Latest Articles

How To Use Chown Command in Linux: Examples and Quick Tips

On Linux, every file has an owner and a group. They are given access rights accordingly.  With the chown command, you can change the owner...

How VPNs Improve Linux Security

Linux, like Windows, iOS, and macOS, is an operating system. Android runs on the Linux operating system. The operating system, in its most basic...

How To List All Running Services Under Systemctl

Like most operating systems, Linux distros also continuously run processes (both individual processes and groups of them) in the background. The term for these...

How To Use NGINX Proxy Manager: A Beginner’s Guide

NGINX is an open-source web server software with reverse proxy functionalities that allow you to redirect traffic to another server. It boasts great features...

How To Use The xxd Hex Dumper Utility In Linux

On most Unix-like operating systems, the xxd command helps users read a file as its hexadecimal values. The ASCII representation of the files is...

How To Install KDE neon: Fast and Easy

First announced by Kubuntu founder Jonathan Riddell in June 2016, KDE neon marked it’s traditional biennial update that follows every new Ubuntu LTS release...

A List of NTFS for Mac Software: What It Is and...

New Technology File System (abbreviated to NTFS) is a widely used file system on Windows. By default, you have direct read-write access to NTFS-formatted...

Small Business Cybersecurity: Tips for Choose the Best Antivirus Software for...

Today, many small businesses use Linux based systems, which are easy to use and less vulnerable to security concerns.While Linux systems are secure, due...

How Linux Users Can Protect Their Business

If your business uses Linux as an operating system, it is important that you know the best ways to protect your operations. Cybercrime is...

Tools for Linux Users to Not Miss Out On

Linux is the least popular “mainstream” operating system. Unlike its main competitors, Linux is free and open source, which is perfect for various circumstances....

Security

A List of NTFS for Mac Software: What It Is and...

New Technology File System (abbreviated to NTFS) is a widely used file system on Windows. By default, you have direct read-write access to NTFS-formatted...

Small Business Cybersecurity: Tips for Choose the Best Antivirus Software for...

Today, many small businesses use Linux based systems, which are easy to use and less vulnerable to security concerns.While Linux systems are secure, due...

Interviews

Learn file management commnad line required for RHCSA

3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation...

Counter Strike Global Offensive Confirmed For Linux

Gabe Newell, co-founder of Valve gave an interview and confirmed the Counter Strike Global Offensive...

Interview With Sancho Lerena From Pandora FMS

Hello Unixmen readers, today we have a special guest here at our desk! Ladies and...

Knockd – Detailed And Simpler

As I could see there are lot of articles about knockd and it’s implementation. So,...

Exclusive Interview with Illumos Founder Garrett D’Amore

During the week, Unixmen exclusively interviewed Illumos Founder, Garrett D'Amore. Garrett has worked for the...

Introduction to LanyFS

Back in July 2012, I had the privilege of talking with Dan Luedtke. He was...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
522SubscribersSubscribe

Latest Articles

Chown Command in Linux

How To Use Chown Command in Linux: Examples and Quick Tips

On Linux, every file has an owner and a group. They are given access rights accordingly.  With the chown command, you can change the owner...

How VPNs Improve Linux Security

Linux, like Windows, iOS, and macOS, is an operating system. Android runs on the Linux operating system. The operating system, in its most basic...
codes, List All Running Services Under Systemctl

How To List All Running Services Under Systemctl

Like most operating systems, Linux distros also continuously run processes (both individual processes and groups of them) in the background. The term for these...
NGINX Proxy Manager

How To Use NGINX Proxy Manager: A Beginner’s Guide

NGINX is an open-source web server software with reverse proxy functionalities that allow you to redirect traffic to another server. It boasts great features...
xxd Hex Dumper commands

How To Use The xxd Hex Dumper Utility In Linux

On most Unix-like operating systems, the xxd command helps users read a file as its hexadecimal values. The ASCII representation of the files is...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...