Skip to content
ITNotes ITNotes

From Terminal to Cloud

  • AI
  • DevOps
  • HomeLab
  • Linux
  • Networking
  • Programming
  • English
    • English
    • Tiếng Việt
    • 日本語
  • AI
  • DevOps
  • HomeLab
  • Linux
  • Networking
  • Programming
  • English
    • English
    • Tiếng Việt
    • 日本語
Home » Archives for admin » Page 2
About admin
Security tutorial - IT technology blog
Posted inSecurity

Identity-Based SSH: Why I Finally Closed Port 22 and Ditched Key Management

May 12, 2026
Is SSH key management slowing you down? Switch to identity-based authentication with Tailscale. Close Port 22, use your SSO for access, and simplify your server security in under 20 minutes.
Read More
Programming tutorial - IT technology blog
Posted inProgramming

NestJS Event Sourcing and CQRS: Lessons from a High-Stakes Production System

May 12, 2026
Learn how to build resilient, audit-proof systems using NestJS Event Sourcing and CQRS. Real-world insights on Sagas, Snapshots, and event versioning from 6 months in production.
Read More
AI tutorial - IT technology blog
Posted inAI

Deploying DeepSeek-R1 Locally: A Private, High-Performance ChatGPT Alternative

May 12, 2026
Secure your proprietary code and data by moving your AI workflow local. This guide shows you how to set up DeepSeek-R1 with Ollama and Open WebUI for a professional-grade, private AI experience.
Read More
Database tutorial - IT technology blog
Posted inDatabase

Deploying TiDB on Docker: Scaling HTAP with a Distributed NewSQL Database

May 12, 2026
Struggling with MySQL scaling or slow analytical queries? Learn how to deploy TiDB on Docker to leverage distributed NewSQL and HTAP capabilities, allowing you to handle transactions and real-time analytics in a single, MySQL-compatible database.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Stop Using Passwords: A Practical Guide to Implementing Passkeys (WebAuthn)

May 12, 2026
Ditch vulnerable passwords for good. This guide walks you through the technical steps and UX best practices for implementing phishing-resistant Passkeys in your web application.
Read More
DevOps tutorial - IT technology blog
Posted inDevOps

Mastering Argo Workflows: Scaling Batch Jobs and Data Pipelines on Kubernetes

May 12, 2026
Master Argo Workflows for Kubernetes. Learn to build resilient DAGs, manage artifacts, and implement production-ready batch jobs with specific code examples and optimization tips.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Hunting BOLA: How to Audit Your API Security with OWASP ZAP

May 12, 2026
BOLA is the top risk for modern APIs. Discover how to use OWASP ZAP to automate your security testing, find authorization bugs, and harden your code.
Read More
Linux tutorial - IT technology blog
Posted inLinux

Kernel Live Patching: Fix Linux Vulnerabilities Without the Reboot Nightmare

May 12, 2026
Reboots cause downtime and stress. Learn how to use ftrace and Canonical Livepatch to secure your Linux kernels in real-time without dropping a single connection.
Read More
Database tutorial - IT technology blog
Posted inDatabase

Beyond the Scaling Wall: Why I Switched to ScyllaDB for High-Velocity Data

May 12, 2026
Ditch the JVM pauses. Learn how ScyllaDB uses a C++ shard-per-core architecture to deliver microsecond latency for 2M+ ops/sec applications. Covers setup, CQL modeling, and performance traps.
Read More
Linux tutorial - IT technology blog
Posted inLinux

Secure Boot on Linux: How I Signed My Own Kernel to Kill Bootkits

May 12, 2026
A hands-on guide to configuring Secure Boot and signing custom Linux kernels using Machine Owner Keys (MOK) to block boot-level threats.
Read More

Posts pagination

Previous page 1 2 3 4 … 61 Next page
Copyright 2026 — ITNotes. All rights reserved.
Privacy Policy | Terms of Service | Contact: [email protected] DMCA.com Protection Status
Scroll to Top