Home

Linux - SSH

SSH, or Secure Shell, is a network protocol that provides a secure way to access remote systems over an unsecured network. It allows users to securely log in to a remote machine, execute commands and transfer files between the local and remote system. SSH is widely used in the field of system administration and software development, as it provides a secure and reliable way to manage remote systems and servers.

Read more

Git Cheatsheet

Git is a distributed version control system that allows multiple developers to collaborate on a project and keep track of changes made to the codebase over time. It also enables developers to work on their own local copies of the code, and then merge their changes back into the main codebase. Git uses a series of commands to manage the versioning of code, such as committing changes, branching, merging, and pushing changes to a remote repository.

Read more

Podman Cheatsheet

This cheat sheet covers the commands used for working with Podman, a popular tool for managing containers. Podman commands are mostly compatible with Docker. As stated on the Podman landing page, "Podman is a daemonless, open source, Linux native tool designed to make it easy to find, run, build, share and deploy applications using Open Containers Initiative (OCI) Containers and Container Images."

Read more

Buildah Cheatsheet

Buildah is a tool for creating OCI-compliant container images. Also, Buildah provides the capability to create a container based on a particular container image, update the contents of that container, and then create a brand new container image based on the altered container. Although you can use Buildah to run a container on a local machine in a limited manner, the tool’s fundamental intention is to provide versatility for creating container images and pushing them to a container registry.

Read more

Linux - User and Group Management

User and group management refers to the process of creating, modifying, and removing user accounts and groups on a system. It is critical for maintaining system security, managing resources effectively, and ensuring that users have the access they need to perform their tasks while minimizing the risk of accidental or intentional damage to the system.

Read more