Latest Articles
How to Develop a Reliable Startup Utilizing the Linux OS
It comes as no surprise that the Windows OS and the Microsoft environment are some of the most common infrastructures to be found within...
Switching To Linux Mint: The Benefits and Drawbacks
Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....
Bash Alias: How It Works and Why You Need One
The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases. Aliases are...
Best VPNs for Linux with and without GUI
The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...
How to hire a cyber security developer to protect your business...
In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...
What You Need to Become a Linux Programmer
Are you looking to become a Linux programmer? The open-source operating system is a popular choice among developers and is widely used in the...
The Dawn of Artificial Intelligence: The Many Benefits of AI for...
It goes without saying that running a small business can be an overwhelming endeavor for even the most experienced company owners. In addition, small...
How Does Linux Protect Its Users’ Privacy Online?
Internet users are more aware than ever before about the value of their data and how many companies want to collect and use it....
Using Pmap to Report Memory Map of a Process (With Examples)
Taking measure of a process's RAM usage on Windows has always been straightforward. You launch the Task Manager and browse through the processes to find...
How To Check An MD5 Checksum on Linux (Fast And Easy)
A checksum value is a short data block derived from a larger one. MD5 (Message Digest 5) checksum values are used to verify the...
Security
Best VPNs for Linux with and without GUI
The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...
Centos
Best VPNs for Linux with and without GUI
The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...
How to hire a cyber security developer to protect your business...
In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...
Interviews
Learn file management commnad line required for RHCSA
3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation...
Counter Strike Global Offensive Confirmed For Linux
Gabe Newell, co-founder of Valve gave an interview and confirmed the Counter Strike Global Offensive...
Interview With Sancho Lerena From Pandora FMS
Hello Unixmen readers, today we have a special guest here at our desk! Ladies and...
Knockd – Detailed And Simpler
As I could see there are lot of articles about knockd and it’s implementation. So,...
Exclusive Interview with Illumos Founder Garrett D’Amore
During the week, Unixmen exclusively interviewed Illumos Founder, Garrett D'Amore. Garrett has worked for the...
Introduction to LanyFS
Back in July 2012, I had the privilege of talking with Dan Luedtke. He was...