Articles by Tag #sysadmin

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Configure SSH Login from Windows to Windows

A step-by-step guide to setting up SSH login from one Windows machine to another for secure remote access.

Learn More 11 0Jan 21

Creating and Managing Custom systemd Services on Ubuntu

Introduction If you've ever needed to automate an application or script to run on boot or...

Learn More 10 0Jan 26

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

Learn how to implement SSH key expiration and rotation using AuthorizedKeysCommand for better security hygiene on Linux servers.

Learn More 8 0Jun 22

🛡️ Complete Guide to Fail2Ban: Protect Your SSH Server from Brute Force Attacks

Learn how to secure your SSH servers against brute force attacks using Fail2Ban. Step-by-step setup, testing scripts, and advanced hardening tips included.

Learn More 4 7May 18

Managing NixOS on DigitalOcean with Colmena

In this post, we will prepare a DigitalOcean image for NixOS, launch a droplet with it and manage it...

Learn More 4 0Aug 23 '24

System Performance Monitoring

Table of Contents Why Monitoring Matters What to Monitor (Key Performance Metrics) 1....

Learn More 3 0May 3

10 Bash Commands Every Sysadmin Should Know

Introduction As a system administrator, mastering Bash commands is essential for managing,...

Learn More 3 0Oct 25 '24

Understanding Networking Commands - Why They Matter

It’s not about being perfect. It’s about understanding what you’re doing. It’s been a minute since...

Learn More 3 0Apr 10

Configure SSH Passwordless Login from Windows to Linux

A step-by-step guide to setting up SSH passwordless login from a Windows machine to a Linux server for seamless and secure connectivity.

Learn More 3 2Dec 28 '24

How to Set the Hostname on a Linux System

Learn how to set, update, and manage hostnames on Linux systems using the powerful `hostnamectl` command.

Learn More 3 0Dec 27 '24

How to make easy encrypted backups with rclone for free

Rclone supports tons of different storage backends. I like to use R2 on Cloudflare with their...

Learn More 2 0Aug 15 '24

How to Recover from Expired vCenter 7 (ESXI) Certificates: A Step-by-Step Guide 2025

"Recently I encountered a situation where vCenter 7's certificates had expired, causing...

Learn More 2 0Jan 25

DKIM, DMARC und SPF: Der Schutzschild deiner E-Mail-Kommunikation 🛡️

Schütze deine E-Mail-Kommunikation! Erfahre, wie DKIM, DMARC und SPF vor Spoofing und Phishing...

Learn More 2 0Sep 21 '24

A simple tool for automated MySQL database dumps and restores

Hey everyone! 👋 I’ve recently built a Rust-based tool called DumpSync that allows for automatic...

Learn More 2 2Nov 5 '24

Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

Learn how to secure SSH access on your Linux servers using TCP Wrappers, AllowUsers, AllowGroups, and IP restrictions. Step-by-step examples included for locking down your environment and preventing unauthorized access.

Learn More 2 0Apr 27

Group Management in Linux: The First Step to Becoming a Sysadmin

If you’re thinking about becoming a Linux system administrator, one of the first things you need to...

Learn More 1 0Apr 22

Basic Linux Syntax Frequently Used by Writer

Hallo world! Postingan ini akan membahas beberapa syntax dasar yg sering penulis gunakan. Post ini...

Learn More 1 3Aug 27 '24

Running Linux in QEMU: How to Build a VM from an ISO

Learn how to create and boot a Linux virtual machine using QEMU and an ISO file, with support for x86 and PowerPC architectures. Perfect for portable testing environments.

Learn More 1 0Apr 5

The Unsung Heroes of the AI Age: Sysadmins, Our Digital Guardians

Ah, the age of AI! Where machines are almost as smart as your Aunt Margaret who insists she can still...

Learn More 1 0Aug 4 '24

Creating users and groups from a file with bash.

As a devops engineer creating users and managing them is one of the primary responsibilities as a...

Learn More 1 0Jul 1 '24

Linux Communication Commands Every System Administrator Should Know: `users`, `write`, and `wall`

Table of Contents 1. users – Who’s Logged In? 2. write – Sending Private Messages to...

Learn More 1 0Jun 9

🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH

Secure your Linux servers with this easy guide on setting up Multi-Factor Authentication (MFA) for SSH on Ubuntu 24.04 using Google Authenticator.

Learn More 1 1May 10

Secure SSH Access with Modular Policy Files

Learn how to harden your SSH server using modular configuration files and reusable security policies. Improve manageability, mitigate vulnerabilities, and enforce best practices.

Learn More 1 0Jun 15

How to Use QEMU to Run Linux VMs in Minutes

Learn how to quickly spin up Kali Linux and Fedora Server virtual machines using QEMU with real-world examples and command explanations.

Learn More 1 1Apr 1

DKIM, DMARC and SPF: The protective shield for your email communication 🛡️

Protect your email communication! Find out how DKIM, DMARC and SPF protect against spoofing and...

Learn More 1 0Sep 21 '24

Make Cronjob Script With Log

Postingan ini hanyalah catatan untuk penulis. Ini adalah script cronjob yg dibuat untuk membuat log...

Learn More 1 0Jul 11 '24

QEMU: Lightweight Virtualization for the Command Line Enthusiast

Discover how QEMU, a powerful CLI-based hypervisor, makes it easy to spin up VMs for quick testing and development across platforms—even on laptops.

Learn More 1 3Mar 31

Windows Server 2025 Data Center (16 Core): The Next Generation of Enterprise Server OS

Microsoft has announced Windows Server 2025, the next evolution of its powerful server operating...

Learn More 1 0Jun 20

❓ Do you allow wrong input to enter your function?

✋ Then stop, PowerShell can help you validate your parameters. The first picture shows how to...

Learn More 1 0Oct 19 '24

Automating User and Group Management Using Bash Script

Bash, short for Bourne Again Shell, is a Unix shell and command language that has been a fundamental...

Learn More 1 0Jul 3 '24