Jozef Reisinger's blog

Infrastructure, security, programming ...

2015-08-13

Quick Vagrant Guide

See here.

No comments:
Labels: sysadmin, virtualization
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Blog Archive

  • ►  2024 (8)
    • ►  12 (1)
    • ►  06 (1)
    • ►  03 (1)
    • ►  02 (3)
    • ►  01 (2)
  • ►  2023 (3)
    • ►  09 (2)
    • ►  01 (1)
  • ►  2022 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  06 (1)
    • ►  05 (1)
  • ►  2021 (4)
    • ►  12 (1)
    • ►  10 (1)
    • ►  02 (1)
    • ►  01 (1)
  • ►  2020 (1)
    • ►  03 (1)
  • ►  2019 (1)
    • ►  12 (1)
  • ►  2018 (2)
    • ►  09 (1)
    • ►  02 (1)
  • ►  2017 (1)
    • ►  07 (1)
  • ►  2016 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  05 (2)
  • ▼  2015 (11)
    • ►  12 (3)
    • ►  11 (1)
    • ▼  08 (1)
      • Quick Vagrant Guide
    • ►  07 (1)
    • ►  06 (2)
    • ►  05 (2)
    • ►  01 (1)
  • ►  2014 (11)
    • ►  11 (1)
    • ►  10 (1)
    • ►  09 (1)
    • ►  07 (2)
    • ►  05 (1)
    • ►  04 (1)
    • ►  03 (1)
    • ►  02 (1)
    • ►  01 (2)
  • ►  2013 (1)
    • ►  12 (1)

Links

  • My homepage
  • Blog posts source

Search This Blog

Labels

audit (3) Bash (3) chatgpt (1) devops (11) Git (2) Go (9) kubernetes (1) Linux (11) management (2) networking (5) Perl (10) security (16) security-engineer (1) sysadmin (9) telco (2) virtualization (5)

Most viewed last 30 days

  • Go katas
    I’ve been working in the DevOps (sysadmin) and cybersecurity domains. That means I work with computer programs all the time and I have to u...
  • Concurrent CLI tools with Go
    Imagine you have a list of 100 URLs and you want to check whether they are OK (i.e. they return 200 HTTP status code). Well, easy enough you...
  • Pod Scheduling in Kubernetes: Taints, Tolerations, and Node Affinity
    In Kubernetes, you can control where pods get scheduled by using two powerful mechanisms: Taints and Tolerations : These allow nodes to ...
  • runp: run commands in parallel
    I’m using shell (bash specifically) on daily basis. From time to time a need arises to run multiple commands in parallel. For example my .b...
  • Shift cipher in Go with multibyte key
    In the previous blog post we developed a simple crypto system. Its algorithm is based on shifting bytes by the number represented by a singl...
  • Go for cybersecurity - learning
    I think cybersecurity practitioners should be able to program. If they do, they can understand computer technologies better and they can aut...
  • Creating a Module::Build Distribution
    (Up-to-date source of this post.) Creating a Module::Build Distribution We show here how to create a Perl distribution using Module::Bu...
  • Perl one-liners
    I think Perl one-liners are still super useful. They are small Perl programs that are run directly from command line. Like this one from t...
  • Testing a Perl Script
    (Up-to-date source of this post.) At $work, I was to upgrade several Debians from Squeezy through Wheezy to Jessie (6 to 8). I wanted to ...
  • Shift cipher in Go
    A simple way to encipher (or encrypt) some data is by using the shift cipher. We can do this in Go by going through the data byte by byte a...

Pageviews last 30 days

Powered by Blogger.