Ken Hess

@kenhess

Author, Editor, Writer, Columnist, Blogger, Filmmaker, The Frugal Networker Tweets are my own.

Tulsa, Oklahoma
Vrijeme pridruživanja: svibanj 2008.

Tweetovi

Blokirali ste korisnika/cu @kenhess

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kenhess

  1. prije 13 sati

    What is an exit code? Bash command line exit codes demystified via by

    Poništi
  2. prije 13 sati

    Linux Access Control Lists, or ACLs, can take some getting used to, but they're invaluable for getting a finer-grained control of your Linux filesystem permissions. An introduction to Linux Access Control Lists (ACLs) via by

    Poništi
  3. prije 19 sati

    An introduction to Linux Access Control Lists (ACLs) via by

    Poništi
  4. 5. velj

    How to add a Yum repository via by

    Poništi
  5. 5. velj

    There are a few different ways to add a Yum repository to your system, depending on what you need from the repository. Let's look at three different options. How to add a Yum repository via by

    Poništi
  6. 4. velj

    Bash command line exit codes demystified via by

    Poništi
  7. 4. velj

    If you've ever wondered what an exit code is or why it's a 0, 1, 2, or even 255, you're in the right place. Bash command line exit codes demystified via by

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    Bash command line exit codes demystified via by

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    How to mirror a repository in Linux by | via

    Poništi
  10. 4. velj

    Meet this set of utilities that help you quickly move through your filesystem. Terminal velocity: Moving fast in your shell via by

    Poništi
  11. 3. velj

    How to mirror a repository in Linux via by

    Poništi
  12. 31. sij

    Join the community. Become a writer contributor. Get into the Level 3 Club. Become a sudoer. Check out the 5 ways to join our growing community of system administrators via by

    Poništi
  13. 31. sij

    If you're looking for a quick and easy way to secure your Linux systems, check this out: Sysadmin tools: How to use iptables via by

    Poništi
  14. 31. sij

    The job isn't done once your router problem is solved. Here is how to properly handle the post-mortem. Router problem wrap-up via by

    Poništi
  15. 30. sij

    Want to join an active community of Linux admins like yourself? Get involved. Write some articles. See your name in print. Be a technical author. Help other sysadmins.

    Poništi
  16. 30. sij

    How to run Podman on Windows with WSL2 via by

    Poništi
  17. 30. sij

    We're not Gallup, but we're taking a poll. What's your biggest sysadmin pet peeve? via by

    Poništi
  18. 30. sij

    Exploring simple Linux containers with lxc via

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Common Linux email problems and how to fix them

    Poništi
  20. 29. sij

    Shibby hip hop video coming soon featuring 39 Cent (aka Ken Hess).

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·