Jozef Reisinger's blog

Infrastructure, security, programming ...

2015-08-13

Quick Vagrant Guide

See here.

No comments:
Labels: sysadmin, virtualization
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Blog Archive

  • ►  2025 (2)
    • ►  09 (2)
  • ►  2024 (8)
    • ►  12 (1)
    • ►  06 (1)
    • ►  03 (1)
    • ►  02 (3)
    • ►  01 (2)
  • ►  2023 (3)
    • ►  09 (2)
    • ►  01 (1)
  • ►  2022 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  06 (1)
    • ►  05 (1)
  • ►  2021 (4)
    • ►  12 (1)
    • ►  10 (1)
    • ►  02 (1)
    • ►  01 (1)
  • ►  2020 (1)
    • ►  03 (1)
  • ►  2019 (1)
    • ►  12 (1)
  • ►  2018 (2)
    • ►  09 (1)
    • ►  02 (1)
  • ►  2017 (1)
    • ►  07 (1)
  • ►  2016 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  05 (2)
  • ▼  2015 (11)
    • ►  12 (3)
    • ►  11 (1)
    • ▼  08 (1)
      • Quick Vagrant Guide
    • ►  07 (1)
    • ►  06 (2)
    • ►  05 (2)
    • ►  01 (1)
  • ►  2014 (11)
    • ►  11 (1)
    • ►  10 (1)
    • ►  09 (1)
    • ►  07 (2)
    • ►  05 (1)
    • ►  04 (1)
    • ►  03 (1)
    • ►  02 (1)
    • ►  01 (2)
  • ►  2013 (1)
    • ►  12 (1)

Links

  • My homepage
  • Blog posts source
  • Blog posts source 2

Search This Blog

Labels

audit (3) Bash (5) chatgpt (1) devops (13) Git (2) Go (11) kubernetes (1) Linux (11) management (2) networking (5) Perl (10) security (17) security-engineer (2) sysadmin (11) telco (2) virtualization (5)

Most viewed last 30 days

  • Go for cybersecurity - learning
    I think cybersecurity practitioners should be able to program. If they do, they can understand computer technologies better and they can aut...
  • Go for cybersecurity - tools
    After getting a basic idea of what TLS is in the previous post , let’s write a tool the will help us finding out the TLS version of a server...
  • Stealing Kubernetes secrets
    Kubernetes provides an object called Secret that is meant for storing sensitive data like passwords, tokens or keys. Secrets are decoupled...
  • Concurrent CLI tools with Go
    Imagine you have a list of 100 URLs and you want to check whether they are OK (i.e. they return 200 HTTP status code). Well, easy enough you...
  • log4shell
    During this year’s Advent the Log4Shell vulnerability was discovered. It’s a vulnerability with high impact. This is because of three facto...
  • Preventing git leaks
    I track most of my code and prose via git and I store it on GitHub in public repos. I do it because I get reliable storage for free that I ...
  • Go for Bash Programmers - Part I: The Language
    This is the first part of a series introducing Bash programmers to Go. This part goes through the language building blocks that will be us...
  • Go katas
    I’ve been working in the DevOps (sysadmin) and cybersecurity domains. That means I work with computer programs all the time and I have to u...
  • Pod Scheduling in Kubernetes: Taints, Tolerations, and Node Affinity
    In Kubernetes, you can control where pods get scheduled by using two powerful mechanisms: Taints and Tolerations : These allow nodes to ...
  • Creating a Module::Build Distribution
    (Up-to-date source of this post.) Creating a Module::Build Distribution We show here how to create a Perl distribution using Module::Bu...

Pageviews last 30 days

Powered by Blogger.