File manager for Android – the best alternatives to the standard app

Managing files and folder on Android devices can quickly become a tedious affair. One the one hand, the integrated file manager app (only since Android 6.0 “Marshmallow”) is well hidden in the settings of the operating system, and on the other hand, it only has the basic functions available – which is why many users rely on third-party applications from the Google Play Store. But what exactly sets...

Plesk file sharing: basics and tutorial

Plesk is undoubtedly one of the best solution for managing web and other server services. The server administration tool, which impresses with its intuitive interface, can also be used to save files on your own server and publish them to selected users. How exactly Plesk file sharing functions, and how you can set it up is explained in this guide.

Create a tar backup: How the archiving works

Regular backups are one of the most important factors of IT security. With Linux systems – which are often the backbone of a webserver – you can very efficiently create backup copies with the program tar. What can the archiving program do? We explain to you how tar functions and what its special features are. So that you’re able to create regular backups with tar in the future, we explain step by...

Image tools: A comparison of the best programs

Double is better, especially when it comes to data backups. Backups shouldn’t only contain important files like documents, tables, presentations, or videos. Generate a comprehensive storage image of your entire system with the help of image-based backup tools and completely restore it including configurations in the event of total failure. Find what makes a good image tool and which functions you...

Microsoft Access alternatives: are there any free applications that achieve the same result?

MS Access is widely used office software and enables people with no prior programming knowledge to work with databases. The license for the programme, however, is not exactly cheap. Several free alternatives to Microsoft Access promise to do essentially the same thing. But which are the best Microsoft Access alternatives? And can they actually keep up with the range of functions and standard of...

How log file analysis works with GoAccess

The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analysing these extensive text files is nigh on impossible, you can use log file analysis programs such as...

Telnet: a client-server protocol for cross-platform remote connections

Remote access to remote computer systems has always been a part of well-organised networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.

Linux editor with a vast range of functions – Vim

In order to edit text files or receive source codes from software or websites, you require a text editor. Whether you’re using Linux, Windows, or Mac: the majority of operating systems these days already have them installed by default. There are also editors like Vim, which have a wider range of functions and simplify working with the confusing lines of code.

Manage simple system processes with htop

Process managers can give experienced computer users and administrators an accurate overview of which programs and services are taking up the system’s capacity. Classic command-line tools are confusing, and can only be controlled with complicated commands. For Unix-like systems, such as Ubuntu, the task manager htop, with its text interface, is a first-class alternative. It can help inexperienced...

iptables tutorial: how to configure the filter tables of Linux kernels

Since the first version, Linux kernel has been implementing packet filter modules, with which filter tables can be created. However, additional programs such as iptables are required to configure the rule set. In our tutorial, we present the free software for the Linux kernel 2.4 and 2.6 and give you a little insight into how it all works.