Skip to content
gkaelin.com

gkaelin.com

  • Welcome
  • Linux/UNIX
  • Server
  • Web
  • Windows
  • Tools
    • Password generator
    • PHP Password hash online
    • QR Code Generator
  • Welcome
  • Linux/UNIX
  • Server
  • Web
  • Windows
  • Tools
    • Password generator
    • PHP Password hash online
    • QR Code Generator
  • BlueSky
  • X
Tip for putting WordPress behind a reverse proxy
Posted in Informatique Web

Tip for putting WordPress behind a reverse proxy

A while ago, I had fun putting this Wordpress site behind a reverse proxy (limiting the IPv4 address available on my infrastructure), and I had a few small...
Read More
Setting up statistics retrieval on remote servers, and displaying them in Grafana
Posted in Linux/UNIX Server

Setting up statistics retrieval on remote servers, and displaying them in Grafana

During a project, I needed to retrieve statistical data from a remote server and display it in a dashboard in my Grafana.…
Read More
Manually fix disk errors on boot on Debian
Posted in Linux/UNIX Server Computing

Manually fix disk errors on boot on Debian

One day, while I was running my updates, I had the pleasant surprise of discovering that the virtual machine hard disk was inconsistent, and that Debian could not…
Read More
Fix "Argument list too long" issue when deleting file
Posted in Linux/UNIX Server Computing

Fix "Argument list too long" issue when deleting file

When deleting multiple files at once on one of my servers, I encountered an issue. I received the error message Argument list too long...
Read More
Bridge WSL2 Network in Windows 11
Posted in Informatique Windows

Bridge WSL2 Network in Windows 11

By default, the network in WSL (Windows Sub-System for Linux) is "nat" behind your computer's IP. To bridge the network, it is necessary to make the following configurations. "Bridger…
Read More

Pagination of publications

Previous page 1 … 5 6 7

Latest articles

  • OpenVPN vs WireGuard: What are the differences?
  • Linux Folder Tree
  • The difference between a virus and malware
  • Effectively diagnose and troubleshoot a printer
  • Best Practices for Publishing Android Apps
  • OpenVPN vs WireGuard: What are the differences?
  • Linux Folder Tree
  • The difference between a virus and malware
  • Effectively diagnose and troubleshoot a printer
  • Best Practices for Publishing Android Apps
Post You Might Like
Posted in Uncategorized
OpenVPN vs WireGuard: What are the differences?
Posted by By Gilles Kaelin 12 septembre 2025
Posted in Informatique Linux/UNIX
Linux Folder Tree
Posted by By Gilles Kaelin 10 septembre 2025
Posted in Linux/UNIX Server Computing
The difference between a virus and malware
Posted by By Gilles Kaelin 8 septembre 2025
Posted in Android Computers Linux/UNIX
Effectively diagnose and troubleshoot a printer
Posted by By Gilles Kaelin 3 septembre 2025
Language
  • Français
  • English
Copyright 2025 — gkaelin.com. All rights reserved. Bloglo WordPress Theme
Scroll to Top
English
Translation
  • Français
  • English

× Close
Manage consent
To provide the best experiences, we use technologies such as cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Failure to consent or withdrawing consent may adversely affect certain features and functions.
Functional Always on
Technical access or storage is strictly necessary for the legitimate interest purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
Technical access or storage is necessary for the legitimate interest purpose of storing preferences that are not requested by the subscriber or Internet user.
Statistics
Technical storage or access that is used exclusively for statistical purposes. Technical storage or access that is used exclusively for anonymous statistical purposes. Absent a subpoena, voluntary compliance from your internet service provider, or additional records from a third party, information stored or retrieved for this sole purpose generally cannot be used to identify you.
Marketing
Technical access or storage is necessary to create user profiles in order to send advertisements, or to track the user across a website or across websites with similar marketing purposes.
Manage options Manage services Manage {vendor_count} suppliers Learn more about these purposes
View preferences
{title} {title} {title}