Skip to content
gkaelin.com gkaelin.com
  • Welcome
  • Linux/UNIX
  • Server
  • Web
  • Windows
  • Tools
    • Password generator
    • PHP Password hash online
    • QR Code Generator
  • Welcome
  • Linux/UNIX
  • Server
  • Web
  • Windows
  • Tools
    • Password generator
    • PHP Password hash online
    • QR Code Generator
  • BlueSky
  • X
Home» Computing» Server» Page 3
Best practices for backup and restore strategies
Posted in Server Computing

Best practices for backup and restore strategies

We all know (at least I hope so), backups are important, especially in these cases: Loss of data following a hardware failure Disk encryption Loss of...
Read More
Are Commercial VPNs Really Useful?
Posted in Computer Science Web Server

Are Commercial VPNs Really Useful?

You've probably come across advertisements or commercial collaborations promoting VPNs promising secure browsing and preventing tracking. Let's take a look...
Read More
Best practices for protecting your infrastructure from cyber attacks
Posted in Linux/UNIX Server Computing

Best practices for protecting your infrastructure from cyber attacks

As you know, cyberattacks are part of our daily lives as sysadmins and developers. Just look at the latest news stories; they're becoming more and more...
Read More
Unlock VMs in Proxmox
Posted in Linux/UNIX Server Computing

Unlock VMs in Proxmox

Proxmox is a very good KVM-based virtualization system, but sometimes small problems arise. I had a case where a backup crashed during…
Read More
Prestashop - Fix the blank page issue
Posted in Computer Science Web Server

Prestashop - Fix the blank page issue

A few days ago, I performed a web server migration, moving the sites I manage from Apache to Nginx. When a Prestashop store was moved, I…
Read More

Pagination of publications

Previous page 1 2 3 4 Next page

Latest articles

  • OpenVPN vs WireGuard: What are the differences?
  • Linux Folder Tree
  • The difference between a virus and malware
  • Effectively diagnose and troubleshoot a printer
  • Best Practices for Publishing Android Apps
  • OpenVPN vs WireGuard: What are the differences?
  • Linux Folder Tree
  • The difference between a virus and malware
  • Effectively diagnose and troubleshoot a printer
  • Best Practices for Publishing Android Apps
Post You Might Like
Posted in Uncategorized
OpenVPN vs WireGuard: What are the differences?
Posted by By Gilles Kaelin 12 septembre 2025
Posted in Informatique Linux/UNIX
Linux Folder Tree
Posted by By Gilles Kaelin 10 septembre 2025
Posted in Linux/UNIX Server Computing
The difference between a virus and malware
Posted by By Gilles Kaelin 8 septembre 2025
Posted in Android Computers Linux/UNIX
Effectively diagnose and troubleshoot a printer
Posted by By Gilles Kaelin 3 septembre 2025
Language
  • Français
  • English
Copyright 2025 — gkaelin.com. All rights reserved. Bloglo WordPress Theme
Scroll to Top
English
Translation
  • Français
  • English

× Close
Manage consent
To provide the best experiences, we use technologies such as cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Failure to consent or withdrawing consent may adversely affect certain features and functions.
Functional Always on
Technical access or storage is strictly necessary for the legitimate interest purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
Technical access or storage is necessary for the legitimate interest purpose of storing preferences that are not requested by the subscriber or Internet user.
Statistics
Technical storage or access that is used exclusively for statistical purposes. Technical storage or access that is used exclusively for anonymous statistical purposes. Absent a subpoena, voluntary compliance from your internet service provider, or additional records from a third party, information stored or retrieved for this sole purpose generally cannot be used to identify you.
Marketing
Technical access or storage is necessary to create user profiles in order to send advertisements, or to track the user across a website or across websites with similar marketing purposes.
Manage options Manage services Manage {vendor_count} suppliers Learn more about these purposes
View preferences
{title} {title} {title}