bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

253
active users

#Apache

6 posts5 participants0 posts today
:rss: Hacker News<p>Max severity RCE flaw discovered in widely used Apache Parquet<br><a href="https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/</span></a><br><a href="https://rss-mstdn.studiofreesia.com/tags/ycombinator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ycombinator</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/computers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computers</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mac</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/support" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>support</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/tech_support" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech_support</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/virus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virus</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Apache_Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache_Parquet</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Big_Data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Big_Data</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Remote_Code_Execution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Remote_Code_Execution</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/virus_removal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virus_removal</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/malware_removal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware_removal</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/computer_help" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computer_help</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/technical_support" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technical_support</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Max" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Max</span></a> severity RCE flaw discovered in widely used <a href="https://mastodon.thenewoil.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.thenewoil.org/tags/Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Parquet</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>Critical flaw in <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Parquet</span></a>'s Java Library allows remote code execution<br><a href="https://securityaffairs.com/176187/security/apache-parquets-java-library-critical-flaw.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176187/sec</span><span class="invisible">urity/apache-parquets-java-library-critical-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176129/hacking/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/hac</span><span class="invisible">king/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176129/hacking/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/hac</span><span class="invisible">king/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Özgür Yüksel<p>Spark JDBC Connection To MsSQL Using Kerberos - Failed to find any Kerberos tgt <a href="https://stackoverflow.com/questions/79500919/spark-jdbc-connection-to-mssql-using-kerberos-failed-to-find-any-kerberos-tgt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stackoverflow.com/questions/79</span><span class="invisible">500919/spark-jdbc-connection-to-mssql-using-kerberos-failed-to-find-any-kerberos-tgt</span></a> <a href="https://fosstodon.org/tags/sql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sql</span></a>-server <a href="https://fosstodon.org/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://fosstodon.org/tags/spark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spark</span></a> <a href="https://fosstodon.org/tags/pyspark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pyspark</span></a> <a href="https://fosstodon.org/tags/jdbc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jdbc</span></a> <a href="https://fosstodon.org/tags/kerberos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kerberos</span></a></p>
Elena Rossini on GoToSocial ⁂<p>🏕️ my adventures in <a href="https://aseachange.com/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> - day 104 (pride edition) 👷‍♀️<br><br>Good morning Fedi friends!<br><br>Aw pride is a powerful thing.<br><br>I'd like to think that I'm pretty zen and detached and successfully suppressing my ego... but when it comes to things I'm passionate about (read: tech, self-hosting) I cannot let things go.<br><br>I had a very very sweet shout-out on a Fediverse podcast last week... but said shout-out mentioned my self-hosting issues and that maybe self-hosting isn't for everyone. I felt that I had to correct the record (even if the mention came with the nicest intention)... because I have ZERO issues self-hosting <a href="https://aseachange.com/tags/gotosocial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoToSocial</span></a>, <a href="https://aseachange.com/tags/friendica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Friendica</span></a> and <a href="https://aseachange.com/tags/pixelfed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pixelfed</span></a> (thanks to the magic of <a href="https://aseachange.com/tags/yunohost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YunoHost</span></a>). All my troubles had to do with <a href="https://aseachange.com/tags/ghost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ghost</span></a>. (And Ghost is wonderful, it's not related to it, just external circumstances).<br><br>So, determined to defend my honor (ha!) on Friday I achieved the impossible: all by myself, following guides I found online, I managed to install <a href="https://aseachange.com/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> and <a href="https://aseachange.com/tags/varnish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Varnish</span></a> on my VPS and connected Varnish to Ghost. My site was already fast, now it's BLAZING fast.<br><br>So I'm giving it another go, moving from Ghost (Pro) to my self-hosted Ghost installation. I turned off subscriptions on <a href="https://blog.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://blog.elenarossini.com</a>... next step is disconnecting the subdomain DNS (a CNAME record) from Ghost... and redirecting traffic to my new blog (<a href="https://news.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://news.elenarossini.com</a>).<br><br>I know how to code things in NGINX for the redirect to work (I think, via guides I found online).<br><br>My big question is: how do I tweak my old DNS records for <a href="https://blog.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://blog.elenarossini.com</a> so that NGINX on my self-hosted site <a href="https://news.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://news.elenarossini.com</a> will correctly pick up the traffic requests? Do I need to set up A and AAAA records for the subdomain blog to point to my VPS with the self-hosted Ghost blog? Any advice would be greatly appreciated! 🙏​<br><br>Oh and I learned my lesson and - unlike last time - I am making big changes on a Monday morning, when I have the whole workweek ahead of me (instead of a Friday afternoon 1 hour before picking up my child from nursery school). You live and learn! 😅​<br><br><a href="https://aseachange.com/tags/mysocalledsudolife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MySoCalledSudoLife</span></a></p>
Elena Rossini ⁂<p>This newbie who just celebrated 100 days of <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> was able to install <a href="https://mastodon.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> and <a href="https://mastodon.social/tags/Varnish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Varnish</span></a> on her <a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> VPS (to prevent the "Mastodon Hug of Death" for link preview cards on her self-hosted Ghost blog). She's very proud of herself for all the sudo commands she successfully ran today. And she's weirded out talking about herself in the third person, so: I did it YAY.</p><p>LOVE LOVE LOVE this Linux / self-hosting journey I'm on. Thank you for all your support &amp; encouragement ❤️</p>
Johannes Brakensiek<p>Hm, really tired of this <a href="https://fosstodon.org/tags/MSAccess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSAccess</span></a>, <a href="https://fosstodon.org/tags/LibreOfficeBase" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreOfficeBase</span></a> database application stuff. I need a quick way to create a "main/detail" GUI from a database.</p><p>There once was <a href="https://fosstodon.org/tags/WebObjects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebObjects</span></a> and that really nice <a href="https://fosstodon.org/tags/JavaClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaClient</span></a> stuff.</p><p>Is there anything else, existing to this day?</p><p>I know of<br>- <a href="https://fosstodon.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://fosstodon.org/tags/Cayenne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cayenne</span></a> (only ORM, no GUI generation)<br>- <a href="https://fosstodon.org/tags/ManyDesigns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ManyDesigns</span></a> <a href="https://fosstodon.org/tags/Portofino" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Portofino</span></a> (very close, but only web GUI. Thanks to <span class="h-card" translate="no"><a href="https://hostsharing.coop/@peter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>peter</span></a></span> for that hint some time ago).</p><p>Do you know of anything? <span class="h-card" translate="no"><a href="https://mastodon.social/@helge" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>helge</span></a></span> </p><p><a href="https://fosstodon.org/tags/Boost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boost</span></a></p>
Palace4Software<p>I am happy to announce that I am now making my project public and developing it further 👨‍💻 👩‍💻.<br>It is a computer <a href="https://mastodon.online/tags/game" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>game</span></a> called <a href="https://mastodon.online/tags/Spiderball" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spiderball</span></a> 😊 </p><p>You can get the source code on <a href="https://mastodon.online/tags/CodeBerg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeBerg</span></a> : <br><a href="https://codeberg.org/Palace4Software/Spiderball" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/Palace4Software/S</span><span class="invisible">piderball</span></a> 💻 </p><p>And of course it is completely <a href="https://mastodon.online/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> published under the <a href="https://mastodon.online/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> 2.0 license 📖.</p><p>Thank you <span class="h-card" translate="no"><a href="https://social.anoxinon.de/@Codeberg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Codeberg</span></a></span> for the most ethical and best way to publish my <a href="https://mastodon.online/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> .</p><p>(the game is not yet playable)</p><p><a href="https://mastodon.online/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://mastodon.online/tags/gamedev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gamedev</span></a> <a href="https://mastodon.online/tags/newgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newgame</span></a> <a href="https://mastodon.online/tags/Palace4Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Palace4Software</span></a> <a href="https://mastodon.online/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a></p>
GreyNoise<p>🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Full analysis &amp; attacker IPs: <a href="https://greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">greynoise.io/blog/active-explo</span><span class="invisible">itation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813</span></a><br><a href="https://infosec.exchange/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE202524813" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202524813</span></a></p>
AAKL<p>Cyble: CERT NZ Shares Critical Advisory for CVE-2025-24813 Vulnerability in Apache Tomcat <a href="https://cyble.com/blog/cert-nz-warns-of-cve-2025-24813-in-tomcat/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyble.com/blog/cert-nz-warns-o</span><span class="invisible">f-cve-2025-24813-in-tomcat/</span></a> <span class="h-card" translate="no"><a href="https://bird.makeup/users/thecyberexpress" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thecyberexpress</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a></p>
The New Oil<p>Critical <a href="https://mastodon.thenewoil.org/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> flaw in <a href="https://mastodon.thenewoil.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.thenewoil.org/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> actively exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Elizabeth K. Joseph<p>The <a href="https://floss.social/tags/s390x" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>s390x</span></a> open source software team at IBM confirms the latest versions of various software packages run well on <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> on <a href="https://floss.social/tags/IBMZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IBMZ</span></a> &amp; <a href="https://floss.social/tags/LinuxONE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxONE</span></a></p><p>In February 2025 validation was maintained for over 3 dozen projects, including the <a href="https://floss.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> HTTP server, <a href="https://floss.social/tags/Bazel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bazel</span></a> and <a href="https://floss.social/tags/etcd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>etcd</span></a> </p><p>Plus, community CI and docs were added to go-mysql, and fastfetch added CI &amp; began releasing binaries with v2.36.0!</p><p>Full report + how your project can apply for a s390x VM: <a href="https://community.ibm.com/community/user/ibmz-and-linuxone/blogs/elizabeth-k-joseph1/2025/03/18/linuxone-open-source-report-february-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">community.ibm.com/community/us</span><span class="invisible">er/ibmz-and-linuxone/blogs/elizabeth-k-joseph1/2025/03/18/linuxone-open-source-report-february-2025</span></a></p>
securityaffairs<p>Threat actors rapidly exploit new <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw following PoC release<br><a href="https://securityaffairs.com/175522/security/threat-actors-rapidly-exploit-new-apache-tomcat-flaw-following-poc-release.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175522/sec</span><span class="invisible">urity/threat-actors-rapidly-exploit-new-apache-tomcat-flaw-following-poc-release.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Michael van Niekerk 🦀 ☕️ ⚛<p>I've found an interesting project: Apache OpenDAL<br>The premise is that it is a single API and wrapper for all data access (filesystems, S3, WebDAV, FUSE, Key/Value stores like Redis, etc). With language bindings for <a href="https://techhub.social/tags/java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>java</span></a>, <a href="https://techhub.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a>, <a href="https://techhub.social/tags/nodejs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nodejs</span></a>, <a href="https://techhub.social/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a></p><p><a href="https://opendal.apache.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">opendal.apache.org/</span><span class="invisible"></span></a></p><p><a href="https://techhub.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://techhub.social/tags/opendal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opendal</span></a></p>

#ApacheStronghold: U.S. Give-Away would Destroy Spiritual Home of #Apache

By Wendsler Nosie, Apache Stronghold, March 13, 2025, via #CensoredNews

"In the heart of #TontoNationalForest in #Arizona lies a place that my people, the #WesternApache, still hold above all others. This place is Chi'chil Biłdagoteel, also known as Oak Flat. To us, it is more than a stretch of land; it is sacred and holy. It is where our ancestors walked, where we gather to pray, to carry out ceremonies passed down through generations, and to speak to our Creator.

"This land is part of who we are as a people, and its spirit is bound to our own.
Now, the federal government plans to give our sacred Oak Flat to a multinational #mining #corporation owned by the Chinese Communist Party. This will not just scar the land; it will destroy it, poisoning the environment and trampling on our tribal rights. But the deepest wound will be the loss of our spiritual home, a place our people cannot exist without. We are fighting this in the courts, all the way to the #USSupremeCourt. But this is about more than law and policy—this is about survival of our way of life and the spirit of this sacred land.

bsnorrell.blogspot.com/2025/03
#SaveOakFlat #ChichilBiłdagoteel #CorporateColonialism #ProtectOakFlat #ReaderSupportedNews #SCOTUS #DefendTheSacred #CopperMine
#WaterIsLife #ResolutionCopper #RioTinto #RecycleCopper #CulturalGenocide #NoMiningWithoutConsent #RecycleCopper

bsnorrell.blogspot.comApache Stronghold: U.S. Give-Away would Destroy Spiritual Home of ApacheCensored News is a service to grassroots Indigenous Peoples engaged in resistance and upholding human rights.