Showing headlines posted by enable_sysadmin
« Previous ( 1 2 3 4 5 6 7 8 9 ... 32 ) Next »5 totally useless Linux commands
Linux has perhaps hundreds of essential and useful commands. These are not.
Exploring PKI weaknesses and how to combat them
Public key infrastructure has some known weaknesses. See how Certificate Authority Authorization and Certificate Transparency help strengthen certificate infrastructures.
Static and dynamic IP address configurations: DHCP deployment
Configure a DHCP server and scope to provide dynamic IP address configurations to your network subnet.
Static and dynamic IP address configurations for DHCP
IP address configurations are critical, but what is the difference between static and dynamic addressing, and how does DHCP come into play?
May the Fourth be with you via Podman
A unique approach to rewatching the original Star Wars movie in a container.
5 tips for deciding which Linux tasks and workloads to automate
It's tough to know how to get started with automation, but here are five ideas to get you rolling.
File transfer protocols: FTP vs SFTP
You have both secure and non-secure choices for file transfer, and each can have different advantages in different situations.
Ping command basics for testing and troubleshooting
Have you ever stopped to look at how much more ping can do for you beyond just a quick network connectivity test?
How to resize a logical volume with 5 simple LVM commands
It's easy to add capacity to logical volumes with a few simple commands.
Home automation: Running Home Assistant with Podman
An introduction to the Home Assistant open source project, what it can do, and a basic setup using a container.
Have you ever racked a server?
There are sysadmins who have to rack servers as part of their jobs while others have never stepped foot inside a chilly data center.
How to build an active-active-active cluster with RHEL 8 and Percona MySQL
This guide shows you that it's easy to build a multi-master database on Red Hat Enterprise Linux 8.
My journey into Linux system administration
Take a look inside one Linux sysadmin's path to achieving his goals.
OpenStack's history, community, and 7 of its core projects
A relatively high overview of what OpenStack is, how it came to be, and its most commonly installed services.
How to use Ansible to configure a reverse proxy
Placing a load balancer in front of your web server infrastructure helps ensure any spike in traffic doesn't bring down the site.
6 advanced tcpdump formatting options
The final article in this three-part tcpdump series covers six more tcpdump packet capturing trick options.
6 tcpdump network traffic filter options
The first six of eighteen common tcpdump options that you should use for network troubleshooting and analysis.
How to create new users in OpenShift with htpasswd and OAuth
OpenShift is flexible in the options available for authentication; here's how to use htpasswd for authentication.
An introduction to firewalld rules and scenarios
The firewall is a critical security component of your Linux system. See how to filter traffic with zones and rules.
Exploring the new Podman secret command
Use the new podman secret command to secure sensitive data when working with containers.