Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: servers Clear Filter

Rendezvous Hashing Explained (2020)

Rendezvous hashing is an algorithm to solve the distributed hash table problem - a common and general pattern in distributed systems. There are three parts of the problem: Keys: unique identifiers for data or workloads Values: data or workloads that consume resources Servers: entities that manage data or workloads For example, in a distributed storage system, the key might be a filename, the value is the file data, and the servers are networked data servers that collectively store all of the f

ExpressVPN review: One of the fastest VPNs we've tested

June Wan/ZDNET ZDNET's key takeaways ExpressVPN The servers are optimized for global geo-restrictions and fast bandwidth connections without giving up safety. Slight connection delays are noticeable when switching servers, and the VPN is still relatively overpriced. ExpressVPN is one of the best virtual private networks (VPNs) to ever exist. I've reviewed it three times in less than a year, and each time it's inching closer to NordVPN, another terrific service. Now that the provider has rev

Finding thousands of exposed Ollama instances using Shodan

The rapid deployment of large language models (LLMs) has introduced significant security vulnerabilities due to misconfigurations and inadequate access controls. This paper presents a systematic approach to identifying publicly exposed LLM servers, focusing on instances running the Ollama framework. Utilizing Shodan, a search engine for internet-connected devices, we developed a Python-based tool to detect unsecured LLM endpoints. Our study uncovered over 1,100 exposed Ollama servers, with appro

Use One Big Server (2022)

A lot of ink is spent on the "monoliths vs. microservices" debate, but the real issue behind this debate is about whether distributed system architecture is worth the developer time and cost overheads. By thinking about the real operational considerations of our systems, we can get some insight into whether we actually need distributed systems for most things. We have all gotten so familiar with virtualization and abstractions between our software and the servers that run it. These days, "serve

Are we decentralized yet?

This page measures the concentration of user data on the Fediverse and the Atmosphere according to the Herfindahl–Hirschman Index (HHI), an indicator from economics used to measure competition between firms in an industry. Mathematically, HHI is the sum of the squares of market shares of all servers. Values close to zero indicate perfectly competitive markets (eg. many servers, with users spread evenly), while values close to 10000 indicate highly concentrated monopolies (eg. most users on a si

Exploring the tragedy of the Counter-Strike 2 server browser

For those who enjoy Counter-Strike community servers, the situation in Counter-Strike 2 is rather dire. An avalanche of spam has rendered the server browser unusable. The transition from Global Offensive killed multiple small communities. And large server providers have taken advantage of these problems to monopolise the market. Trying to find a server either involves capitulating to these big vendors, or trawling through a trench of spam. Scraping the server browser allows us to have some in

The Limits of NTP Accuracy on Linux

The Limits of NTP Accuracy on Linux Lately I’ve been trying to find (and understand) the limits of time syncing between Linux systems. How accurate can you get? What does it take to get that? And what things can easily add measurable amounts of time error? After most of a month (!), I’m starting to understand things. This is kind of a follow-on to a previous post, where I walked through my setup and goals, plus another post where I discussed time syncing in general. I’m trying to get the clock

Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed services providers (MSPs) and IT departments to monitor and manage networks and devices from a centralized web-based console. Tracked as CVE-2025-8875 and CVE-2025-8876, the two flaws can let authenticated attackers to inject commands due to improper sanitization of user input and execute commands on

The Raft Consensus Algorithm (2015)

What is Raft? Raft is a consensus algorithm that is designed to be easy to understand. It's equivalent to Paxos in fault-tolerance and performance. The difference is that it's decomposed into relatively independent subproblems, and it cleanly addresses all major pieces needed for practical systems. We hope Raft will make consensus available to a wider audience, and that this wider audience will be able to develop a variety of higher quality consensus-based systems than are available today. Hol

Over 29,000 Exchange servers unpatched against high-severity flaw

Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complete domain compromise. The security flaw (tracked as CVE-2025-53786) helps threat actors who gain administrative access to on-premises Exchange servers to escalate privileges within the organization's connected cloud environment by forging or manipulating trusted tokens or API calls, without leaving

A dive into open chat protocols

A dive into open chat protocols I’m between projects right now, so as is my idiom I’m going to take some random topic that has caught me on a manic swing in my little bipolar life, and dive deeper into it for a few days. One of the low-key topics in the back of my mind is that “the world needs an open chat protocol that doesn’t suck”, and something made me start thinking seriously about XMPP again for the first time in a decade. I used XMPP myself a fair amount in its little Golden Age of the e

Why I still recommend NordVPN to most people in 2025 - especially with the latest update

NordVPN ZDNET's key takeaways I tested the very popular NordVPN, and it checks all the VPN boxes of reliability, performance, and features. The NordLynx protocol has fast and secure connections worldwide, and features like specialty servers, an antivirus (offline malware scanner for PCs), and a Dark Web Monitor are welcome. There is no split tunneling feature on iOS, and it doesn't have the IKEv2/IPSec protocol on most (if not all) devices. View now at Nordvpn You will come across NordVPN qui

Why not Matrix (2023)

why not matrix? haru at this point it seems like most of the tech community is familiar with matrix, the "open network for decentralized communication". lots of projects and communities have migrated from a host of other platforms, including irc, discord and slack with the promise that their new spaces will be free forever. i first discovered matrix in 2021 and have dedicated a lot of time trying to understand exactly how it works, as well as trawling through github issues to try and under

Why not Matrix (2024)

Archived from https://telegra.ph/why-not-matrix-08-07 March 22, 2024 Additional links here: https://benharri.org/matrix-sucks/ haru august 7, 2023 at this point it seems like most of the tech community is familiar with matrix, the “open network for decentralized communication”. lots of projects and communities have migrated from a host of other platforms, including irc, discord and slack with the promise that their new spaces will be free forever. i first discovered matrix in 2021 and have de

Surfshark VPN review: A fast VPN for casual users

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . Surfshark pushes the envelope with its Nexus and Everlink features, but its fundamentals are solid too. Surfshark is one of the youngest major VPNs, but it's grown rapidly over the last seven years. Since 2018, it's expanded its network to 100 countries, added a suite of apps to its S

Surfshark vs. CyberGhost: Which VPN should you get?

Allison Murray/ZDNET Surfshark and CyberGhost are consistently ranked among the top VPNs. They are high-value yet relatively affordable VPNs, which is why most users love them. Also: NordVPN vs Surfshark One unique thing about Surfshark is that there's no cap on the number of devices you can connect. It shares a lot with NordVPN, especially from a security point of view. But it's not as streaming-centered as CyberGhost. Also, I had minor but persistent server connection issues with the app, b

The Great Unracking: Saying goodbye to the servers at our physical datacenter

Since October 2010, all Stack Exchange sites have run on physical hardware in a datacenter in New York City (well, New Jersey). These have had a warm spot in our history and our hearts. When I first joined the company and worked out of the NYC office, I saw the original server mounted on a wall with a laudatory plaque like a beloved pet. Over the years, we’ve shared glamor shots of our server racks and info about updating them. For almost our entire 16-year existence, the SRE team has managed a

Microsoft Fix Targets Attacks on SharePoint Zero-Day

On Sunday, July 20, Microsoft Corp. issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. The patch comes amid reports that malicious hackers have used the Sharepoint flaw to breach U.S. federal and state agencies, universities, and energy companies. In an advisory about the SharePoint security hole, a.k.a. CVE-2025-53770, Microsoft said it is aware of active attacks targeting on-premises SharePoint

New zero-day bug in Microsoft SharePoint under widespread attack

The U.S. federal government and cybersecurity researchers say a newly discovered security bug found in Microsoft’s SharePoint is under attack. U.S. cybersecurity agency CISA sounded the alarm this weekend that hackers were actively exploiting the bug. Microsoft has not yet provided patches for all affected SharePoint versions, leaving customers across the world largely unable to defend against the ongoing intrusions. Microsoft said the bug, known officially as CVE-2025-53771, affects versions

Microsoft SharePoint servers are under attack because of a major security flaw

Hackers have exploited vulnerabilities in Microsoft’s SharePoint software, placing tens of thousands of on-premises servers used by global businesses and agencies at risk. Microsoft issued an alert on Saturday disclosing that it was aware of “active attacks,” and that it was working to patch the zero-day exploit. Researchers at Eye Security first identified the vulnerability on July 18th, which allows hackers to access certain on-premises versions of SharePoint and steal keys that can let them

Exposed MCP servers across the internet

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking. In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers. We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually v

Exposing the Unseen: Mapping MCP Servers Across the Internet

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking. In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers. We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually v

How proxy servers actually work, and why they're so valuable

Getty/sasha85ru Let's talk about proxy servers. Proxy servers are often confused with virtual private networks (VPNs) because their network architectures are very similar. But proxies and VPNs are very different beasts. Don't worry: Below, I'll introduce you to proxy servers, compare and contrast them to VPNs, and describe the many different types of proxy servers and how they're used. Also: The best proxy server services of 2025 Defining proxy servers If you look at Webster's three definit

NordVPN review 2025: Innovative features, a few missteps

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . NordVPN is as fast as it claims, but its apps sometimes get in their own way. When we say that NordVPN is a good VPN that's not quite great, it's important to put that in perspective. Building a good VPN is hard, as evidenced by all the shovelware VPNs flooding the market. NordVPN may

NordVPN Review 2025: Innovative features, a few missteps

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . NordVPN is as fast as it claims, but its apps sometimes get in their own way. When we say that NordVPN is a good VPN that's not quite great, it's important to put that in perspective. Building a good VPN is hard, as evidenced by all the shovelware VPNs flooding the market. NordVPN may

Actively exploited vulnerability gives extraordinary control over server fleets

Hackers are exploiting a maximum-severity vulnerability that has the potential to give them complete control over thousands of servers, many of which handle mission-critical tasks inside data centers, the US Cybersecurity and Infrastructure Security Agency is warning. The vulnerability, carrying a severity rating of 10 out of a possible 10, resides in the AMI MegaRAC, a widely used firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavai

Active exploitation of AMI management tool imperils thousands of servers

Hackers are exploiting a maximum-severity vulnerability that has the potential to give them complete control over thousands of servers, many of which handle mission-critical tasks inside data centers, the US Cybersecurity and Infrastructure Security Agency is warning. The vulnerability, carrying a severity rating of 10 out of a possible 10, resides in the AMI MegaRAC, a widely used firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavai

MCP in LM Studio

LM Studio 0.3.17 introduces Model Context Protocol (MCP) support, allowing you to connect your favorite MCP servers to the app and use them with local models. LM Studio supports both local and remote MCP servers. You can add MCPs by editing the app's mcp.json file or via the new "Add to LM Studio" Button, when available. Also new in this release: Support for 11 new languages, thanks to our community localizers. LM Studio is now available in 33 languages. Many bug fixes, as well as improvemen

LM Studio is now an MCP Host

LM Studio 0.3.17 introduces Model Context Protocol (MCP) support, allowing you to connect your favorite MCP servers to the app and use them with local models. LM Studio supports both local and remote MCP servers. You can add MCPs by editing the app's mcp.json file or via the new "Add to LM Studio" Button, when available. Also new in this release: Support for 11 new languages, thanks to our community localizers. LM Studio is now available in 33 languages. Many bug fixes, as well as improvemen

Remote MCP Support in Claude Code

Today, we’re announcing support for remote MCP servers in Claude Code. Connect your favorite tools and data sources to personalize your coding experience without needing to manage local servers. Using Claude Code as your primary development interface Claude Code can access both tools and resources exposed by MCP servers, giving it the ability to pull context from your third-party services—such as dev tools, project management systems, and knowledge bases—and take actions within those services.