Jozef Reisinger's blog

Infrastructure, security, programming ...

2015-08-13

Quick Vagrant Guide

See here.

No comments:
Labels: sysadmin, virtualization
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Blog Archive

  • ►  2025 (3)
    • ►  09 (3)
  • ►  2024 (8)
    • ►  12 (1)
    • ►  06 (1)
    • ►  03 (1)
    • ►  02 (3)
    • ►  01 (2)
  • ►  2023 (3)
    • ►  09 (2)
    • ►  01 (1)
  • ►  2022 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  06 (1)
    • ►  05 (1)
  • ►  2021 (4)
    • ►  12 (1)
    • ►  10 (1)
    • ►  02 (1)
    • ►  01 (1)
  • ►  2020 (1)
    • ►  03 (1)
  • ►  2019 (1)
    • ►  12 (1)
  • ►  2018 (2)
    • ►  09 (1)
    • ►  02 (1)
  • ►  2017 (1)
    • ►  07 (1)
  • ►  2016 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  05 (2)
  • ▼  2015 (11)
    • ►  12 (3)
    • ►  11 (1)
    • ▼  08 (1)
      • Quick Vagrant Guide
    • ►  07 (1)
    • ►  06 (2)
    • ►  05 (2)
    • ►  01 (1)
  • ►  2014 (11)
    • ►  11 (1)
    • ►  10 (1)
    • ►  09 (1)
    • ►  07 (2)
    • ►  05 (1)
    • ►  04 (1)
    • ►  03 (1)
    • ►  02 (1)
    • ►  01 (2)
  • ►  2013 (1)
    • ►  12 (1)

Links

  • My homepage
  • Blog posts source
  • Blog posts source 2

Search This Blog

Labels

audit (3) Bash (6) chatgpt (1) devops (14) Git (2) Go (12) kubernetes (2) Linux (11) management (2) networking (5) Perl (10) security (17) security-engineer (3) sysadmin (12) telco (2) virtualization (5)

Most viewed last 30 days

  • Go for cybersecurity - learning
    I think cybersecurity practitioners should be able to program. If they do, they can understand computer technologies better and they can aut...
  • Go for Bash Programmers - Part I: The Language
    This is the first part of a series introducing Bash programmers to Go. This part goes through the language building blocks that will be us...
  • Go for Bash Programmers - Part III: Platforms
    This is the third part of a series introducing Bash programmers to Go. This part starts showing how to build platforms in Go. See the first ...
  • Playing with beelzebub
    While looking for a new project to hone my skills I came across the beelzebub. Wikipedia says Beelzebub, occasionally known as the Lord of ...
  • Go for cybersecurity - tools
    After getting a basic idea of what TLS is in the previous post , let’s write a tool the will help us finding out the TLS version of a server...
  • Go for Bash Programmers - Part II: CLI Tools
    This is the second part of a series introducing Bash programmers to Go. This part is about basics of writing CLI tools in Go. See the first ...
  • Go katas
    I’ve been working in the DevOps (sysadmin) and cybersecurity domains. That means I work with computer programs all the time and I have to u...
  • Stealing Kubernetes secrets
    Kubernetes provides an object called Secret that is meant for storing sensitive data like passwords, tokens or keys. Secrets are decoupled...
  • Pod Scheduling in Kubernetes: Taints, Tolerations, and Node Affinity
    In Kubernetes, you can control where pods get scheduled by using two powerful mechanisms: Taints and Tolerations : These allow nodes to ...
  • Practical cloud security overview
    IT industry has been undergoing seismic shifts regularly. The latest one goes by the name cloud computing. However, the security goals, pri...

Pageviews last 30 days

Powered by Blogger.