Showing headlines posted by enable_sysadmin
« Previous ( 1 ... 7 8 9 10 11 12 13 14 15 16 17 ... 32 ) Next »How to use the uniq command to process lists in Linux
Processing data can be a challenge. Let's see how the uniq command works and how it supplements the sort command.
Exploring Podman RESTful API using Python and Bash
Check out Podman's new RESTful API using Python and Bash.
A Linux sysadmin's introduction to cgroups
Defining cgroups and how they help with resource management and performance tuning in this first article kicking off a four-part series covering cgroups and resource management.
Tracking time with Timewarrior at the command line
See how this great Linux time tracking software helps sysadmins manage tasks and resource allocation.
How to manage cgroups with CPUShares
Managing access to CPU time using CPUShares with cgroups in part two in this four-part series covering cgroups and resource management.
An introduction to web application firewalls for Linux sysadmins
You've used host-based firewalls and network firewalls, but have you ever considered implementing a web application firewall? You should.
A beginner's guide to gawk
The gawk command is a standard sysadmin tool. Learn to use it to extract information from files and your system.
Need to know technologies for junior sysadmins.
Sit down and have a conversation with some experienced sysadmins about technologies valuable to aspiring sysadmins.
Quantum computers and future of system administration
We are on the threshold to the next gigantic leap, thanks to quantum computers. Sysadmins, are you ready?
Technologies for container isolation: A comparison of AppArmor and SELinux
This article takes a look at AppArmor and SELinux security technologies and explores the capabilities of each.
Sysadmin tools: Creating network diagrams with diagrams.net
Got diagrams? Need diagrams? Check out diagrams.net, an open source tool for drawing all sorts of visualizations.
Balancing Linux security with usability
Your system should be secure, but open enough to serve its function. Here are some tips on how to strike that balance.
Using ssh-keygen and sharing for key-based authentication in Linux
SSH key-based authentication is helpful for both security and convenience. See how to generate and share keys.
Turn a Kubernetes deployment into a Knative service
Discover great flexibility, easier deployments, and auto-scaling features by using Knative services.
Linux sysadmins: Understand ncat's power to avoid accidental security risks
The ncat command is a sysadmin's Swiss Army knife, but be careful to ensure you're using it safely.
5 ways to harden a new system with Ansible
Use Ansible to harden newly-deployed servers for consistent configurations with security in mind.
Hard links and soft links in Linux explained
Let's discuss when you should use hard links or soft links, and the syntax of the ln command.
Taming the tar command: Tips for managing backups in Linux
Put tar to work creating and managing your backups smartly. Learn how tar can create, extract, append, split, verify integrity, and much more.
An introduction to Kubespray
By combining Ansible and Kubernetes, Kubespray can deploy Kubernetes clusters on multiple machines.
Build a personal Git server with Gogs and Podman
Use a personal git server to save and manage your own code, to share code across different machines in your network, or to share with a small team.
« Previous ( 1 ... 7 8 9 10 11 12 13 14 15 16 17 ... 32 ) Next »