Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: server Clear Filter

I wish my web server were in the corner of my room (2022)

Back in college I used to run part of my website from a Linux box in my room. I made it into a speech synthesiser, and people could connect to the machine to talk into my flat. (Retrospective apologies to my flatmates.) This is way back in 2000 so before smartphones, and before texting, and before always-on internet (college was an exception), and before camera phones or being able to reliably email photos let alone video. Decent text-to-speech still felt novel. We had a friend who was travell

Show HN: MCP Server Installation Instructions Generator

This project was originally created to serve html requests for users who tried to access a mcp url that was secured by the hyprmcp/mcp-gateway in the browser. Checkout the installation instructions for this hosted mcp server here: https://demo.hyprmcp.cloud/mcp-install-instructions-generator/mcp How To Install a Remote MCP server? Instructing users on how to install an MCP server is hard, because configuration is different for each client. If this has been your experience hosting an MCP server

Microsoft: Exchange 2016 and 2019 reach end of support in 30 days

​Microsoft has reminded administrators again that Exchange 2016 and Exchange 2019 will reach the end of extended support next month and has provided guidance for decommissioning outdated servers. According to the company's product lifecycle website, Exchange 2016 reached mainstream end date in October 2020, while Exchange 2019's mainstream support ended on January 9, 2024. Microsoft also reminded customers in January that Exchange Server 2016 and 2019 will reach the end of support in October.

Asciinema CLI 3.0 rewritten in Rust, adds live streaming, upgrades file format

3.0 Published on 15 Sep 2025 by Marcin Kulik I’m happy to announce the release of asciinema CLI 3.0! This is a complete rewrite of asciinema in Rust, upgrading the recording file format, introducing terminal live streaming, and bringing numerous improvements across the board. In this post, I’ll go over the highlights of the release. For a deeper overview of new features and improvements, see the release notes and the detailed changelog. First, let’s get the Rust rewrite topic out of the way.

ExpressVPN review: One of the fastest VPNs we've tested

June Wan/ZDNET ZDNET's key takeaways ExpressVPN The servers are optimized for global geo-restrictions and fast bandwidth connections without giving up safety. Slight connection delays are noticeable when switching servers, and the VPN is still relatively overpriced. ExpressVPN is one of the best virtual private networks (VPNs) to ever exist. I've reviewed it three times in less than a year, and each time it's inching closer to NordVPN, another terrific service. Now that the provider has rev

Microsoft says Windows September updates break SMBv1 shares

​Microsoft has confirmed that the September 2025 Windows security updates are causing connection issues to Server Message Block (SMB) v1 shares. The list of platforms affected by this known issue is quite extensive, as it includes both client (Windows 11 24H2/23H2/22H2 and Windows 10 22H2/21H2) and server (Windows Server 2025 and Windows Server 2022) platforms. In a service alert seen by BleepingComputer, Microsoft said this known issue affects those connecting to SMBv1 shares over the NetBIOS

Show HN: An MCP Gateway to block the lethal trifecta

OpenEdison 🔒⚡️ The Secure MCP Control Panel Connect AI to your data/software securely without risk of data exfiltration. Gain visibility, block threats, and get alerts on the data your agent is reading/writing. OpenEdison solves the lethal trifecta problem, which can cause agent hijacking & data exfiltration by malicious actors. Join our Discord for feedback, feature requests, and to discuss MCP security for your use case: discord.gg/tXjATaKgTV 📧 To get visibility, control and exfiltration

VPNs and Age-Verification Laws: What You Need to Know

The problem is how the verification happens. You aren’t verifying your age with the government. You’re routing it through an independent third party, and most of the laws on the books are designed specifically in this way. In the UK, for example, Reddit verifies with Persona, and Bluesky uses Kids Web Services (owned by Epic Games). Persona’s privacy policy states that it collects not only biometric information and personal details, like your ID, but also ties that to information gathered from

Rails on SQLite: new ways to cause outages

Rails on SQLite: exciting new ways to cause outages This post was originally given as a talk for Friendly.rb. The slides are also available. Between Litestack and the Rails 8 trifecta of Solid Cable, Solid Cache, and Solid Queue, it’s easier than ever to spin up a Rails app that doesn’t need a database service, or a redis service, or a file storage service. It’s great to simplify things, but even after 20 years of deploying Rails apps I was still caught out by some of the ways things are diffe

Show HN: Making a cross-platform game in Go using WebRTC Datachannels

(The following was adapted from a talk I gave at DWeb Weekend 2025 at the Internet Archive in San Francisco on August 17, 2025) Simplifying WebRTC Datachannels for Games First of all, to get some stuff out of the way, instead of using the “super complicated” WebRTC datachannels, why don’t we use something simpler? Why Not Use Websockets? Too slow : Most games use UDP with a reliability layer on top. : Most games use UDP with a reliability layer on top. Suitable for turn-based games : Fine f

Microsoft fixes app install issues caused by August Windows updates

Microsoft has fixed a known issue caused by the August 2025 security updates, which triggers unexpected User Account Control (UAC) prompts and app installation problems for non-admin users on all Windows versions. This issue is caused by a security patch that mitigates a Windows Installer privilege escalation vulnerability (CVE-2025-50173), which can enable authenticated attackers to gain SYSTEM privileges. To address the CVE-2025-50173 security flaw, Microsoft has implemented new User Account

Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days

Today is Microsoft's September 2025 Patch Tuesday, which includes security updates for 81 flaws, including two publicly disclosed zero-day vulnerabilities. This Patch Tuesday also fixes nine "Critical" vulnerabilities, five of which are remote code execution vulnerabilities, 1 is information disclosure, and 2 are elevation of privileges. The number of bugs in each vulnerability category is listed below: 41 Elevation of Privilege Vulnerabilities 2 Security Feature Bypass Vulnerabilities 22 R

ICEBlock handled my vulnerability report in the worst possible way

Last week, I wrote about how Joshua Aaron's ICEBlock app, which allows people to anonymously report ICE sightings within a 5-mile radius, is – unfortunately, and despite apparent good intentions – activism theater. This was based on Joshua's talk at HOPE where he made it clear that he isn't taking the advice of local community groups, that ICE sightings aren't verified in any way, and that he doesn't know what he's doing when it comes to security and privacy. In that post, in the section about

Setting up a home VPN server with WireGuard

Motivation For a moderately security conscious geek like myself, there can be a number of reasons to want to set up a home VPN server: Accessing your home computer via screen sharing without exposing it to the Internet (and thereby to potential evil-doers). Accessing servers with IP white lists (common case for security hardened IT systems). Accessing county-IP-filtered things like Netflix while travelling. Browsing privately from insecure WiFi networks. Getting access to services that are blo

Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management

Windows Server Update Services (WSUS) has been a go-to patch management tool for over two decades, providing IT administrators with a way to distribute Microsoft updates across their environments. However, as Microsoft has officially deprecated WSUS and the tool struggles to keep up with modern IT demands, many administrators are actively searching for a replacement. Action1, a cloud-native patch management platform, has become one of the most attractive alternatives. Today we will demonstrate

What to do with an old iPad

I recently inherited my parents’ old iPad 2. It had iOS 9 on it and was barely usable, in part due to how slow it was but mostly because of old SSL certificates and apps stopping support. But I wanted to give it some life because I hate to see a working machine go to waste. So I asked around and got a great answer: The iPad 2 can be downgraded to iOS 6.1.3 or 8.4.1. Both offer better performance than iOS 9 and have untethered jailbreaks. Once downgraded and jailbroken you can sideload hours and

Topics: ios ipad server ssh vps

What to Do with an Old iPad

I recently inherited my parents’ old iPad 2. It had iOS 9 on it and was barely usable, in part due to how slow it was but mostly because of old SSL certificates and apps stopping support. But I wanted to give it some life because I hate to see a working machine go to waste. So I asked around and got a great answer: The iPad 2 can be downgraded to iOS 6.1.3 or 8.4.1. Both offer better performance than iOS 9 and have untethered jailbreaks. Once downgraded and jailbroken you can sideload hours and

Topics: ios ipad server ssh vps

I’ve been self-hosting my apps since 2009; here’s why you should (or shouldn’t) do it too

Robert Triggs / Android Authority I’m your average techie millennial who saw the dotcom bubble burst and was around when many of the OG services of the internet era simply vanished. Let’s just say, watching favorites like GeoCities and Launchcast go bust was a big motivation for me to start self-hosting my most-used services as soon as I was able to. Initially, it was mostly curiosity and tinkering. That changed over time. Today, self-hosting for me is equal parts habit, convenience, and once-i

Building Supabase-Like OAuth Authentication for MCP Servers

I am Jakob, an Engineer at Hypr MCP, where we help companies connect their internal applications to LLM-based workflows with the power of MCP servers. Join our waitlist or book a demo to learn more. In this blog post, I want to show you how and why we built an MCP Server Gateway that acts as a reverse proxy for one or more upstream MCP servers while adding support for the authorization framework provided by the MCP specification. The Model Context Protocol (MCP) has emerged as the de-facto stan

The best VPN service for 2025

As frustrating as it is that governments and businesses are running roughshod over our online freedoms, at least we have plenty of good VPNs to choose from to keep us protected online. There are so many fast, intelligently designed, full-featured and affordable services on the market that the biggest problem is picking one. For any use case, you can bet at least two providers will be neck-and-neck for first place. On the other hand, the VPN world is still the Wild West in some ways. It's easy

Microsoft says recent Windows updates cause app install issues

Microsoft says the August 2025 security updates are triggering unexpected User Account Control (UAC) prompts and app installation issues for non-admin users across all supported Windows versions. This known issue is caused by a security patch that addresses the CVE-2025-50173 Windows Installer privilege escalation vulnerability, which can allow authenticated attackers to gain SYSTEM privileges due to a weak authentication issue. To address this security vulnerability, Microsoft has implemented

Finding thousands of exposed Ollama instances using Shodan

The rapid deployment of large language models (LLMs) has introduced significant security vulnerabilities due to misconfigurations and inadequate access controls. This paper presents a systematic approach to identifying publicly exposed LLM servers, focusing on instances running the Ollama framework. Utilizing Shodan, a search engine for internet-connected devices, we developed a Python-based tool to detect unsecured LLM endpoints. Our study uncovered over 1,100 exposed Ollama servers, with appro

Making a Linux home server sleep on idle and wake on demand (2023)

Making a Linux home server sleep on idle and wake on demand — the simple way It began with what seemed like a final mundane touch to my home server setup for hosting Time Machine backups: I wanted it to automatically sleep when idle and wake up again when needed. You know, sleep on idle — hasn’t Windows had that built in since like Windows 98? How hard could it be to configure on a modern Ubuntu install? To be fair, I wanted more than just sleep on idle, I also wanted wake on request — and tha

Linux home server sleep on idle and wake on demand – the simple way

Making a Linux home server sleep on idle and wake on demand — the simple way It began with what seemed like a final mundane touch to my home server setup for hosting Time Machine backups: I wanted it to automatically sleep when idle and wake up again when needed. You know, sleep on idle — hasn’t Windows had that built in since like Windows 98? How hard could it be to configure on a modern Ubuntu install? To be fair, I wanted more than just sleep on idle, I also wanted wake on request — and tha

Show HN: Simple modenized .NET NuGet server reached RC

Simple modenized NuGet server implementation. (日本語はこちら) What is this? A simple NuGet server implementation built on Node.js that provides essential NuGet v3 API endpoints. Compatible with dotnet restore and standard NuGet clients for package publishing, querying, and manually downloading. A modern browser-based UI is also provided: You can refer to registered packages. You can check various package attributes. You can download packages by version. You can also publish (upload) packages.

Bidirectional Signals from the Emitter's Perspective in PHP

A New Observer Pattern: Bidirectional Signals from the Emitter’s Perspective in PHP Morteza 5 min read · Aug 23, 2025 -- Listen Share Press enter or click to view image in full size php-repos’s observer pattern Introduction: Shifting the Observer Perspective In software, the traditional observer pattern is often designed with the observer in mind: an event happens, like a user logging in, and a handler — say, a logger — reacts by recording it. This perspective assumes the observer (the handle

Use One Big Server (2022)

A lot of ink is spent on the "monoliths vs. microservices" debate, but the real issue behind this debate is about whether distributed system architecture is worth the developer time and cost overheads. By thinking about the real operational considerations of our systems, we can get some insight into whether we actually need distributed systems for most things. We have all gotten so familiar with virtualization and abstractions between our software and the servers that run it. These days, "serve

Terminal sessions you can bookmark

Zellij is a terminal workspace and multiplexer. One of the unique traits of terminal multiplexers is their ability to keep sessions alive in the background without a terminal attached to them. In the recent Zellij version we released a built-in web client, allowing users to attach to these sessions from the browser - essentially making a dedicated terminal application optional. In this post we’re going to take a look at how we built the Zellij Web Terminal: which technologies we used, how we ar

Are we decentralized yet?

This page measures the concentration of user data on the Fediverse and the Atmosphere according to the Herfindahl–Hirschman Index (HHI), an indicator from economics used to measure competition between firms in an industry. Mathematically, HHI is the sum of the squares of market shares of all servers. Values close to zero indicate perfectly competitive markets (eg. many servers, with users spread evenly), while values close to 10000 indicate highly concentrated monopolies (eg. most users on a si

Mastodon says it doesn’t ‘have the means’ to comply with age verification laws

Decentralized social network Mastodon says it can’t comply with Mississippi’s age verification law — the same law that saw rival Bluesky pull out of the state — because it doesn’t have the means to do so. The social non-profit explains that Mastodon doesn’t track its users, which makes it difficult to enforce such legislation. Nor does it want to use IP address-based blocks, as those would unfairly impact people who were traveling, it says. The statement follows a lively back-and-forth convers