System & Network Admin

System & Network Admin

2328 bookmarks
Custom sorting
Using the Lesser Known File Tagging Feature in KDE's Dolphin File Manager
Using the Lesser Known File Tagging Feature in KDE's Dolphin File Manager
Dolphin is the default file manager of the KDE Plasma Desktop Environment. It is considered as one of the most comprehensive and feature-rich file managers available for Linux distributions. Yes. It has tons of features and you may not be aware of all of them. One such feature is file
·itsfoss.com·
Using the Lesser Known File Tagging Feature in KDE's Dolphin File Manager
Keyboard shortcuts, enumerated
Keyboard shortcuts, enumerated
Find all keyboard shortcuts and tips and more about technology on DefKey.com!
·defkey.com·
Keyboard shortcuts, enumerated
Deploy a Kubernetes Development Environment with Kind
Deploy a Kubernetes Development Environment with Kind
Kind is one of the easiest ways of starting out with Kubernetes development, especially if you're just beginning your work with containers.
·thenewstack.io·
Deploy a Kubernetes Development Environment with Kind
Automatically keep a secondary repo in sync with a primary repo?
Automatically keep a secondary repo in sync with a primary repo?
We have a two tier setup. We have a primary repository (called 'primary' below). And a secondary repository (called 'secondary' below) that was created like so: $ git clone --bare --shared $REPO_A/
·stackoverflow.com·
Automatically keep a secondary repo in sync with a primary repo?
11 Best IP Address Management Tools for Linux
11 Best IP Address Management Tools for Linux
In this article, we are going to review some of the best IPAM software that you can use to manage IP addresses in your Linux network.
·tecmint.com·
11 Best IP Address Management Tools for Linux
10 Useful Commands to Collect System and Hardware Information in Linux
10 Useful Commands to Collect System and Hardware Information in Linux
It is always a good practice to know the hardware components of your Linux system is running on, this helps you to deal with compatibility issues when it comes to installing packages, drivers on your system.
·tecmint.com·
10 Useful Commands to Collect System and Hardware Information in Linux
How to Generate Random Passwords in Linux
How to Generate Random Passwords in Linux
In this article, we will share interesting command-line tools to generate random passwords and also how to encrypt and decrypt passwords using the slat method.
·tecmint.com·
How to Generate Random Passwords in Linux
How to Setup Dynamic NFS Provisioning in Kubernetes Cluster
How to Setup Dynamic NFS Provisioning in Kubernetes Cluster
Tutorial on how to setup dynamic nfs provisioning in Kubernetes Cluster. It allows you to automatically provision nfs volumes for pods and deployment on-demand.
·linuxtechi.com·
How to Setup Dynamic NFS Provisioning in Kubernetes Cluster
Prossimo
Prossimo
ISRG's Prossimo is moving critical software to memory safe code.
·memorysafety.org·
Prossimo
Commonly Whitelisted Domains
Commonly Whitelisted Domains
This post is a wiki post. Anybody can edit it to provide useful tips for whitelisting. Editing abuse may result in a ban from the forums! Whitelisting Tips List any tips you've discovered on how or what to whitelist in order to solve specific issues! Google (Maps, Youtube, etc) Google Maps and other Google services pihole -w clients4.google.com pihole -w clients2.google.com YouTube history pihole -w s.youtube.com pihole -w video-stats.l.google.com YouTube App for iOS pihole -w www.goog...
·discourse.pi-hole.net·
Commonly Whitelisted Domains
Creating an IoT Data Pipeline Using InfluxDB and AWS
Creating an IoT Data Pipeline Using InfluxDB and AWS
Reliable data pipelines are critical to industry, providing key information about the state of machinery and to train predictive models to improve operations.
·thenewstack.io·
Creating an IoT Data Pipeline Using InfluxDB and AWS
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and NAT - A Salty Blog
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and NAT - A Salty Blog
(For Chinese readers) 插播一则通知!好久没有更新博客了。今年我将会重新开始发表一些技术笔记,但是由于我目前居住在美国等原因,大部分的新博文将会以英文撰写。带给大家的不便我深...
·im.salty.fish·
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and NAT - A Salty Blog
How to Filter Linux Log Files by Date [4 Useful Commands]
How to Filter Linux Log Files by Date [4 Useful Commands]
Log files are nothing more than text files containing a series of information about the Linux kernel, boot process, user logins, system logs, and so on.
·linuxshelltips.com·
How to Filter Linux Log Files by Date [4 Useful Commands]
How to Lock and Unlock User After Failed SSH Login Attempts
How to Lock and Unlock User After Failed SSH Login Attempts
In this article, we will show how to lock a user or root account after a specifiable number of failed login attempts in CentOS, RHEL and Fedora distributions.
·tecmint.com·
How to Lock and Unlock User After Failed SSH Login Attempts
The death of the .env file***
The death of the .env file***
Six months ago, I advocated for everyone to stop using .env files. Since then, I’ve published more articles on this arena and have learned…
·medium.com·
The death of the .env file***
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly - Leaning Technologies
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly - Leaning Technologies
TL;DR – WebVM is a Linux-like virtual machine running fully client-side in the browser. It is based on CheerpX: a x86 execution engine in WebAssembly by Leaning Technologies. With today’s update, you can deploy your own version of WebVM by simply forking the repo on GitHub and editing the included Dockerfile. A GitHub Actions workflow...
·leaningtech.com·
Mini.WebVM: Your own Linux box from Dockerfile, virtualized in the browser via WebAssembly - Leaning Technologies