michael@slashetc:~$

  • 7 CI/CD Tools for Sysadmins

    Continuous integration, continuous delivery, and continuous deployment (CI/CD) have all existed in the developer community for many years. Some organizations have involved their operations counterparts, but many haven’t. For most organizations, it’s imperative for their operations teams to become just as familiar with CI/CD tools and practices as their development...

  • Using the SSH Config File

    If you are regularly connecting to multiple remote systems over SSH on a daily basis, you’ll find that remembering all of the remote IP addresses, different usernames, non standard ports and various command line options is difficult, if not impossible. Article Source here.

  • Tiger – The Unix Security Audit and Intrusion Detection Tool

    Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs…\ \ [[ This is a content summary only. Visit my website for full links, other content,...