Linux - SSH
SSH, or Secure Shell, is a network protocol that provides a secure way to access remote systems over an unsecured network. It allows users to securely log in to a remote machine, execute commands and transfer files between the local and remote system. SSH is widely used in the field of system administration and software development, as it provides a secure and reliable way to manage remote systems and servers.
VScode Tips & Tricks
This page contains some settings, commands and snippets for a more efficient and effective VScode workspace.
Git Cheatsheet
Git is a distributed version control system that allows multiple developers to collaborate on a project and keep track of changes made to the codebase over time. It also enables developers to work on their own local copies of the code, and then merge their changes back into the main codebase. Git uses a series of commands to manage the versioning of code, such as committing changes, branching, merging, and pushing changes to a remote repository.
Podman Cheatsheet
This cheat sheet covers the commands used for working with Podman, a popular tool for managing containers. Podman commands are mostly compatible with Docker. As stated on the Podman landing page, "Podman is a daemonless, open source, Linux native tool designed to make it easy to find, run, build, share and deploy applications using Open Containers Initiative (OCI) Containers and Container Images."
Buildah Cheatsheet
Buildah is a tool for creating OCI-compliant container images. Also, Buildah provides the capability to create a container based on a particular container image, update the contents of that container, and then create a brand new container image based on the altered container. Although you can use Buildah to run a container on a local machine in a limited manner, the tool’s fundamental intention is to provide versatility for creating container images and pushing them to a container registry.
Linux - User and Group Management
User and group management refers to the process of creating, modifying, and removing user accounts and groups on a system. It is critical for maintaining system security, managing resources effectively, and ensuring that users have the access they need to perform their tasks while minimizing the risk of accidental or intentional damage to the system.
19 post articles, 3 pages.