System & Network Admin

System & Network Admin

2075 bookmarks
Custom sorting
How to Use 'head' Command to Manage Files Effectively
How to Use 'head' Command to Manage Files Effectively
In this guide, we will learn about the head command using some practical examples to work with text files efficiently from the command line interface.
·tecmint.com·
How to Use 'head' Command to Manage Files Effectively
Creating ED25519 SSH keys
Creating ED25519 SSH keys
TLDR; The following command will create a new SSH key using ED25519 with an auto-generated comment. ssh-keygen -t ed25519 -f $HOME/.ssh/id_ed25519 -C "$(whoami)@$(hostname)-$(date +'%y%m%d')" SSH Keys The best, and sometimes only, way to connect to a remote SSH server is via an SSH key. Allowing key only access to a SSH server massively reduces an attackers ability to brute force the server and raises the overall level of security.
·mebmc.uk·
Creating ED25519 SSH keys
DNS Response Size
DNS Response Size
Everybody knows a DNS response needs to fit into a 512 byte UDP packet, right? But suppose it doesn't fit...
·netmeister.org·
DNS Response Size
SSH Troubleshooting Guide
SSH Troubleshooting Guide
I won't go into specific cases in this blog post. This is a general guide on how to gather the necessary information that will help you to get your problem fixed. In this post, I'll use a Linux client
·ittavern.com·
SSH Troubleshooting Guide
who Command in Linux: Explanation with Examples
who Command in Linux: Explanation with Examples
A simple tutorial explaining the basics of who command in Linux with its parameters, syntax, usage and various examples.
·debugpoint.com·
who Command in Linux: Explanation with Examples
How to build your OCI images using Buildpacks
How to build your OCI images using Buildpacks
Docker has become the new standard for building your application. In a Docker image we place our source code, its dependencies, some configurations and our application is almost ready to be deployed…
·adaltas.com·
How to build your OCI images using Buildpacks
Advanced Copy - Shows Progress While Copying Files in Linux
Advanced Copy - Shows Progress While Copying Files in Linux
Advanced-Copy is a command line program that is very much similar, but a little modified version of the original cp and mv command with a progress bar.
·tecmint.com·
Advanced Copy - Shows Progress While Copying Files in Linux
With Automated Backups, ‘Cron Jobs’ May Not Work in Your Favor
With Automated Backups, ‘Cron Jobs’ May Not Work in Your Favor
Cron jobs are not sufficiently stable as a method for backup automation. In this article, we explore how best to back up data in terms of setup, frequency, data retention and general automation best practices.
·thenewstack.io·
With Automated Backups, ‘Cron Jobs’ May Not Work in Your Favor
How to Install a Teleport Cluster on Debian 11
How to Install a Teleport Cluster on Debian 11
Teleport is an open-source that can be used as an access plane for your global infrastructure. It provides zero-trust access to various services such ...
·howtoforge.com·
How to Install a Teleport Cluster on Debian 11
SSH - run script or command at login
SSH - run script or command at login
There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so. Example script The examp
·ittavern.com·
SSH - run script or command at login
Exporting History from Firefox
Exporting History from Firefox
I have found recently that Firefox in Linux (Mint 17.3) is very sluggish, I do have Chrome on my system as well but I prefer Firefox for various
·linuxquestions.org·
Exporting History from Firefox
How to Backup and Restore Firefox Profile On Linux
How to Backup and Restore Firefox Profile On Linux
A backup of your Firefox profile enables you to save all your browser data (extensions, history, settings, etc.) on your local machine or any other storage.
·fossmint.com·
How to Backup and Restore Firefox Profile On Linux
Trying Tailscale.
Trying Tailscale.
Like most folks working in infrastructure engineering in 2014, I really enjoyed Google’s BeyondCorp whitepaper. My foremost personal interest was grounded in the fact that Uber’s contemporaneous security implementation didn’t include a VPN, so it was interesting to see a well-thought description of fostering security without over-reliance on a hardened network for employee devices. I had a second, longer-term, personal interest as well, which was never again having to argue with a coworker about why they needed to log into the VPN before accessing a secure resource.
·lethain.com·
Trying Tailscale.
Linux iptables Firewall Simplified Examples - Like Geeks
Linux iptables Firewall Simplified Examples - Like Geeks
Learn about iptables firewall, Chains, Policies, Adding, Deleting, Replacing, Saving and Listing Rules, Block ICMP Packets, Blocking Bad Flags, SYN Flooding
·likegeeks.com·
Linux iptables Firewall Simplified Examples - Like Geeks
auto-encrypt
auto-encrypt
Automatically-provisioned TLS certificates for Node.js servers using Let’s Encrypt.
·codeberg.org·
auto-encrypt
Visual guide to SSH tunneling and port forwarding
Visual guide to SSH tunneling and port forwarding
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you. Topics: use ca
·ittavern.com·
Visual guide to SSH tunneling and port forwarding