Latest Articles
Essential Cybersecurity Tools for Linux in 2023
In today's digital happenings, taking serious cybersecurity measures is crucial to protect sensitive information from cybercriminals, especially for corporate organizations with high levels of...
A guide to app redesign: Making it evolve!
If you want your app to be a long-standing one, you should adapt it to the environment. Times change, and user tastes are changing...
Data Security and Privacy in Cloud Migration
Cloud-based computing has revolutionized the way businesses operate. It provides secure data storage as well as cost-efficient access to vast amounts of information. There...
Why Open Source Operating Systems Are Utilised by Hackers the Most?
The popularity of open source operating systems (OS) is evident in various tech circles. However, it’s intriguing to note how they particularly resonate with...
Linux OS and VPN: An Unbeatable Combination
Most Linux OS users, especially beginners, often wonder if they need a VPN on Linux. The answer depends on how and where you use...
5 Reasons to Switch to Remote Work of DevOps Engineers
Do you work in an office, but you would like to work from anywhere? This is quite real.If you are truly a professional in...
Synergizing Compliance and Computing: Pharmaceutical Accounting Software on the Linux Platform
You've probably heard the term "compliance," but what does it mean? Compliance is the act of being in accordance with a law or regulation....
What does a job as a remote Linux administrator entail: how...
Remote Linux Administrator Jobs: Balancing Flexibility and Technical Excellence
Information technology professionals can choose any field they like. In particular, the profession of remote Linux...
3 Reasons Why Linux is the Best Choice to Achieve Optimal...
With technological advancements, hackers are becoming increasingly adept at identifying vulnerabilities and gaps in security systems. This makes unauthorized access to secure data and...
How To Create Groups in Linux: A Step-by-Step Guide
Linux makes it easy to give users varied access levels and assign them specific responsibilities. All you have to do is create groups specifying...
Security
Essential Cybersecurity Tools for Linux in 2023
In today's digital happenings, taking serious cybersecurity measures is crucial to protect sensitive information from cybercriminals, especially for corporate organizations with high levels of...
Centos
Advantages and Disadvantages of CentOS Stream
The Linux community unanimously ridiculed Red Hat for shifting its CentOS distro to a rolling release distribution model in 2021. It was initially distributed in...
Best VPNs for Linux with and without GUI
The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...
Interviews
Learn file management commnad line required for RHCSA
3.0 Introduction to Red Hat Linux Key file system
Welcome back, in this ‘RHCSA examination preparation...
Counter Strike Global Offensive Confirmed For Linux
Gabe Newell, co-founder of Valve gave an interview and confirmed the Counter Strike Global Offensive...
Interview With Sancho Lerena From Pandora FMS
Hello Unixmen readers, today we have a special guest here at our desk! Ladies and...
Knockd – Detailed And Simpler
As I could see there are lot of articles about knockd and it’s implementation. So,...
Exclusive Interview with Illumos Founder Garrett D’Amore
During the week, Unixmen exclusively interviewed Illumos Founder, Garrett D'Amore. Garrett has worked for the...
Introduction to LanyFS
Back in July 2012, I had the privilege of talking with Dan Luedtke. He was...