System & Network Admin

System & Network Admin

2075 bookmarks
Custom sorting
50+ Useful Git Commands with Examples for Beginners
50+ Useful Git Commands with Examples for Beginners
This guide highlights the usage of useful Git commands for handling distributed version control on Git-repository management systems like GitHub and GitLab.
·linuxshelltips.com·
50+ Useful Git Commands with Examples for Beginners
Cutover
Cutover
·abuseat.org·
Cutover
Open. Friendly. Community Driven. | PINE64
Open. Friendly. Community Driven. | PINE64
The comments section on the blog will be closed starting December 21 as the website receives an overhaul. In the meanwhile, there is a dedicated thread on the PINE64 Forum to discuss this month'
·pine64.org·
Open. Friendly. Community Driven. | PINE64
Share secrets with public cryptography
Share secrets with public cryptography
Share secrets with public cryptography Software Development, API development, Indutrial IOT
·kevwe.com·
Share secrets with public cryptography
EICAR test file - riskless method to test your antivirus and firewall
EICAR test file - riskless method to test your antivirus and firewall
Disclaimer: There are more meaningful, and more advanced solutions to test your security solutions, but for a quick, simple, and riskless test, the upcoming test files are more than enough. EICAR test
·ittavern.com·
EICAR test file - riskless method to test your antivirus and firewall
Linux - How to work with complex commands
Linux - How to work with complex commands
It can frustrate to work on complex commands in the terminal. I'll present you some tips on how to manage them. If you have another tip, I'd appreciate a quick message. Use backslash\ to add a line b
·ittavern.com·
Linux - How to work with complex commands
nginx - simple and native authentication function
nginx - simple and native authentication function
Important disclaimer: This solution is not secure! - It is fine for a quick and temporary solution for your local network, but it is not a secure solution for important ressources that are available o
·ittavern.com·
nginx - simple and native authentication function
ssh - How to use public key authentication on Linux
ssh - How to use public key authentication on Linux
Disclaimer: Read the whole post before you start. This will help you avoid a lock-out Generating a secure key pair SSH keys use asymmetric cryptographic algorithms that generate a pair of separate
·ittavern.com·
ssh - How to use public key authentication on Linux
SSH server hardening
SSH server hardening
We all know that it is important to secure your machines. I am going to show you some ways to do so. Some are trivial and should be set immediately, and some require some more work. Part 2 will follow
·ittavern.com·
SSH server hardening
What is the total amount of public IPv4 addresses?
What is the total amount of public IPv4 addresses?
Yes, I am needing to know what the total number possible IPs in the public IPv4 space. I'm not sure where to even get a neat list of all the IP address ranges, so could someone point me to a reso...
·stackoverflow.com·
What is the total amount of public IPv4 addresses?
Hands-on Linux firewall rules with iptables
Hands-on Linux firewall rules with iptables
In this article you will learn a combination of common scenarios with iptables, one of the most popular tools for configuring the Linux kernel firewall.
·blog.konst.kiwi·
Hands-on Linux firewall rules with iptables
illumos
illumos
·illumos.org·
illumos
Bulwark Passkey
Bulwark Passkey
Software-based WebAuthN/2FA
·bulwark.id·
Bulwark Passkey
UEFI vs. BIOS: Which One You Should Use - Make Tech Easier
UEFI vs. BIOS: Which One You Should Use - Make Tech Easier
The initial startup firmware is a crucial part of your computer's booting process. Learn about UEFI and how it stacks up vs. the older BIOS.
·maketecheasier.com·
UEFI vs. BIOS: Which One You Should Use - Make Tech Easier
How to Check Linux OS Name, Kernel Version, and Information
How to Check Linux OS Name, Kernel Version, and Information
In this article, we will explain how to find out the Linux distribution name, kernel version, release version, hardware name, and other Linux system information
·tecmint.com·
How to Check Linux OS Name, Kernel Version, and Information
What's the Difference Between apt remove and apt purge?
What's the Difference Between apt remove and apt purge?
Both apt remove and apt purge commands are useful in uninstalling a package, but the apt purge removes any configuration files associated with the package.
·linuxshelltips.com·
What's the Difference Between apt remove and apt purge?
How to Do a UDP Ping in Linux
How to Do a UDP Ping in Linux
Learn two ways of doing a UDP ping in Linux with nmap and netcat commands.
·linuxhandbook.com·
How to Do a UDP Ping in Linux
7 Tips to Speed Up Tor Browser - Make Tech Easier
7 Tips to Speed Up Tor Browser - Make Tech Easier
Using the Tor browser can significantly reduce your browsing speed. Here are some tips to speed up the Tor browser and make it faster.
·maketecheasier.com·
7 Tips to Speed Up Tor Browser - Make Tech Easier