eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

202
active users

#hypervisor

4 posts4 participants1 post today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a>'s <a href="https://mastodon.thenewoil.org/tags/pKVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pKVM</span></a> <a href="https://mastodon.thenewoil.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> earns <a href="https://mastodon.thenewoil.org/tags/SESIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SESIP</span></a> Level 5 security certification</p><p><a href="https://www.bleepingcomputer.com/news/security/androids-pkvm-hypervisor-earns-sesip-level-5-security-certification/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/androids-pkvm-hypervisor-earns-sesip-level-5-security-certification/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Linux Magazine<p>ICYMI: <span class="h-card" translate="no"><a href="https://opensocial.at/profile/linuxnews" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>linuxnews</span></a></span> shows you how to install a containerized Linux distribution with Distrobox<br><a href="https://www.linux-magazine.com/Issues/2025/295/Distrobox?utm_source=mlm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Issues/2025</span><span class="invisible">/295/Distrobox?utm_source=mlm</span></a><br><a href="https://fosstodon.org/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://fosstodon.org/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> <a href="https://fosstodon.org/tags/Lilipod" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lilipod</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>containers</span></a> <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://fosstodon.org/tags/Distrobox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Distrobox</span></a> <a href="https://fosstodon.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>Series:</p><p>[+] ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway).</p><p>[+] MAS: Malware Analysis Series (606 pages -- finished).</p><p>I'll soon begin writing the next articles in the Exploiting Reversing series. </p><p>Enjoy reading and have a great day.</p><p><a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.social/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS: Malware Analysis Series (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 08: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>I'll soon begin writing the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I've laid all the necessary groundwork. </p><p>Enjoy reading and have a great day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
CryptGoat<p>For anyone still using or considering the free <a href="https://fedifreu.de/tags/oVirt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oVirt</span></a> as virtualization management platform:⚠️ Please don't. It is a broken nightmare on community life support.⚠️</p><p>After <a href="https://fedifreu.de/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a> has ended support for its commercial spin Red Hat Virtualization (RHV) last year the development of oVirt practically came to a halt.</p><p>There hasn't been an official stable release for over a year despite security issues, and numerous bugs. The official recommendation is to use nightly releases to get the latest fixes. Too bad you won't be able to roll back via DNF if an update fails because older nightly releases are gone from the repo.</p><p>And yes, nightly releases do break oVirt at times. The latest nightly causes updates to fail because of incomplete dependency changes.</p><p>The web interface of the official mailing list is offline most of the time, the documentation is a confusing and outdated mess.</p><p>Upgrades to newer Linux distribution releases such as RHEL 9 or even 10 based systems are extremely painful and not officially supported.</p><p>Move your VMs to <a href="https://fedifreu.de/tags/ProxmoxVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxmoxVE</span></a> or any other actively maintained KVM based solution.</p><p><a href="https://fedifreu.de/tags/Virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualization</span></a> <a href="https://fedifreu.de/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://fedifreu.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fedifreu.de/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://fedifreu.de/tags/Admin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Admin</span></a> <a href="https://fedifreu.de/tags/oVirtEngine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oVirtEngine</span></a></p>
CryptGoat<p>Und zack, da ist schon die offizielle Veröffentlichung von <a href="https://fedifreu.de/tags/ProxmoxVE9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxmoxVE9</span></a> auf Basis von <a href="https://fedifreu.de/tags/Debian13" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian13</span></a>: <a href="https://forum.proxmox.com/threads/proxmox-virtual-environment-9-0-released.169257/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.proxmox.com/threads/prox</span><span class="invisible">mox-virtual-environment-9-0-released.169257/</span></a></p><p>Natürlich gibt es tonnenweise Änderungen, u.a. ein aufgefrischtes Mobile-UI: <a href="https://pve.proxmox.com/wiki/Roadmap#Proxmox_VE_9.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pve.proxmox.com/wiki/Roadmap#P</span><span class="invisible">roxmox_VE_9.0</span></a><br>Ein Upgrade von 8.4 soll nahtlos klappen.</p><p><a href="https://fedifreu.de/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://fedifreu.de/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a> folgt vermutlich am 9. August.</p><p><a href="https://fedifreu.de/tags/Virtualisierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualisierung</span></a> <a href="https://fedifreu.de/tags/Virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualization</span></a> <a href="https://fedifreu.de/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://fedifreu.de/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> <a href="https://fedifreu.de/tags/ProxmoxVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxmoxVE</span></a> <a href="https://fedifreu.de/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://fedifreu.de/tags/QEMU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QEMU</span></a> <a href="https://fedifreu.de/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://fedifreu.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
R1 Open Source Project<p>Proxmox VE 9.0 released based on Debian 13 "Trixie", with snapshots for thick-provisioned LVM shared storage, affinity rules in HA clusters, new fabrics function for SDN, support for adding new devices to a ZFS RAID-Z Pool with minor downtime</p><p><a href="https://www.proxmox.com/en/about/company-details/press-releases/proxmox-virtual-environment-9-0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">proxmox.com/en/about/company-d</span><span class="invisible">etails/press-releases/proxmox-virtual-environment-9-0</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/proxmoxve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmoxve</span></a> <a href="https://mastodon.bsd.cafe/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> <a href="https://mastodon.bsd.cafe/tags/debian13" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian13</span></a> <a href="https://mastodon.bsd.cafe/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://mastodon.bsd.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a></p>
Ricardo Martín :bsdhead:<p>Who owns your virtualization stack?<br><a href="https://virtualize.sh/blog/who-owns-your-virtualization-stack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">virtualize.sh/blog/who-owns-yo</span><span class="invisible">ur-virtualization-stack/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a> <a href="https://mastodon.bsd.cafe/tags/xcpng" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xcpng</span></a> <a href="https://mastodon.bsd.cafe/tags/vm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vm</span></a></p>
Chris :damnified:<p>Die Aussage vom <a href="https://metalhead.club/tags/Broadcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Broadcom</span></a> CTO in EMEA, dass der Preis fuer VMware zu hoch sei, weil viele nicht alle Features nutzen finde ich witzig. Ich stelle mir vor, ich bin ein Unternehmen nutzte vorher alle Features von <a href="https://metalhead.club/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> z.b. von vSphere und muss jetzt 150% mehr bezahlen ... dann habe ich den kompletten Vendor-Lock-In und komme so schnell nicht weg und muss einfach nur mehr zahlen. Schoene neue Welt und schoene Ansichten werden hier versucht runterzuspielen. Source: <a href="https://www.golem.de/news/vmware-broadcom-liefert-einfache-antwort-auf-preiskritik-2506-197329.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/vmware-broadcom-</span><span class="invisible">liefert-einfache-antwort-auf-preiskritik-2506-197329.html</span></a></p><p>Mein Hint: <a href="https://metalhead.club/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a>, <a href="https://metalhead.club/tags/kvm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kvm</span></a>, <a href="https://metalhead.club/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Some Bits: Nelson's Linkblog<p>WSL open source: Microsoft's Windows Subsystem for Linux is now open source. Article includes a nice project history.<br><a href="https://blogs.windows.com/windowsdeveloper/2025/05/19/the-windows-subsystem-for-linux-is-now-open-source/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.windows.com/windowsdevel</span><span class="invisible">oper/2025/05/19/the-windows-subsystem-for-linux-is-now-open-source/</span></a><br> <a href="https://tech.lgbt/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://tech.lgbt/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://tech.lgbt/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://tech.lgbt/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://tech.lgbt/tags/wsl2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wsl2</span></a> <a href="https://tech.lgbt/tags/wsl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wsl</span></a> <a href="https://tech.lgbt/tags/vm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vm</span></a> #+</p>
Linux Magazine<p>Changes to Apple Silicon put the <span class="h-card" translate="no"><a href="https://social.treehouse.systems/@AsahiLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>AsahiLinux</span></a></span> project at odds with adding support for the M4 chips<br><a href="https://www.linux-magazine.com/Online/News/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Online/News</span><span class="invisible">/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM</span></a><br><a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/Asahi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Asahi</span></a> <a href="https://fosstodon.org/tags/AppleSilicon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppleSilicon</span></a> <a href="https://fosstodon.org/tags/M4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>M4</span></a> <a href="https://fosstodon.org/tags/XNU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XNU</span></a> <a href="https://fosstodon.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.</p><p>ERS (439 pages, so far): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>The blog home page is: <a href="https://exploitreversing.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com/</span><span class="invisible"></span></a></p><p>I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.</p><p>Enjoy reading and have an excellent day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
buheratorHyperlight is a library for creating micro virtual machines — or sandboxes — specifically optimized for securely running untrusted code with minimal impact. <br><br><a href="https://github.com/hyperlight-dev/hyperlight" rel="nofollow noopener" target="_blank">https://github.com/hyperlight-dev/hyperlight</a><br><br>It supports both Windows and Linux, utilizing Windows Hypervisor Platform on Windows, and either Microsoft Hypervisor (mshv) or KVM on Linux.<br><br><a class="hashtag" href="https://infosec.place/tag/hypervisor" rel="nofollow noopener" target="_blank">#hypervisor</a> <a class="hashtag" href="https://infosec.place/tag/virtualization" rel="nofollow noopener" target="_blank">#virtualization</a>
vermaden<p>Added 𝗨𝗣𝗗𝗔𝗧𝗘 𝟯 [UPDATE 3] to 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗕𝗵𝘆𝘃𝗲 𝗩𝗶𝗿𝘁𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 [FreeBSD Bhyve Virtualization] article.</p><p><a href="https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vermaden.wordpress.com/2023/08</span><span class="invisible">/18/freebsd-bhyve-virtualization/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/verblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>verblog</span></a> <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/bhyve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bhyve</span></a> <a href="https://mastodon.bsd.cafe/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a> <a href="https://mastodon.bsd.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://mastodon.bsd.cafe/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.bsd.cafe/tags/grub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grub</span></a> <a href="https://mastodon.bsd.cafe/tags/x11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x11</span></a> <a href="https://mastodon.bsd.cafe/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.bsd.cafe/tags/bios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bios</span></a></p>
Stefano Marinelli<p>Migrating Windows VMs From Proxmox BIOS/KVM to FreeBSD UEFI/Bhyve</p><p><a href="https://it-notes.dragas.net/2024/11/15/migrating-windows-vms-from-bios-kvm-to-uefi-bhyve/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it-notes.dragas.net/2024/11/15</span><span class="invisible">/migrating-windows-vms-from-bios-kvm-to-uefi-bhyve/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> <a href="https://mastodon.bsd.cafe/tags/Bhyve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bhyve</span></a> <a href="https://mastodon.bsd.cafe/tags/RunBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/Virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualization</span></a> <a href="https://mastodon.bsd.cafe/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://mastodon.bsd.cafe/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> <a href="https://mastodon.bsd.cafe/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/OwnYourData" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OwnYourData</span></a> <a href="https://mastodon.bsd.cafe/tags/NoteHUB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoteHUB</span></a> <a href="https://mastodon.bsd.cafe/tags/ITNotes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITNotes</span></a> <a href="https://mastodon.bsd.cafe/tags/Server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Server</span></a></p>
Joxean Koret (@matalaz)<p>Wow, Specter bypassed XOM and broke the PS5 hypervisor. Awesome work.</p><p>"Byepervisor: How We Broke the PS5 Hypervisor".</p><p><a href="https://mastodon.social/tags/ps5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ps5</span></a> <a href="https://mastodon.social/tags/xom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xom</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.social/tags/byepervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>byepervisor</span></a><br> <br><a href="https://hardwear.io/netherlands-2024/speakers/specter.php" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hardwear.io/netherlands-2024/s</span><span class="invisible">peakers/specter.php</span></a></p>
GÉANT<p>New learning unit in our <a href="https://mstdn.social/tags/NetworkAutomation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkAutomation</span></a> <a href="https://mstdn.social/tags/eAcademy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eAcademy</span></a> focused on <a href="https://mstdn.social/tags/Xen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xen</span></a>, a highly efficient and scalable <a href="https://mstdn.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> 👉 <a href="https://connect.geant.org/2024/10/04/new-learning-unit-in-the-network-eacademy-hypervisor-based-virtualisation-xen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/10/04/n</span><span class="invisible">ew-learning-unit-in-the-network-eacademy-hypervisor-based-virtualisation-xen</span></a></p><p>Whether you’re just starting with virtualisation or looking to expand your expertise, this course will provide you with the skills to deploy and manage virtualised environments using Xen.</p><p>👤 Trainer: Bojana Koteska, UKIM<br>⏳Duration: 90min</p><p><a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Network</span></a> <a href="https://mstdn.social/tags/Virtualisation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualisation</span></a> <a href="https://mstdn.social/tags/OAV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAV</span></a> <a href="https://mstdn.social/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a> <a href="https://mstdn.social/tags/Education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Education</span></a> <a href="https://mstdn.social/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://mstdn.social/tags/eAcademy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eAcademy</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/Training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Training</span></a> <a href="https://mstdn.social/tags/LearningAndDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LearningAndDevelopment</span></a></p>
Tarnkappe.info<p>📬 Exploit für PS5 Hypervisor kommt bald<br><a href="https://social.tchncs.de/tags/Gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaming</span></a> <a href="https://social.tchncs.de/tags/Jailbreaks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jailbreaks</span></a> <a href="https://social.tchncs.de/tags/Byepervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Byepervisor</span></a> <a href="https://social.tchncs.de/tags/eXecuteOnlyMemory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eXecuteOnlyMemory</span></a> <a href="https://social.tchncs.de/tags/hardweario" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardweario</span></a> <a href="https://social.tchncs.de/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://social.tchncs.de/tags/Middleware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Middleware</span></a> <a href="https://social.tchncs.de/tags/VirtualMachineMonitor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualMachineMonitor</span></a> <a href="https://sc.tarnkappe.info/7dbde6" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/7dbde6</span><span class="invisible"></span></a></p>
Karl Voit :emacs: :orgmode:<p>Reading the ambitious roadmap of <a href="https://graz.social/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a>, I get the impression that this might become the most secure and <a href="https://graz.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a>-respecting platform that also overlaps with many classic desktop use-cases and desktop OS. 🤔 </p><p><a href="https://grapheneos.org/faq#roadmap" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">grapheneos.org/faq#roadmap</span><span class="invisible"></span></a></p><p><a href="https://graz.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://graz.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://graz.social/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://graz.social/tags/microkernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microkernel</span></a> <a href="https://graz.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a> <a href="https://graz.social/tags/isolation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>isolation</span></a> <a href="https://graz.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://graz.social/tags/sandboxing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sandboxing</span></a> <a href="https://graz.social/tags/gVisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gVisor</span></a> <a href="https://graz.social/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://graz.social/tags/TEE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TEE</span></a> <a href="https://graz.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
GÉANT<p>New unit in our <a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Network</span></a> <a href="https://mstdn.social/tags/eAcademy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eAcademy</span></a>: <a href="https://mstdn.social/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> -<a href="https://mstdn.social/tags/KernelBasedVirtualMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KernelBasedVirtualMachine</span></a>!</p><p>The unit covers KVM’s features, setup and management, with practical exercises on installation, commands, and virtual machine creation.</p><p>Get started to enhance your skills and leverage KVM for effective <a href="https://mstdn.social/tags/virtualisation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualisation</span></a> solutions👉 <a href="https://connect.geant.org/2024/07/31/new-learning-unit-in-the-network-eacademy-kernel-based-virtual-machine-kvm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2024/07/31/n</span><span class="invisible">ew-learning-unit-in-the-network-eacademy-kernel-based-virtual-machine-kvm</span></a></p><p>👤Trainer: Bojana Koteska, UKIM<br>⏳Duration: 50min</p><p><a href="https://mstdn.social/tags/VirtualMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualMachine</span></a> <a href="https://mstdn.social/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://mstdn.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a> <a href="https://mstdn.social/tags/Automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Automation</span></a> <a href="https://mstdn.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.social/tags/LinuxKernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxKernel</span></a> <a href="https://mstdn.social/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a> <a href="https://mstdn.social/tags/Education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Education</span></a> <a href="https://mstdn.social/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/Training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Training</span></a></p>