System & Network Admin

System & Network Admin

1904 bookmarks
Custom sorting
11 Best IP Address Management Tools for Linux
11 Best IP Address Management Tools for Linux
In this article, we are going to review some of the best IPAM software that you can use to manage IP addresses in your Linux network.
·tecmint.com·
11 Best IP Address Management Tools for Linux
10 Useful Commands to Collect System and Hardware Information in Linux
10 Useful Commands to Collect System and Hardware Information in Linux
It is always a good practice to know the hardware components of your Linux system is running on, this helps you to deal with compatibility issues when it comes to installing packages, drivers on your system.
·tecmint.com·
10 Useful Commands to Collect System and Hardware Information in Linux
How to Generate Random Passwords in Linux
How to Generate Random Passwords in Linux
In this article, we will share interesting command-line tools to generate random passwords and also how to encrypt and decrypt passwords using the slat method.
·tecmint.com·
How to Generate Random Passwords in Linux
How to Setup Dynamic NFS Provisioning in Kubernetes Cluster
How to Setup Dynamic NFS Provisioning in Kubernetes Cluster
Tutorial on how to setup dynamic nfs provisioning in Kubernetes Cluster. It allows you to automatically provision nfs volumes for pods and deployment on-demand.
·linuxtechi.com·
How to Setup Dynamic NFS Provisioning in Kubernetes Cluster
Prossimo
Prossimo
ISRG's Prossimo is moving critical software to memory safe code.
·memorysafety.org·
Prossimo
Commonly Whitelisted Domains
Commonly Whitelisted Domains
This post is a wiki post. Anybody can edit it to provide useful tips for whitelisting. Editing abuse may result in a ban from the forums! Whitelisting Tips List any tips you've discovered on how or what to whitelist in order to solve specific issues! Google (Maps, Youtube, etc) Google Maps and other Google services pihole -w clients4.google.com pihole -w clients2.google.com YouTube history pihole -w s.youtube.com pihole -w video-stats.l.google.com YouTube App for iOS pihole -w www.goog...
·discourse.pi-hole.net·
Commonly Whitelisted Domains
Creating an IoT Data Pipeline Using InfluxDB and AWS
Creating an IoT Data Pipeline Using InfluxDB and AWS
Reliable data pipelines are critical to industry, providing key information about the state of machinery and to train predictive models to improve operations.
·thenewstack.io·
Creating an IoT Data Pipeline Using InfluxDB and AWS
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and NAT - A Salty Blog
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and NAT - A Salty Blog
(For Chinese readers) 插播一则通知!好久没有更新博客了。今年我将会重新开始发表一些技术笔记,但是由于我目前居住在美国等原因,大部分的新博文将会以英文撰写。带给大家的不便我深...
·im.salty.fish·
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and NAT - A Salty Blog
How to Filter Linux Log Files by Date [4 Useful Commands]
How to Filter Linux Log Files by Date [4 Useful Commands]
Log files are nothing more than text files containing a series of information about the Linux kernel, boot process, user logins, system logs, and so on.
·linuxshelltips.com·
How to Filter Linux Log Files by Date [4 Useful Commands]
How to Lock and Unlock User After Failed SSH Login Attempts
How to Lock and Unlock User After Failed SSH Login Attempts
In this article, we will show how to lock a user or root account after a specifiable number of failed login attempts in CentOS, RHEL and Fedora distributions.
·tecmint.com·
How to Lock and Unlock User After Failed SSH Login Attempts
The death of the .env file***
The death of the .env file***
Six months ago, I advocated for everyone to stop using .env files. Since then, I’ve published more articles on this arena and have learned…
·medium.com·
The death of the .env file***
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly - Leaning Technologies
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly - Leaning Technologies
TL;DR – WebVM is a Linux-like virtual machine running fully client-side in the browser. It is based on CheerpX: a x86 execution engine in WebAssembly by Leaning Technologies. With today’s update, you can deploy your own version of WebVM by simply forking the repo on GitHub and editing the included Dockerfile. A GitHub Actions workflow...
·leaningtech.com·
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly - Leaning Technologies
FUSE and io_uring
FUSE and io_uring
Bernd Schubert led a session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit on the intersection of FUSE and io_uring. He works for DDN Storage, which is using FUSE for two network-storage products; he has found FUSE to be a bottleneck for those filesystems. That could perhaps be improved by using io_uring, which is something he has been working on and wanted to discuss.
·lwn.net·
FUSE and io_uring
Enable IPv6 privacy in NetworkManager
Enable IPv6 privacy in NetworkManager
On most IPv6-enabled networks, network addresses are distributed via stateless address autoconfiguration (SLAAC).
·major.io·
Enable IPv6 privacy in NetworkManager
NGINX Reverse Proxy
NGINX Reverse Proxy
Configure NGINX as a reverse proxy for HTTP and other protocols, with support for modifying request headers and fine-tuned buffering of responses.
·docs.nginx.com·
NGINX Reverse Proxy
How to Set Up Basic HTTP Authentication in NGINX
How to Set Up Basic HTTP Authentication in NGINX
Basic username and password authentication is an easy and simple way to secure administrative panels and backend services. Nginx can be configured to protect certain areas of your website, or even used as a reverse proxy to secure other services.
·howtogeek.com·
How to Set Up Basic HTTP Authentication in NGINX