Jozef Reisinger's blog

Infrastructure, security, programming ...

2015-08-13

Quick Vagrant Guide

See here.

No comments:
Labels: sysadmin, virtualization
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Blog Archive

  • ►  2024 (8)
    • ►  12 (1)
    • ►  06 (1)
    • ►  03 (1)
    • ►  02 (3)
    • ►  01 (2)
  • ►  2023 (3)
    • ►  09 (2)
    • ►  01 (1)
  • ►  2022 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  06 (1)
    • ►  05 (1)
  • ►  2021 (4)
    • ►  12 (1)
    • ►  10 (1)
    • ►  02 (1)
    • ►  01 (1)
  • ►  2020 (1)
    • ►  03 (1)
  • ►  2019 (1)
    • ►  12 (1)
  • ►  2018 (2)
    • ►  09 (1)
    • ►  02 (1)
  • ►  2017 (1)
    • ►  07 (1)
  • ►  2016 (4)
    • ►  10 (1)
    • ►  09 (1)
    • ►  05 (2)
  • ▼  2015 (11)
    • ►  12 (3)
    • ►  11 (1)
    • ▼  08 (1)
      • Quick Vagrant Guide
    • ►  07 (1)
    • ►  06 (2)
    • ►  05 (2)
    • ►  01 (1)
  • ►  2014 (11)
    • ►  11 (1)
    • ►  10 (1)
    • ►  09 (1)
    • ►  07 (2)
    • ►  05 (1)
    • ►  04 (1)
    • ►  03 (1)
    • ►  02 (1)
    • ►  01 (2)
  • ►  2013 (1)
    • ►  12 (1)

Links

  • My homepage
  • Blog posts source

Search This Blog

Labels

audit (3) Bash (3) chatgpt (1) devops (11) Git (2) Go (9) kubernetes (1) Linux (11) management (2) networking (5) Perl (10) security (16) security-engineer (1) sysadmin (9) telco (2) virtualization (5)

Most viewed last 30 days

  • traceroute Explained
    (Up-to-date source of this post.) traceroute shows the route the packets have to take to get to a destination host. For example: $ tra...
  • Go katas
    I’ve been working in the DevOps (sysadmin) and cybersecurity domains. That means I work with computer programs all the time and I have to u...
  • Pod Scheduling in Kubernetes: Taints, Tolerations, and Node Affinity
    In Kubernetes, you can control where pods get scheduled by using two powerful mechanisms: Taints and Tolerations : These allow nodes to ...
  • Preventing git leaks
    I track most of my code and prose via git and I store it on GitHub in public repos. I do it because I get reliable storage for free that I ...
  • Let's have just fun
    Some engineers, both junior and senior, have random approach to work as opposed to a systematic one. By random (or freestyle) approach I mea...
  • Check an IP address
    Sometimes I come across an unknown IP address. This happens, for example, when I’m reviewing logs and I see that someone or (most probably) ...
  • Go for cybersecurity - tools
    After getting a basic idea of what TLS is in the previous post , let’s write a tool the will help us finding out the TLS version of a server...
  • The anomaly of cheap complexity
    How does one design an electric motor? Would you attach a bathtub to it, simply because one was available? Would a bouquet of flowers help?...
  • Shift cipher in Go with blocks
    In the previous post we implemented a shift cipher that accepts key of variable length. Now, the cryptographic algorithms can be classified ...
  • runp: run commands in parallel
    I’m using shell (bash specifically) on daily basis. From time to time a need arises to run multiple commands in parallel. For example my .b...

Pageviews last 30 days

Powered by Blogger.