Showing headlines posted by enable_sysadmin

« Previous ( 1 2 3 4 5 6 7 8 9 ... 32 ) Next »

5 totally useless Linux commands

Linux has perhaps hundreds of essential and useful commands. These are not.

Exploring PKI weaknesses and how to combat them

Public key infrastructure has some known weaknesses. See how Certificate Authority Authorization and Certificate Transparency help strengthen certificate infrastructures.

Static and dynamic IP address configurations: DHCP deployment

Configure a DHCP server and scope to provide dynamic IP address configurations to your network subnet.

Static and dynamic IP address configurations for DHCP

IP address configurations are critical, but what is the difference between static and dynamic addressing, and how does DHCP come into play?

May the Fourth be with you via Podman

A unique approach to rewatching the original Star Wars movie in a container.

5 tips for deciding which Linux tasks and workloads to automate

It's tough to know how to get started with automation, but here are five ideas to get you rolling.

File transfer protocols: FTP vs SFTP

You have both secure and non-secure choices for file transfer, and each can have different advantages in different situations.

Ping command basics for testing and troubleshooting

Have you ever stopped to look at how much more ping can do for you beyond just a quick network connectivity test?

How to resize a logical volume with 5 simple LVM commands

It's easy to add capacity to logical volumes with a few simple commands.

Home automation: Running Home Assistant with Podman

An introduction to the Home Assistant open source project, what it can do, and a basic setup using a container.

Have you ever racked a server?

There are sysadmins who have to rack servers as part of their jobs while others have never stepped foot inside a chilly data center.

How to build an active-active-active cluster with RHEL 8 and Percona MySQL

This guide shows you that it's easy to build a multi-master database on Red Hat Enterprise Linux 8.

My journey into Linux system administration

Take a look inside one Linux sysadmin's path to achieving his goals.

OpenStack's history, community, and 7 of its core projects

A relatively high overview of what OpenStack is, how it came to be, and its most commonly installed services.

How to use Ansible to configure a reverse proxy

Placing a load balancer in front of your web server infrastructure helps ensure any spike in traffic doesn't bring down the site.

6 advanced tcpdump formatting options

The final article in this three-part tcpdump series covers six more tcpdump packet capturing trick options.

6 tcpdump network traffic filter options

The first six of eighteen common tcpdump options that you should use for network troubleshooting and analysis.

How to create new users in OpenShift with htpasswd and OAuth

OpenShift is flexible in the options available for authentication; here's how to use htpasswd for authentication.

An introduction to firewalld rules and scenarios

The firewall is a critical security component of your Linux system. See how to filter traffic with zones and rules.

Exploring the new Podman secret command

Use the new podman secret command to secure sensitive data when working with containers.

« Previous ( 1 2 3 4 5 6 7 8 9 ... 32 ) Next »