Reviews

Onda V80 SE Tablet Review

Before you get up in arms about how Unixmen is about Linux and open source, let me just say that these product reviews will...

Ansible Review: How to easily automate your IT infrastructure

Introduction Ansible is an IT automation tool, which helps in cloud provisioning, configuration management and application deployment. Developers designed Ansible with multi-tier systems in mind, trying...

DSTAT: Versatile resource statistics tool

Introduction Whether a system is used as a web server or a normal PC, in a daily workflow, to keep under control its usage of...

Installation and Review of Fedora 24

Fedora 24 was released on June 21, 2016.We have already covered an article, which you may like to go through Fedora 24 released – See...

Top 10 Linux Distributions of 2016

With the rise of the Linux era, there are lots of Linux distributions are out there serving different different requirements and purposes. Every Linux...

Review: Ubuntu 16.04 LTS (Xenial Xerus)

Introduction Here we are again staring down the face of a new release of Ubuntu. This time around we see the release of the new...

The top web security threats

It is very unfortunate that websites are prone to attacks that could damage them completely. These attacks are what we refer to as security...

Journey To Ubuntu Phone Planet

These days iOS and Android rule the world of transportable devices OS, but is there anything to match with them? is there any OS...

Kali Linux Review

Good news! There’s new release of the Kali Linux which is a reincarnation of the BackTrack. If you work in forensic analysis, network security,...

Review: OpenSUSE 42.1 Leap

Before we proceed to look at OpenSUSE 42.1 Leap, it's important we understand what it is. The current OpenSUSE version is 13.2 and the current...

Richard Matthew Stallman – The Father Of Free Software Foundation

What is programming for you? Is it a job, hobby or maybe source of income? For him, programming is a life’s philosophy: “Free as...

What is Disaster Recovery?

Disaster Recovery can be defined as set of procedures and policies that enable the continuation or recovery of vital technology systems and infrastructure following...

The Brief History Of Aix, HP-UX, Solaris, BSD, And LINUX

Always remember that when doors close on you, other doors open. Ken Thompson and Dennis Richie are a great example for such saying. They...

Most Popular Programming Languages In The IT industry

Programmers are always in high demand these days for jobs, especially if they have fluency in coding language. Learning programming in various languages for...

Debian 8, Codenamed ‘Jessie’, Review

We've spoke previously about how much respect Debian has around the Linux paddocks. With the release of Debian 8.0 (Jessie), let's take a look...

Firefox Hello – Make Free Audio/Video Calls Directly From Mozilla Firefox

Firefox Hello Today, we are going to discuss an off topic, but interesting one, which is not related to Linux/Unix. Mostly, We use Skype or...

Why I can’t live without Linux

This is written targeting users who might want to try Linux. But also with some facts that Linux users should be aware and feel...

Vertu TI: A Titanium Open Source Phone

Vertu TI is a handmade phone crafted by single man in England and it is engineered to perfection. It has over ten years in...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
528SubscribersSubscribe

Latest Articles

How to Develop a Reliable Startup Utilizing the Linux OS

It comes as no surprise that the Windows OS and the Microsoft environment are some of the most common infrastructures to be found within...
Switching To Linux Mint

Switching To Linux Mint: The Benefits and Drawbacks

Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....
hands typing on a laptop

Bash Alias: How It Works and Why You Need One

The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases.  Aliases are...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business [2023]

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...