Tags: SysAdmin

Secure Nginx with Let's Encrypt on Debian 9

Let’s Encrypt is a free and open certificate authority developed by the Internet Security Research Group (ISRG). Certificates issued by Let’s Encrypt are trusted by almost all browsers today. In this tutorial, we will explain how to use the Certbot tool to obtain a free SSL certificate for Nginx on...
Read 0 Comments

Docker and Kubernetes in High Security Environments

This is brief summary of parts of my master’s thesis and the conclusions to draw from it. This medium-story focuses on containerized application isolation. The thesis also covers segmentation of cluster networks in Kubernetes which is not discussed in this story. Container orchestration and ...
Read 0 Comments

Future-Proof Your Career with AI

AI is the fastest growing field in enterprise tech. Here's how to get an AI job you will love. AI job listings have become the fastest growing category on LinkedIn, and Indeed is packed with listings. But most job requisitions seek a computer scientist type with a PhD in neural networks or some...
Read 0 Comments

Remote Code Execution in apt/apt-get

tl;dr I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine installing any package. The bug has been fixed in the latest versions of apt. If you’re worried about being exploited during the update process...
Read 0 Comments

Using more to View Text Files at the Linux Command Line

There are a number of utilities that enable you to view text files when you're at the command line. One of them is more. more is similar to another tool I wrote about called less. The main difference is that more only allows you to move forward in a file. While that may seem limiting, it has some...
Read 0 Comments

bash-angles.png

angles
We continue our tour of the many uses of angle brackets in this tutorial.

More About Angle Brackets in Bash

In the previous article, we introduced the subject of angle brackets (< >) and demonstrated some of their uses. Here, we'll look at the topic from a few more angles. Let's dive right in. You can use < to trick a tool into believing the output of a command is data from a file. Let's say you...
Read 0 Comments

9 Trends to Watch in Systems Engineering and Operations

If your job or business relies on systems engineering and operations, be sure to keep an eye on the following trends in the months ahead. AIOps Artificial intelligence for IT operations (AIOps) will allow for improved software delivery pipelines in 2019. This practice incorporates machine learning...
Read 0 Comments

Kali Linux Is the Complete Toolbox for Penetration Testing

Every IT infrastructure offers points of attack that hackers can use to steal and manipulate data. Only one thing can prevent these vulnerabilities from being exploited by unwelcome guests: You need to preempt the hackers and identify and close the gaps. Kali Linux can help. To maintain the...
Read 0 Comments

4 Ways To Calculate A Running Total With SQL

Calculating a running total/rolling sum in SQL is a useful skill to have.  It can often come in handy for reporting and even when developing applications. Sometimes your users might want to see a running total of the points they have gained or perhaps the money they have earned. Like many problems...
Read 0 Comments

Bash's Built-in printf Function

Even if you're already familiar with the printf command, if you got your information via "man printf" you may be missing a couple of useful features that are provided by bash's built-in version of the standard printf(1) command. If you didn't know bash had its own version of printf, then you didn't...
Read 0 Comments

Pages

Click Here!