In the context of open source operating systems, the term “unixoid” is often used, indicating that the software is similar to the Unix system published in 1969. Typical indicators are, for example, the file system, or means and rights available to access the system and its processes. But what exactly is Unix, and who is behind the development of this influential operating system?
Google Chrome, Mozilla Firefox, Apple Safari, Opera, or good old Internet Explorer? The debate about which web browser is number one has been going on for years among the internet community. But what is a browser exactly? And is there one in particular that can trump the competition and truly be the best browser?
Various computer networks are connected with one another via the internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. Netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access attempts.
If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.
The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognising incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.
Partitions help you to manage disk space more efficiently. For example, by splitting up the available disk space into smaller sections, you can easily separate system files from application files and personal data. However, if you want to create a partition, you will have to decide whether to use MBR or GPT. So how does each of these partitioning styles work? And what’s the difference between...
With Linux, access rights for directories and files are often set through the terminal where file owners can be defined and groups can be assigned. With the ‘chmod’ command, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.
A central program on every operating system is the file manager. Whether on Windows, Linux, or macOS – in order to perform file and directory operations conveniently and efficiently, you should rely on a file manager that meets all your requirements. The pre-installed programs like Windows Explorer, Apple’s Finder, or Nautilus on Ubuntu, on the other hand, come with a greatly reduced range of...
Bare metal – the latest product on the web hosting market evokes power from its name alone, and not for nothing: servers with this nickname focus on high-performance hardware. With a bare metal server, the user's access extends practically down to the bare metal. Software components based on this product are subject to user control and can be installed and configured according to individual...
Network administrators are often faced with the challenge of coordinating different operating systems such as Windows or Linux. But with the use of a Samba server, sharing services in a network environment is a piece of cake.