Advanced Search
Search Results
137 total results found
Basic installation
This chapter provides an overview of how to install Ubuntu Server Edition. You can also refer to this guide on how to operate the installer for more information on using the installer, and to this screen-by-screen reference guide for more information about eac...
How to operate the Server installer
How to operate the Server installer This document explains how to use the installer in general terms. For a step-by-step guide through the screens of the installer, you can use our screen-by-screen reference guide. Get the installer Installer images are mad...
Screen-by-screen installer guide
The installer is designed to be easy to use without the need to refer to documentation. However, this reference guide provides more information for each of the screens of the installer. Language selection This screen selects the language for the installer ...
Configuring storage in the Server installer
Guided options Selecting “Use an entire disk” on the Guided storage configuration screen will install Ubuntu onto the selected disk, replacing any partitions or data already there. You can choose whether or not to set up LVM, and if you do, whether or not ...
How to Fix “The Set of Folders Cannot Be Opened” Error in Outlook
⇒ Important Note: Back up your Outlook data before pursuing the solutions below. Launch Outlook in Safe Mode Press the Windows and R keys to launch a new Run window. Then type Outlook.exe /safe, and hit OK. If the issue is gone in Safe Mode, ...
Unlock Microsoft Office File
A potentially dangerous macro has been blocked Macros can add a lot of functionality to Office, but they are often used by people with bad intentions to distribute malware to unsuspecting victims. Macros aren't required for everyday use like reading or ed...
Clear Web Browser's Cache
Before you begin Clearing your web browser's cache, cookies, and history may remove data such as the following: Saved passwords Address bar predictions Shopping cart contents, etc. While you should clear your web browser's cache, cookies, and history ...
T-RMM-PFSense-HAProxy-config
Assumes fully configured public DNS or DDNS, and a functional PFSense installation with existing valid wildcard SSL certificate available. Adjust hostnames, IPs, etc to suit the environment. Do NOT disable nginx proxy on the T-RMM instance. This assumes...
Networking
XCP-ng is using Open vSwitch as its core, and supports various features from it. Tip :Even if one NIC can be enough for your host, having a dedicated NIC for storage will be really important to get consistent performances (especially if you use shared storage...
Welcome to authentik
What is authentik? authentik is an open-source Identity Provider, focused on flexibility and versatility. With authentik, site administrators, application developers, and security engineers a dependable and secure solution for authentication in almost any ty...
Docker Compose installation
This installation method is for test-setups and small-scale production setups. Requirements A host with at least 2 CPU cores and 2 GB of RAM Docker Docker Compose Preparation To download the latest docker-compose.yml open your terminal and navig...
Configuration
These are all the configuration options you can set via environment variables. Append any of the following keys to your .env file, and run docker-compose up -d to apply them. InfoThe double-underscores are intentional, as all these settings are translated to...
Accessing pfSense: SSH, Web Interface, and Serial Console
In this tutorial, we'll guide you through three methods of accessing your pfSense firewall: SSH, the web interface, and the serial console. We'll be using MobaXterm, a versatile remote computing tool, to simplify the process. 1. Accessing pfSense via SSH...
How to add user in Ubuntu Lniux
At some point in your Ubuntu Linux server or desktop administration journey, you will need to create a user.Usually, we create users in the servers for administration on more than one person or a service account thatneeds to be created in order for the servi...
How to identify plugged-in SFP module model, manufacturer, and hardware details
Summary: Identify or verifying SFP/SFP+ transceiver hardware details for hypervisor cli, such as; vendor, model, product code, transceiver type, cable length, and more without physically disconnecting it for visual inspection. Versions affected: ALL Hyper-V...
Install Docker Engine on Ubuntu
To get started with Docker Engine on Ubuntu, make sure you meet the prerequisites, and then follow the installation steps. Prerequisites Note If you use ufw or firewalld to manage firewall settings, be aware that when you expose container ports using D...
Rancher-SAML-ADFS (Authentik)
What is Rancher An enterprise platform for managing Kubernetes Everywhere Rancher is a platform built to address the needs of the DevOps teams deploying applications with Kubernetes, and the IT staff responsible for delivering an enterprise-critical servic...
How to create and manage Docker networks
Docker allows you to create specific networks and attach containers to them. Here's how to make use of this highly flexible feature. Docker is one of the most flexible and user-friendly container systems on the market. Once up to speed on the platform...
Deploy Docker Containers on the Cloud
Objective: In this Article we want you to be able to deploy secure apps with containers in the cloud space. This deployment is useful for deploying apps or services without the need of a separate Firewall on prem or the cloud to secure and encrypt the c...
Shared responsibility in the cloud
In this article Division of responsibility Cloud security advantages Next step As you consider and evaluate public cloud services, it's critical to understand the shared responsibility model and which security tasks the cloud provider handles and w...