howtos The KVM-ok command command will tell you if your Debian or Ubuntu Linux-powered server can host hardware-accelerated KVM virtual machines. KVM (Kernel-based Virtual Machine) is a free and open-source virtualization technology that is used with every Linux kernel. In other words, KVM will make your Linux computer into a hypervisor, allowing you to run multiple isolated virtual machines (VMs) on a single physical machine. However, KVM depends upon CPU hardware virtualization extensions like Intel VT-x or AMD-V to provide high-performance virtual machines. This support must be enabl

zcommands: Read gzip Compressed Text Files On a Fly on Linux and Unix

1 November 2024 @ 8:34 pm

zcommands Read gzip Compressed Text Files On a Fly on Linux and Unix Linux and Unix like operating systems comes with z* commands. These commands allow you to read gzip compressed text files using zless, zcat, zmore, and friends commands. The gzip command reduces the size of the files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz while keeping the same ownership modes, access, and modification times. z* commands have some cool usage too, such as display the current time in different zonename. Love this? sudo share_on:

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some of our most popular products to get the tools you need at a fraction of the cost. What’s on Offer? Here’s what you can save [read more...]

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load, visitors are likely to abandon it faster than you can say “bounce rate.” But fear not! Here are some tips to help you optimise your [read more...]

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet.

Are your website fonts sending the right message?

3 November 2022 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand?

10 of the best WooCommerce plugins

27 October 2022 @ 10:53 am

Including options for optimising your cart, boosting customer loyalty, and selling tickets.

9 creative alternatives to .com and .co.uk domains

5 October 2022 @ 2:37 pm

Discover the appeal of .ninja, .coffee, .guru and more - all available in our domain name sale.

Save up to 43% on WordPress Hosting in our latest sale

20 September 2022 @ 3:23 pm

We’ve just slashed the price of WordPress Hosting at Heart Internet.

What to do once you’ve bought a domain

7 September 2022 @ 12:48 pm

A guide to what to do next once you've chosen your perfect domain name.

Empowering quotes and motivational tips for entrepreneurs

25 August 2022 @ 8:33 am

Including quotes from Amelia Earhart and Barack Obama, to give you a little pick me up.

5 reasons we love cPanel

10 August 2022 @ 7:09 am

When browsing through hosting packages, you’ll often come across the word cPanel. But what exactly does this word mean and what are the benefits of buying a hosting package with cPanel included?

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

why did this happen all of sudden on this qnap nas?

22 February 2025 @ 4:16 am

the qnap 251+ raid0 4TB to 10TB did a copy duplicate place 10tb drive in and the problem started and the qnap will not see the 4tb drive can not see it in the os so i checked ssh and i get this [~] # sudo mdadm --examine /dev/sda3 /dev/sda3: Magic : a92b4efc Version : 1.0 Feature Map : 0x0 Array UUID : ba2eb985:92c91b0b:4efc99f5:4ee3bd87 Name : 1 Creation Time : Sun Aug 2 17:44:28 2020 Raid Level : raid0 Raid Devices : 2 Avail Dev Size : 15608143496 (7442.54 GiB 7991.37 GB) Super Offset : 15608143504 sectors State : clean Device UUID : d761e2de:f29787e3:a8705614:245ca30e Update Time : Sun Aug 2 17:44:28 2020 Bad Block Log : 512 entries available at offset -8 sectors Checksum : 9fb58a23 - correct Events : 0 Chunk Size : 512K Device Role : Active device 1 Array State : AA ('A' == active, '.' == missing, 'R' == replacing) [~] # sudo mdadm --verbose --assemble --force /dev/md0 /dev/sda3 mdadm: looking for devi

Public key algorithm support on Windows Server 2016 Datacenter v1607 build 14393.7785

21 February 2025 @ 10:43 pm

I wanted to check with the community about public key algorithm support on Windows Server 2016 Datacenter. I have a PFX file containing an RSA key pair with a signature algorithm using SHA-256. When I try to import this file into Windows Server 2016, it fails with an "incorrect password" error. However, when I import it into Windows Server 2019 or higher, it works without issues. I searched the internet for resources that clarify whether Windows Server 2016 supports these stronger algorithms, but I couldn't find any definitive information. My question is, does the Windows Server 2016 data center support the following public key algorithms? ECDSA Algorithms ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ED25519 Algorithms ssh-ed25519 RSA Algorithms rsa-sha2-256 rsa-sha2-512

Cannot delete file used by SYSTEM after creating it using DISKPART

21 February 2025 @ 9:26 pm

From my Windows Server 2019 VM, I created some files using DISKPART to test out the max size limitation of a Samba network share, like so: DISKPART> CREATE VDISK FILE="\\share-path\...\..." MAXIMUM=4193000 TYPE=FIXED 0 percent completed Since that would take a long time, and I already see the created file in the destination, I simply exited out early using Ctrl-C. However now I am not able to delete the test file, nor move it into any test directory, getting the error This action can't be completed because the file in open in System. Close the file and try again. Are there any other tools I could use to find and close whatever could still be using these files? Things I have tried: Openfiles.exe /query /s \\share-path\...\... - The network path was not found. handle \\share-path\...\... (from sysinternals) - No matching handles found.

How to migrate docker volume from one host to another host

21 February 2025 @ 9:13 pm

I want to migrate a volume from old host to a new host,so I run the container in the new host using docker compose and the app ceates a brand new volume in /var/lib/docker/volumes/db_mysql/_data but I have already the a backup of the volume in the old host in (/var/lib/docker/volumes/db_mysql/_data) what I did is to delete _data of the new host and replace it with the _data of the old host, but it did not work. Have I missed something please? Is this the right approach? did I miss permissions or something like that, thanks in advanced. i want just to mention that the old server has crashed.

Multiple ip addresses on one interface like in router, on a Debian machine

21 February 2025 @ 8:08 pm

If I specify a "static route" on a consumer home router that will point the whole subnet of 65535 addresses (like 10.10.0.0/16) to one of my Debian machines in a regular LAN (say, 195.168.5.5) that has only one physical interface, can I be sure that I will manage to write a server program (planning to do so using NodeJS and its net module) that will listen to the incoming requests no matter which of the local ip's is chosen? Will I need to configure this Debian machine to allow connections to that many ip addresses? I am supposing I will have to partially configure this machine as a router, maybe allow /proc/sys/net/ipv4/ip_forward, but omit the iptables config. Am I right? The question is above. Below is some rationale in case you're interested, but it's okay if I fail to clarify the purpose with my limited wording skills, in that case just please discard that and return to the question above. In case you ask what it is for t

Linux server don't respond [closed]

21 February 2025 @ 7:57 pm

I have Opensuse Leap 15.6, previously rocky 9 and on both system i have the same issiue. After about 1 week or 2 i cann't connect to the server. When i want to connect with ssh -> "permission denied", when i want to log in on zabbix webconsole the website is not reachable. What is realy weard that server do not react on keaybord and mounse witch is plugged. Funny is that smb works normaly. Do you have any idea what can i check? Hardware issiue? thx

Add md5 phrase to Google Secret Manager for authentication

21 February 2025 @ 7:48 pm

I'm using Google Secret Manager for storing sensitive data like API keys, passwords etc. Now I connect with Oauth2 to the Google Secret Manager API. In the future we're moving the webserver to Google Cloud so we can use IAM. On my webserver (Ubuntu 24.04 with Apache) I have a file secrets.php. In this file I have the code to connect to and read out secrets from Google Secret Manager. To harden security I would like to add a MD5 Phrase of secrets.php + the url (www.host.com/secrets.php) to Google Secret manager. When I connect to Google Secret Manager the connection should only be accepted if the MD5 Phrase stored in Google Secret Manager is equal to the MD5 Phrase of secrets.php and the url. This makes it impossible to change the content of secrets.php and limits access to Google Secret manager to only this file. Is this possible and how do I achieve this?

Windows to Linux remote connection - which protocol to choose that supports 3D acceleration and multiple simultanious sessions?

21 February 2025 @ 5:36 pm

I have the following setup: Server running Proxmox CE 8.x with a Debian 12 VM (Xfce, but can be changed if needed) Windows 10 client that remotely connects to the VM The VM is a test run for a much larger multi-user environment on a brand new server that has just arrived but needs to be added to the server room and domain. While the GPUs in it there are definitely newer, I would like to explore my options so that I can prepare the setup and possibly clone it (the new server will also run Proxmox). The VM will be used for AI tasks but not only. Multiple users requested a desktop manager since they feel more comfortable with the switch to Linux that way, hence the RDP/VNC/etc. research I am doing right now. I am using xrdp, which apparently uses vnc, which (according to my research) does not really deal with GPU acceleration at all. I am using an old Quadro K2000 via passthrough and installed the proprietary

Does this scenario require hairpin NAT?

21 February 2025 @ 4:31 pm

I have a web server with a public IP address (call it 1.1.1.1) and a local IP address (call it 10.10.10.10). The web server acts as a proxy for web sites on the 10.x.x.x range. The problem I am having is that the websites on the 10.x.x.x range cannot access each other via curling the websites domain name. In DNS, each domain name for each website is set to go to 1.1.1.1. When traffic from the websites leaves the network, it is source NAT'd by a router that sits in front of the web server to the address of the web server (1.1.1.1). There is no problem with devices on other networks accessing the websites which makes me think I would require hairpin NAT but wasn't 100% sure.

Controlling an Adaptec PM8018 from CLI Linux

21 February 2025 @ 2:50 pm

I'm trying to figure out how to manage an Adaptec PM8018 from Linux command line. Its working, driver is loaded, but I can't find any software for controlling it and the drives connected to it aren't showing up, so I want to delve into the controller to see what I can find. Here is my lspci command output: 41:00.0 Serial Attached SCSI controller: PMC-Sierra Inc. PM8018 Adaptec SAS Adaptor ASA-70165H PCIe Gen3 x8 6 Gbps 16-lane 4x SFF-8644 (rev 06) And I've grepped DMESG and its loading the driver properly: [259961.635102] pci 0000:41:00.0: [11f8:8018] type 00 class 0x010700 [259961.635167] pci 0000:41:00.0: reg 0x10: [mem 0xd4fe0000-0xd4feffff 64bit] [259961.635183] pci 0000:41:00.0: reg 0x18: [mem 0xd4ff0000-0xd4ffffff 64bit] [259961.635206] pci 0000:41:00.0: reg 0x30: [mem 0xd4000000-0xd40fffff pref] [259961.635295] pci 0000:41:00.0: supports D1 [259961.635301] pci 0000:41:00.0: PME# supported from D0 D1 D

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10