Latest Articles

Switching To Linux Mint: The Benefits and Drawbacks

Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....

Bash Alias: How It Works and Why You Need One

The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases.  Aliases are...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business...

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

What You Need to Become a Linux Programmer

Are you looking to become a Linux programmer? The open-source operating system is a popular choice among developers and is widely used in the...

The Dawn of Artificial Intelligence: The Many Benefits of AI for...

It goes without saying that running a small business can be an overwhelming endeavor for even the most experienced company owners. In addition, small...

How Does Linux Protect Its Users’ Privacy Online?

Internet users are more aware than ever before about the value of their data and how many companies want to collect and use it....

Using Pmap to Report Memory Map of a Process (With Examples)

Taking measure of a process's RAM usage on Windows has always been straightforward.  You launch the Task Manager and browse through the processes to find...

How To Check An MD5 Checksum on Linux (Fast And Easy)

A checksum value is a short data block derived from a larger one. MD5 (Message Digest 5) checksum values are used to verify the...

Ways to Enhance the Security of Your Linux Server

Security has always been the cornerstone of any Linux software. Since Linux is open-source software, people can audit code to find and patch any...

Security

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business...

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

Interviews

Learn file management commnad line required for RHCSA

3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation...

Counter Strike Global Offensive Confirmed For Linux

Gabe Newell, co-founder of Valve gave an interview and confirmed the Counter Strike Global Offensive...

Interview With Sancho Lerena From Pandora FMS

Hello Unixmen readers, today we have a special guest here at our desk! Ladies and...

Knockd – Detailed And Simpler

As I could see there are lot of articles about knockd and it’s implementation. So,...

Exclusive Interview with Illumos Founder Garrett D’Amore

During the week, Unixmen exclusively interviewed Illumos Founder, Garrett D'Amore. Garrett has worked for the...

Introduction to LanyFS

Back in July 2012, I had the privilege of talking with Dan Luedtke. He was...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
528SubscribersSubscribe

Latest Articles

Switching To Linux Mint

Switching To Linux Mint: The Benefits and Drawbacks

Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....
hands typing on a laptop

Bash Alias: How It Works and Why You Need One

The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases.  Aliases are...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business [2023]

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

What You Need to Become a Linux Programmer

Are you looking to become a Linux programmer? The open-source operating system is a popular choice among developers and is widely used in the...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...