Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

137 total results found

Basic installation

Ubuntu Server documentation Tutorials

This chapter provides an overview of how to install Ubuntu Server Edition. You can also refer to this guide on how to operate the installer for more information on using the installer, and to this screen-by-screen reference guide for more information about eac...

How to operate the Server installer

Ubuntu Server documentation Tutorials

How to operate the Server installer This document explains how to use the installer in general terms. For a step-by-step guide through the screens of the installer, you can use our screen-by-screen reference guide. Get the installer Installer images are mad...

Screen-by-screen installer guide

Ubuntu Server documentation Tutorials

The installer is designed to be easy to use without the need to refer to documentation. However, this reference guide provides more information for each of the screens of the installer. Language selection This screen selects the language for the installer ...

Configuring storage in the Server installer

Ubuntu Server documentation Tutorials

Guided options Selecting “Use an entire disk” on the Guided storage configuration screen will install Ubuntu onto the selected disk, replacing any partitions or data already there. You can choose whether or not to set up LVM, and if you do, whether or not ...

How to Fix “The Set of Folders Cannot Be Opened” Error in Outlook

Mirosoft Office Outlook

   ⇒ Important Note: Back up your Outlook data before pursuing the solutions below.  Launch Outlook in Safe Mode  Press the Windows and R keys to launch a new Run window. Then type Outlook.exe /safe, and hit OK.  If the issue is gone in Safe Mode, ...

Outlook
outlook
Microsfot
microsoft
fix outlook
fix outlook

Unlock Microsoft Office File

Mirosoft Office Office

  A potentially dangerous macro has been blocked Macros can add a lot of functionality to Office, but they are often used by people with bad intentions to distribute malware to unsuspecting victims. Macros aren't required for everyday use like reading or ed...

Clear Web Browser's Cache

Windows Maintenance Browsers

Before you begin Clearing your web browser's cache, cookies, and history may remove data such as the following: Saved passwords Address bar predictions Shopping cart contents, etc. While you should clear your web browser's cache, cookies, and history ...

T-RMM-PFSense-HAProxy-config

pfSense Firewall HaProxy

Assumes fully configured public DNS or DDNS, and a functional PFSense installation with existing valid wildcard SSL certificate available. Adjust hostnames, IPs, etc to suit the environment. Do NOT disable nginx proxy on the T-RMM instance. This assumes...

Networking

XCP-NG Networking

XCP-ng is using Open vSwitch as its core, and supports various features from it. Tip :Even if one NIC can be enough for your host, having a dedicated NIC for storage will be really important to get consistent performances (especially if you use shared storage...

xcp-ng network
xcp-ng network
XCP-NG
XCP-NG
XOA
XOA

Welcome to authentik

Single-Sign-On Authentik Docs

What is authentik?​ authentik is an open-source Identity Provider, focused on flexibility and versatility. With authentik, site administrators, application developers, and security engineers a dependable and secure solution for authentication in almost any ty...

Docker Compose installation

Single-Sign-On Authentik Docs

  This installation method is for test-setups and small-scale production setups. Requirements​ A host with at least 2 CPU cores and 2 GB of RAM Docker Docker Compose Preparation​ To download the latest docker-compose.yml open your terminal and navig...

Configuration

Single-Sign-On Authentik Docs

These are all the configuration options you can set via environment variables. Append any of the following keys to your .env file, and run docker-compose up -d to apply them. InfoThe double-underscores are intentional, as all these settings are translated to...

Accessing pfSense: SSH, Web Interface, and Serial Console

pfSense Firewall Basics

  In this tutorial, we'll guide you through three methods of accessing your pfSense firewall: SSH, the web interface, and the serial console. We'll be using MobaXterm, a versatile remote computing tool, to simplify the process. 1. Accessing pfSense via SSH...

How to add user in Ubuntu Lniux

Ubuntu Server documentation Basics

At some point in your Ubuntu Linux server or desktop administration journey, you will need to create a user.Usually, we create users in the servers for administration on more than one person or a service account thatneeds to be created in order for the servi...

How to identify plugged-in SFP module model, manufacturer, and hardware details

Intro on Hypervisors General Hypervisor How-To's

Summary: Identify or verifying SFP/SFP+ transceiver hardware details for hypervisor cli, such as; vendor, model, product code, transceiver type, cable length, and more without physically disconnecting it for visual inspection. Versions affected: ALL Hyper-V...

Linux
linux
Network
network
sfp
spf
spf+
sfp+
linux sfp
linux sfp

Install Docker Engine on Ubuntu

Ubuntu Server documentation Basics

To get started with Docker Engine on Ubuntu, make sure you meet the prerequisites, and then follow the installation steps. Prerequisites  Note If you use ufw or firewalld to manage firewall settings, be aware that when you expose container ports using D...

Rancher-SAML-ADFS (Authentik)

Single-Sign-On Tutorials

What is Rancher​ An enterprise platform for managing Kubernetes Everywhere Rancher is a platform built to address the needs of the DevOps teams deploying applications with Kubernetes, and the IT staff responsible for delivering an enterprise-critical servic...

How to create and manage Docker networks

Docker

  Docker allows you to create specific networks and attach containers to them. Here's how to make use of this highly flexible feature.   Docker is one of the most flexible and user-friendly container systems on the market. Once up to speed on the platform...

Deploy Docker Containers on the Cloud

Docker

Objective: In this Article we want you to be able to deploy secure apps with containers in the cloud space. This deployment is useful for deploying apps or services without the need of a separate Firewall on prem or the cloud to secure and encrypt the c...

Shared responsibility in the cloud

Azure

In this article Division of responsibility Cloud security advantages Next step As you consider and evaluate public cloud services, it's critical to understand the shared responsibility model and which security tasks the cloud provider handles and w...