Featured

Featured Post will be Shown in Home Page.

Centmin Mod – A Shell Script To Automatically Deploy LEMP Stack...

About LEMP Stack LEMP is a combination of the operating system and open-source software stack. LEMP is acronym of Linux, Nginx(engine-x) HTTP Server, MySQL/MariaDB database,...

Some Basic Linux Commands I Have Used During My Linux Journey...

As you read my tutorials on linux commands I am very sure you feel more confident with yourself while you see a console. I...

Getting Started With Kolab Groupware Solution

In our previous tutorial, we have discussed about what is Kolab groupware solution and how to install it on Ubuntu, and also, we have...

How To Find IP Conflicts In Linux

You all know what IP addresses are, right? How they are assigned to devices on a network to represent them. They are assigned by...

Some Basic Linux Commands I Have Used During My Linux Journey...

As you keep working on linux you get better and better on the command line. it comes a point where you say to yourself:...

Monitoring Your Drupal Website Using Centreon

Introduction Centreon is an Open Source software package that lets you supervise all the infrastructure and applications comprising your information system. CES Standard is the Open...

How to enable or disable repositories in CentOS

I am sure most of you use many YUM repositories to install software on any RPM based distributions like RHEL, CentOS, Fedora etc. Sometimes,...

How to Install and Configure SQUID Proxy server in RHEL/CENTOS

SQUID Proxy Server A proxy server is a device that usually sits between a client and the destination the user is trying to reach. It...

Install Plank on Linux Mint, Ubuntu and Fedora

A brief Introduction to Plank dock Most of  the Linux distro does not come with Dock application as default, Linux enables a user to customize...

How to generate and check strong passwords in Linux

Introduction Different operations require different security layers. Accessing your email account, your social media, your bank account, and a remote server that you administer through...

Setting Up and Running A Container Registry On Linux

Docker container images are delivered and stored by an application called Docker Registry. Registries consolidate container images and speed up developer build times. Virtualization...

Ways to Enhance the Security of Your Linux Server

Security has always been the cornerstone of any Linux software. Since Linux is open-source software, people can audit code to find and patch any...

Cybersecurity And Its Importance For Businesses

It seems that more of our lives are starting to take place online. We use the internet for business, shopping, entertainment, socializing, and so...

What Are the Best Programming Languages for Linux Devs?

If you are on the path to becoming a Linux developer, surely you will understand that computer science and programming are a core part...

How To Install KDE neon: Fast and Easy

First announced by Kubuntu founder Jonathan Riddell in June 2016, KDE neon marked it’s traditional biennial update that follows every new Ubuntu LTS release...

All You Should Know About Linux Hosting

It is a vital question for every blog owner of what web hosting to prefer. There are two main competitors for customers' attention Linux...

How To Use ldd Command in Linux with Examples

If you're using a Linux machine, you will be dealing with executable files constantly – be it on the GUI or on your terminal....

Hard, soft links, user and group management for RHCSA

A brief introduction to RHCSA tutorial Welcome back, this is the fifth tutorial of RHCSA examination preparation tutorial series, we have published four articles of...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
528SubscribersSubscribe

Latest Articles

Switching To Linux Mint

Switching To Linux Mint: The Benefits and Drawbacks

Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....
hands typing on a laptop

Bash Alias: How It Works and Why You Need One

The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases.  Aliases are...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business [2023]

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

What You Need to Become a Linux Programmer

Are you looking to become a Linux programmer? The open-source operating system is a popular choice among developers and is widely used in the...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...