System & Network Admin

System & Network Admin

2144 bookmarks
Custom sorting
Setting up SSH Keys on the Raspberry Pi #piday #raspberrypi @Raspberry_Pi
Setting up SSH Keys on the Raspberry Pi #piday #raspberrypi @Raspberry_Pi
via Raspberry Pi-Spy Setting up SSH keys on a Raspberry Pi is relatively easy and can make connecting to one over a network more convenient. In this tutorial we’ll explain how to create and configu…
·blog.adafruit.com·
Setting up SSH Keys on the Raspberry Pi #piday #raspberrypi @Raspberry_Pi
How to Use SSH Config File [Beginner's Guide]
How to Use SSH Config File [Beginner's Guide]
Using SSH profiles can help you in cases where you regularly connect to various servers. No need to remember the IP address and other such details for SSH connection.
·linuxhandbook.com·
How to Use SSH Config File [Beginner's Guide]
How to Organize Your Digital Files
How to Organize Your Digital Files
With the right setup of folders and file names, you’ll always be able to find what you need on your computer.
·nytimes.com·
How to Organize Your Digital Files
Text Aesthetics: Command Line UI/UX
Text Aesthetics: Command Line UI/UX
Beautifying and modernizing your command line experience. A tour of emulators, text options, and prompt styling.
·blog.mikecordell.com·
Text Aesthetics: Command Line UI/UX
15 ways to advance your Kubernetes journey in 2022
15 ways to advance your Kubernetes journey in 2022
2021 has been an exciting year for Kubernetes, and these articles prove it. From fun interfaces to homelabs to development environments, check out my favorite articles from 2021, K8s style.
·opensource.com·
15 ways to advance your Kubernetes journey in 2022
Make ping audible
Make ping audible
Sysadmin trick of the day – if a server is down and you don't know when it will be back up, use `ping -a` to hear when it comes back up. The `-a` flag enables audio alert.
·catonmat.net·
Make ping audible
How to configure a Nessus Vulnerability Scan Policy
How to configure a Nessus Vulnerability Scan Policy
In this guide we will explore how to configure a scan policy on Nessus, later we will also use this policy to create a scan. We will then select a tar...
·howtoforge.com·
How to configure a Nessus Vulnerability Scan Policy
Arpwatch Tool to Monitor Ethernet Activity in Linux
Arpwatch Tool to Monitor Ethernet Activity in Linux
Arpwatch is an open source computer software program that helps you to monitor Ethernet traffic activity (like Changing IP and MAC Addresses) on your network.
·tecmint.com·
Arpwatch Tool to Monitor Ethernet Activity in Linux
kitty
kitty
The fast, feature-rich, GPU based terminal emulator Fast Offloads rendering to the GPU for lower system load, Uses threaded rendering for absolutely minimal latency, Performance tradeoffs can be tu...
·sw.kovidgoyal.net·
kitty
Dynamic scheduling of Tekton workloads using Triggers
Dynamic scheduling of Tekton workloads using Triggers
Tekton is a Kubernetes-native continuous integration and delivery (CI/CD) framework. It allows you to create containerized, composable, and configurable workloads declaratively through Kubernetes Custom Resource Definitions (CRD).
·opensource.com·
Dynamic scheduling of Tekton workloads using Triggers
Managing GraphQL at Scale
Managing GraphQL at Scale
GraphQL, the query language invented by Facebook, has attracted a lot of interest as a means to conveniently access data programmatically. GraphQL
·devops.com·
Managing GraphQL at Scale