explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon EKS expands catalog of upgrade insight checks

20 December 2024 @ 10:45 pm

Today, Amazon Elastic Kubernetes Service (EKS) announces new enhancements to upgrade insights, a feature that surfaces cluster configuration issues that may impact your ability to successfully upgrade a cluster to a newer version of Kubernetes. With these new enhancements, EKS upgrade insights will scan and warn on cluster health and version compatibility issues between different Kubernetes and EKS components such as kubelet, kube-proxy and EKS add-ons. Kubernetes is a fast-paced, evolving open source project with 3 releases per year, making upgrades a routine part of running Kubernetes clusters. EKS upgrade insights automatically scan clusters against a list of potential Kubernetes version upgrade impacting issues. EKS periodically updates the list of insight checks to perform, based on evaluations of changes in the Kubernetes project, as well as changes introduced in the EKS service along with new versions. EKS upgrade insights surface issues and provide remediation recom

AWS Billing and Cost Management now supports custom billing views for decentralized cloud cost management

20 December 2024 @ 8:00 pm

AWS announces the general availability of custom billing view, a new feature within AWS Billing and Cost Management that enables customers to grant member accounts access to cost management data spanning multiple accounts within their organization. Custom billing view allows you to provide application and business unit owners with access to relevant cost management data across multiple AWS accounts using a single view in AWS Cost Explorer, without granting access to the management account. With custom billing view, you can create filtered views of cost management data based on cost allocation tags or specific AWS accounts. These views can be shared with member accounts using AWS Resource Access Manager, empowering teams to monitor, analyze and forecast their AWS spend across multiple accounts using AWS Cost Explorer, Cost Explorer reports, and the AWS Billing and Cost Management console homepage. This allows you to reduce the number of users that require access to the manag

Amazon MSK Connect adds support for Apache Kafka Connect version 3.7

20 December 2024 @ 7:00 pm

Amazon Managed Streaming for Apache Kafka Connect (Amazon MSK Connect) now supports Apache Kafka Connect version 3.7 for new connectors. Apache Kafka Connect version 3.7 includes several bug fixes and performance improvements. For more details and a complete list of improvements and bug fixes, see the Apache Kafka release notes for version 3.7. Amazon MSK Connect is a feature of Amazon MSK that allows you to run fully managed Apache Kafka Connect workloads on AWS. This feature makes it easy to deploy, monitor, and automatically scale connectors that move data between Apache Kafka clusters and external systems such as databases, file systems, and search indices. MSK Connect is fully compatible with Kafka Connect, enabling you to lift and shift your Kafka Connect applications with zero code changes. With MSK Connect, you o

Amazon Connect now provides built-in capabilities for customer authentication within chats

20 December 2024 @ 6:00 pm

Amazon Connect now provides built-in capabilities for customer authentication within chats, making it easier to verify customer identity and deliver personalized experiences. You can use the new Authenticate Customer flow block to simplify authentication in your chat workflows. For example, unauthenticated customers who require agent assistance can be shown a pop-up to sign-in before connecting with an agent, allowing agent’s to provide more personalized and efficient support. To get started, visit the new ‘Customer authentication’ page within the AWS Console to configure your identify provider, then add the Authenticate Customer block to your contact flow. To learn more, please refer to the help documentation or visit the

Amazon EC2 High Memory instances now available in Asia Pacific (Osaka) region

20 December 2024 @ 6:00 pm

Starting today, Amazon EC2 High Memory instances with 6TB of memory (u-6tb1.56xlarge and u-6tb1.112xlarge) are available in the Asia Pacific (Osaka) region. Customers can start using these new High Memory instances with On Demand and Savings Plan purchase options. Amazon EC2 High Memory instances are certified by SAP for running Business Suite on HANA, SAP S/4HANA, Data Mart Solutions on HANA, Business Warehouse on HANA, and SAP BW/4HANA in production environments. For details, see the Certified and Supported SAP HANA Hardware Directory. For information on how to get started with your SAP HANA migration to EC2 High Memory instances, view the Migrating SAP HANA on AWS to an EC2 High Memory Ins

Amazon QuickSight Launches Unique Key for Dataset

20 December 2024 @ 6:00 pm

Amazon QuickSight is excited to announce the launch of Unique Key for Dataset, enabling users to define additional aspects of their data semantics. The unique key will be used to improve performance for QuickSight visuals, especially un-aggregated table charts. Previously, to maintain table pagination stability, all columns in the table visual were sorted, which was an expensive query causing performance latency. Now, with the unique key defined in the dataset, once the column is used in the visual, users will automatically experience improved sorting performance without compromising user behavior. For some cases, the new approach can increase the performance up to 60% decrease of the visual rendering time. For further details, visit here. The new Unique Key for Dataset feature is now available in

Amazon RDS for MariaDB supports minors 11.4.4, 10.11.10, 10.6.20, 10.5.27

20 December 2024 @ 6:00 pm

Amazon Relational Database Service (Amazon RDS) for MariaDB now supports MariaDB minor versions 11.4.4, 10.11.10, 10.6.20, and 10.5.27. We recommend that you upgrade to the latest minor versions to fix known security vulnerabilities in prior versions of MariaDB, and to benefit from the bug fixes, performance improvements, and new functionality added by the MariaDB community. You can leverage automatic minor version upgrades to automatically upgrade your databases to more recent minor versions during scheduled maintenance windows. You can also leverage Amazon RDS Managed Blue/Green deployments for safer, simpler, and faster updates to your MariaDB instances. Learn more about upgrading your database instances, including automatic minor version upgrades and Blue/Green Deployments, in the

AWS Network Firewall now supports IPv6 Service Endpoints

20 December 2024 @ 6:00 pm

AWS Network Firewall introduces dual stack support for Network Firewall management API, enabling you to connect using Internet Protocol Version 6 (IPv6), Internet Protocol Version 4 (IPv4), or dual stack clients. Dual stack support is also available when the AWS Network Firewall management API endpoint is privately accessed from your Amazon Virtual Private Cloud (VPC) using AWS PrivateLink. Dual stack endpoints are made available on a new AWS DNS domain name. The existing AWS Network Firewall management API endpoints are maintained for backwards compatibility reasons. AWS Network Firewall is a managed firewall service that is easy to deploy. The service automatically scales with network traffic volume to provide high-availability protections without the need to set up and maintain the underlying infrastructure. With simultaneous support for both IPv4 and IPv

Amazon Q Business is now SOC compliant

20 December 2024 @ 6:00 pm

Amazon Q Business is now SOC (System and Organization Controls) eligible. Amazon Q Business is a generative AI–powered assistant that can answer questions, provide summaries, generate content, and securely complete tasks based on data and information in your enterprise systems. With the Amazon Q Business SOC certification, customers, can now use Amazon Q Business for use cases that are subject to Service Organization Control (SOC) requirements. Amazon Q Business is now SOC 1, 2 and 3 compliant, allowing you to get deep insight into the security processes and controls that protect customer data. AWS maintains SOC compliance through extensive third-party audits of AWS controls. These audits ensure that the appropriate safeguards and procedures are in place to protect against security risks that may affect the confidentiality, integrity, and availability of customer and company data.

Amazon WorkSpaces Personal now supports AWS Global Accelerator

20 December 2024 @ 6:00 pm

Amazon WorkSpaces Personal now integrates with AWS Global Accelerator (AGA) to enhance WorkSpaces connection performance by optimizing streaming traffic through the AWS Global Network and edge locations. This feature particularly benefits customers whose end users connect to WorkSpaces across long distances. The AGA feature can be enabled at either the WorkSpaces directory level or for individual WorkSpaces running DCV protocol. When advantageous, the service automatically routes the streaming traffic through the nearest AWS edge location and across AWS's congestion-free, redundant global network, delivering a more responsive and stable streaming experience. The WorkSpaces service fully manages AGA usage, subject to outbound data volume limits detailed in WorkSpaces documentation. This enhancement is available at no additional cost for Personal WorkSpaces running DCV protocol in all AWS Regions

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Threats delivered over encrypted channels continue to rise

20 December 2024 @ 6:28 pm

Encryption is the default for online communication, with nearly all web traffic protected by secure protocols like TLS/SSL. Yet, as encryption becomes more ubiquitous by the day, so do the opportunities for threat actors to exploit encrypted channels.The same encryption that safeguards legitimate activities also acts as a conduit for malicious ones. Attackers are using encrypted channels to bypass traditional defenses, concealing malware, phishing campaigns, cryptomining/cryptojacking, and data theft within encrypted traffic.The Zscaler ThreatLabz 2024 Encrypted Attacks Report examines this evolving

Nvidia’s Run:ai acquisition waved through by EU

20 December 2024 @ 5:16 pm

Nvidia will face no objections to its plan to acquire Israeli AI orchestration software vendor Run:ai Labs in Europe, after the European Commission gave the deal its approval Friday. The Commission’s executive vice president with responsibility for competition, Teresa Ribera, said, “Since Nvidia is a leading producer of key hardware for AI applications used in the EU and beyond, it was important to carefully check whether its acquisition of start-up software company Run:ai may have negatively impacted competition in critical markets which are key for future competitiveness. But our market investigation confirmed to us that other software options compatible with Nvidia’s hardware w

Transparency, efficiency, innovation: The digital transformation of policing in Kazakhstan

20 December 2024 @ 4:25 am

In the era of digital transformation, public safety stands at a critical crossroads. Law enforcement agencies globally are under increasing scrutiny to enhance transparency, efficiency, and trust within their communities. Against this backdrop, Kazakhstan’s “Digital Policeman” initiative has emerged as a shining example of technological innovation in policing. The initiative leverages state-of-the-art technologies like smart badges and military-grade mobile devices, designed to empower officers while ensuring accountability. These smart badges go beyond conventional body cameras, offering features such as continuous, tamper-proof video recording, GPS tracking, encrypted data handl

Network jobs watch: Hiring, skills and certification trends

18 December 2024 @ 5:45 pm

Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations, multicloud networking, zero trust network access (ZTNA), and SD-WAN. Here’s a recap of some of the latest industry research, hiring statistics, and certification trends that impact today’s network professionals, infrastructure and operat

How to work with text colors on Linux

18 December 2024 @ 5:32 pm

When you list files on the Linux command line, many of the file names show up in colors, as you’ve probably noticed. The colors used depend on the file types. For example, the names of directories will show up in a blue font. Here’s a list of the colors you can expect to see and what they represent: Blue: directory Green: executable or recognized data file Cyan: symbolic link file Yellow with black background: device Magenta (pink): graphic image file Red: archive file Red wi

CompTIA launches expert-level cybersecurity certification

18 December 2024 @ 4:54 pm

CompTIA this week made available its CompTIA SecurityX certification program, which is an updated version of the CompTIA Advanced Security Practitioner (CASP+) cert and part of CompTIA’s Xpert Series of certifications. SecurityX follows CompTIA’s release of DataX earlier this year, and it is designed for IT professionals with multiple years of work experience who want to validate their expert-level knowledge of business-critical technologies. The program will

IT/OT convergence propels zero-trust security efforts

18 December 2024 @ 11:00 am

Zero-trust security is essential to enterprises that are converging operational technology (OT) with IT infrastructure. New research from Enterprise Management Associates (EMA) identified how this convergence influences zero-trust strategy and implementation. Companies have historically secured OT systems – which include physical security controls, HVAC systems, industrial control systems like factory automation equipment, and medical scanning equipment – by air-gapping them. Physical isolation from IT networks protects OT systems against threats, but it also prevents companie

Smart cities in action: Kazakhstan’s Carpet CCTV project sets a new standard

18 December 2024 @ 9:28 am

In a world where technology increasingly shapes how cities manage safety and security, Kazakhstan’s Ministry of Internal Affairs is leading the way with its groundbreaking “Carpet CCTV” project. This ambitious initiative has revolutionized public safety by combining a massive surveillance network with advanced analytics and artificial intelligence, creating a system that shifts the focus from reactive responses to proactive prevention. Over the past four years, the scope of Kazakhstan’s surveillance infrastructure has expanded dramatically. The number of cameras has grown from just 40,500 to an impressive 1.3 million, with 313,000 cameras now directly accessible to police. These

Cisco grabs SnapAttack for threat detection

17 December 2024 @ 7:21 pm

Cisco is acquiring threat-detection startup SnapAttack for an undisclosed amount as it continues to expand its security portfolio. Established in 2001 by Booz Allen’s Dark Labs, SnapAttack is known for its threat detection and engineering technology, which melds threat intelligence, attack emulation, and behavioral analytics to help customers identify potential vulnerabilities and gaps in their networks, ideally before problems happen.  “SnapAttack provides a solution that supports the complete detection content lifecycle, starting with curate

Europe takes on Starlink with $11.5 billion IRIS² satellite constellation

17 December 2024 @ 6:22 pm

The European Union is planning its own satellite constellation, IRIS², as part of a €10.6 billion ($11.1 billion ) initiative to provide secure, resilient connectivity to businesses, governments, and citizens. The project will be jointly developed by the European Space Agency (ESA) and SpaceRISE, a consortium of satellite industry leaders, and positions itself as Europe’s strategic alternative to commercial networks such as SpaceX’s Starlink. IRIS² (Infrastructure for Resilience, Interconnectivity, and Security by Satellite) will comprise 290 satellites operating in low Earth orbit (LEO) and medium Earth orbit (MEO), according to the European Commission, the executive

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

How to run Docker inside Incus containers

18 December 2024 @ 5:44 am

See all FFmpeg command releated tutorials Incus and Docker both use Linux kernel features to containerize your applications. Incus is best suited when you need system-level containers that act like traditional VMs and provide a persistent developer experience. On the other hand, Docker containers are ephemeral, i.e., temporary in nature. All files created inside Docker containers are lost when your Docker container is stopped or removed unless you stored them using volumes in different directories outside Docker. Docker is created as a disposable app deployment system. Incus containers are not typically created as disposables, and data is kept inside

MySQL Change root Password Command

9 December 2024 @ 4:19 pm

See all MySQL Database Server related FAQ How do I change MySQL root password under Linux, FreeBSD, OpenBSD and UNIX-like like operating system over the ssh session? Love this? sudo share_on: Twitter - Facebook - Link

How to enable mouse to copy & paste in vim

28 November 2024 @ 1:44 pm

See all VI / Vim text editor related FAQs/HowTos Some Linux distro like Debian or specific BSD variants provide very little configuration support for mouse out of the box for Vim. Let us see how to paste in Vim using a mouse by enabling support, which is useful for new developers and sysadmin coming from Windows background. Love this? sudo share_on: Twitter -

How to install vnstat on Debian 12/11 to monitor network interface bandwidth usage

27 November 2024 @ 7:07 pm

See all Debian/Ubuntu Linux related FAQ Do you need to keep track of the network traffic (bandwidth) usage for the Network interface controller (NIC) of your Debian Linux-based cloud or bare metal server? Look no forward. Try the vnStat, a free and open-source console-based network traffic monitor that keeps a log of 5-minute intervals, hourly, daily, monthly, and yearly network traffic for the selected interface. Once installed, vnStat can be used even without root permissions on most systems. Love this? sudo share_on:

How to find hard disk (SSD) serial numbers in Linux

16 November 2024 @ 9:38 pm

See all GNU/Linux related FAQ You need to use the smartctl command to display the hard disk (SSD) serial numbers in Linux. This is useful when changing your hard disk if it goes bad. Love this? sudo share_on: Twitter - Facebook -

How to install kvm-ok on Debian or Ubuntu Linux

16 November 2024 @ 6:54 am

See all Linux Kernel Based Virtual Machine related FAQs/Howtos The KVM-ok command command will tell you if your Debian or Ubuntu Linux-powered server can host hardware-accelerated KVM virtual machines. KVM (Kernel-based Virtual Machine) is a free and open-source virtualization technology that is used with every Linux kernel. In other words, KVM will make your Linux computer into a hypervisor, allowing you to run multiple isolated virtual machines (VMs) on a single physical machine. However, KVM depends upon CPU hardware virtualization extensions like Intel VT-x or AMD-V to provide high-performance virtual machines. This support must be enabl

zcommands: Read gzip Compressed Text Files On a Fly on Linux and Unix

1 November 2024 @ 8:34 pm

zcommands Read gzip Compressed Text Files On a Fly on Linux and Unix Linux and Unix like operating systems comes with z* commands. These commands allow you to read gzip compressed text files using zless, zcat, zmore, and friends commands. The gzip command reduces the size of the files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz while keeping the same ownership modes, access, and modification times. z* commands have some cool usage too, such as display the current time in different zonename. Love this? sudo share_on:

How do I unzip multiple / many files under Linux?

27 September 2024 @ 7:56 pm

See all Troubleshooting related FAQ I have lots of files in a directory called /disk2/images/. All files are in zip file format, so I am using the following command to extract zip files:      unzip *.zip The command result into an error which read as follows:      caution: filename not matched How do I unzip multiple or many zip files under a Linux/Unix-like system? Love this? sudo share_on:

Linux / UNIX View Only Configuration File Directives ( Uncommented Lines of a Config File )

21 September 2024 @ 12:33 pm

See all GNU/Linux related FAQ Most Linux and UNIX-like system configuration files are documented using comments, but sometimes I just need to see a line of configuration text in a config file. How can I view just the uncommented configuration file directives from squid.conf or httpd.conf file? How can I strip out comments and blank lines on a Linux or Unix-like system? Love this? sudo share_on: Twitter -

Linux turn OFF password expiration / aging

20 September 2024 @ 11:46 am

The /etc/shadow file stores the actual password in encrypted format using a hash (salted) function for the user's account with additional properties related to the user passwords, such as password expiration date or password aging. The /etc/passwd stores usernames and their properties, such as home directory, login shell, and more. The password expiration information for a user is contained in the last six fields. The Linux password expi

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

Black Friday at Heart Internet

28 November 2024 @ 3:27 pm

Black Friday is here, and we’re bringing you incredible savings to help your business thrive online. From 29th November 2024 to 9th December 2024, you can enjoy 15% off some of our most popular products to get the tools you need at a fraction of the cost. What’s on Offer? Here’s what you can save [read more...]

13 Easy Ways to Optimise Your Website for Speed and Performance

1 October 2024 @ 2:53 pm

A slow website is like a slow waiter: it doesn’t matter how good the food is if the service is frustratingly sluggish. If your site takes too long to load, visitors are likely to abandon it faster than you can say “bounce rate.” But fear not! Here are some tips to help you optimise your [read more...]

Black Friday and Cyber Monday sale now on at Heart Internet

22 November 2022 @ 3:31 pm

You can now get up to 33% off the price of a cPanel-managed Web Hosting plan at Heart Internet.

Are your website fonts sending the right message?

3 November 2022 @ 10:18 am

Did you know that the fonts you use on your website can impact the way your customers perceive and interact with your brand?

10 of the best WooCommerce plugins

27 October 2022 @ 10:53 am

Including options for optimising your cart, boosting customer loyalty, and selling tickets.

9 creative alternatives to .com and .co.uk domains

5 October 2022 @ 2:37 pm

Discover the appeal of .ninja, .coffee, .guru and more - all available in our domain name sale.

Save up to 43% on WordPress Hosting in our latest sale

20 September 2022 @ 3:23 pm

We’ve just slashed the price of WordPress Hosting at Heart Internet.

What to do once you’ve bought a domain

7 September 2022 @ 12:48 pm

A guide to what to do next once you've chosen your perfect domain name.

Empowering quotes and motivational tips for entrepreneurs

25 August 2022 @ 8:33 am

Including quotes from Amelia Earhart and Barack Obama, to give you a little pick me up.

5 reasons we love cPanel

10 August 2022 @ 7:09 am

When browsing through hosting packages, you’ll often come across the word cPanel. But what exactly does this word mean and what are the benefits of buying a hosting package with cPanel included?

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

ceph manager process hung due to high memory usages

21 December 2024 @ 6:14 am

I have observed that in one of my ceph manager nodes ceph-mgr process died due to high memory usages. The thread mentioned in the log in prometheus. So it is suspected that prometheus put some large memory allocation causing ceph-mgr service eventually went into out of Memory state. We have other manager node that are not observing the same issue. This is not frequent issue. Can I get some expert opinion where I can check why prometheus suddenly allocated large memory on that particular node? tcmalloc: large alloc 1233903616 bytes == 0x5607ecec4000 @ 0x7fa9345f3760 0x7fa934614a62 0x7fa93dbb65c8 0x7fa93dbe6365 0x5607122bac0b 0x5607122baef0 0x5607121e6e6d 0x7fa93dc63de7 0x7fa93dc64cd8 0x7fa93dc41998 0x7fa93dc64087 0x7fa93dc64cd8 0x7fa93dc41998 0x7fa93dc64087 0x7fa93dc64cd8 0x7fa93dbc1994 0x7fa93dc62e5f 0x7fa93dbcaa2b 0x7fa93dc66b9f 0x7fa93dbc2306 0x7fa93dc41b80 0x7fa93dc64087 0x7fa93dc64cd8 0x7fa93dbc2ea2 0x7fa93dbc3c7e 0x7fa93dbd5f00 0x7fa93dbcaa2b 0x7fa93dc66b9f 0x7f

L2TP server with one ip in and multi interfaces out

20 December 2024 @ 11:50 pm

I have a Debian 12 VPS with two network interfaces, eth0 and eth1, both have public internet access. L2TP service has been configured, and each user is assigned a specific IP. I tried using the following commands iptables -t nat -A POSTROUTING -s 192.168.42.10 -o eth0 -j MASQUERAD iptables -t nat -A POSTROUTING -s 192.168.42.11 -o eth1 -j MASQUERADE but only 192.168.42.10 (user1) can access the public network,while 192.168.42.11 (user2) can connect but only has access to the internal network.I think it's an issue with the routing table, but I don't know how to resolve it.Please help

How to unblock dnsbl on senderscore.org

20 December 2024 @ 9:15 pm

I just sent a message to a small group of friends and it appears to have been rejected by comcast with the following: <[email protected]> (reason: 554 resimta-c2p-560312.sys.comcast.net resimta-c2p-560312.sys.comcast.net a.b.c.d found on one or more DNSBLs, see https://postmaster.comcast.net/smtp-error-codes.php#BL000100) If I check https://www.dnsbl.info/dnsbl-database-check.php the ip it's complaining about a.b.c.d comes up clean. The https://postmaster.comcast.net/smtp-error-codes.php#BL000100 redirects to https://spa.xfinity.com/postmaster?faq=comcast-mail-errors#BL000100 Which references

Which DNS Records to Create?

20 December 2024 @ 8:08 pm

I want to point my IP to a www.domain.com FQDN. I want to ensure that users that type domain.com will be redirected to www.domain.com Which DNS records should I create?

Dovecot dh.pem file "too short"?

20 December 2024 @ 7:36 pm

When a client tried to connect to the server (dovecot versions 2.3.11) they get an error that the dh.pem is too small. I've tried regenerating the file using the following command: openssl dhparam -out ./dh.pem 4096 There is no change after restarting Dovecot to read the new file. I've even tried a much larger file (9064) and got the same result. When I run doveconf -n -P it shows the correct path to the dh file. And of course the ssl_dh_parameters_length parameter is no longer used. I have other ssl issue but they involve the cert and key files so I'm trying to get this error out of the way before tackling those. Not sure what to try next, thanks for any helpful suggestions.

How do I send all TCP and UDP traffic over tproxy without making a loop?

20 December 2024 @ 6:26 pm

I'm running my proxy client on the same Linux machine I'm using the connection on. In the configuration I can tell it to tproxy to port 2500. The proxy runs on port 443, using TLS (although this part the proxy takes over managing) So I need to use iptables or nftables to route all packets to the proxy. But I need to mark them as well, so that I don't create a loop. My initial attempts didn't succeed, seems like my UDP packets didn't go through (I'm behind a NAT, but I don't know it's that's the issue since I'm proxying anyway). I'd like to know how it works better so I can debug it myself. (I may also need to turn on ip_forwarding)

I installed really-simple-ssl on my wordpress site and now i get internal error 500

20 December 2024 @ 5:07 pm

I installed really-simple-ssl on my wordpress site and now i get internal error 500. The plugin must have changed some settings. i was able to delete the plugin via terminal but the site is still down. can someone please help

Jupyter Notebook via Cloudflare Zerotrust gives blank navigation page

20 December 2024 @ 4:57 pm

Short description When I access my Tensorflow Jupyter Notebook via Cloudflare Zerotrust, I can login via Cloudflare and on the Notebook server, but after login on the Notebook server, I see a blank page instead of the normal Notebook tree view with files and directories. Detailed description I deployed a Tensorflow Jupyter Notebook Server on Docker (see versions and docker-compose.yaml below). I can access the Notebook server on my local network (http:[local-ip]:8888) from any computer on my local netwerk. I also use Cloudflare Zerotrust to connect to several other Docker services (glances, *arr, portainer, ...) on the same Docker host and they all work fine, except for the Juputer Notebook. When I navigate to the public url configured in Cloudflare (https://tensorflow.[domain_name]/), I get the (Cloudflare Zerotrust) login, after login, I see the Jupyter Notebook password page, and I can also successfully login

openldap check_password is not loading

20 December 2024 @ 4:53 pm

I am attempting to get password policy working along with the default check module (/usr/lib64/openldap/check_password.so) that ships with openldap package for Amazon Linux 2023. I have been able to get the password policy working correctly without the module but when I delete the policy and then add it back with the check module set, slapd complains that it cannot find the shared_object: slapd[471944]: check_password_quality: lt_dlopen failed: (check_password) file not found. I've attempted to place soft links to /usr/lib64/openldap/check_password.so in /usr/lib/openldap, /usr/lib, /usr/bin and /usr/sbin with no success. I cannot find any documentation on the check_password.so implementation that ships with this distribution.

OpenVPN cluster crashes for missing attribute in ClusterDB

20 December 2024 @ 4:45 pm

I have a openvpn installation. I joined a cluster through CLI. ./sacli --mysql mysql://${user}:${password}@${endpoint} ClusterJoin The command finishes without errors. I checked and my user has the same password as the cluster, so everything went good. But then when I try to query the ClusterStatus: root@ip-10-90-2-194:/usr/local/openvpn_as/scripts# ./sacli ClusterNodesStatus ERROR: AttributeError: 'ClusterDB' object has no attribute 'dbs' (9000) This is a problem, because I am unable to access to the Admin Panel UI because this error (the web UI crashes). What's the cause of this problem?

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10