Container technology has shaken up classic application virtualization. It promises more flexibility, higher scalability and an overall carefree package with regard to user friendliness. However, before you decide to use Linux Containers (LXC), you should become more familiar with its features, pros, and cons, different uses as well as the defined limits of this technology.
The cURL command is one of the most important tools in web development. It enables developers to directly interact with websites using the command line. This can be used to test and debug APIs and servers, and to automate frequently performed tasks. We reveal what you need to know to get started with cURL in Linux and provide practical examples.
Carry out a server comparison and you will notice that website operators have a large selection to choose from. Professional hosts offer virtual, dedicated, and cloud based servers in different performance levels. How do these server models differ from one another? What features does a root server have in comparison to a managed server? Which type of hosting is best for your web project? Take a...
In the context of open source operating systems, the term “unixoid” is often used, indicating that the software is similar to the Unix system published in 1969. Typical indicators are, for example, the file system, or means and rights available to access the system and its processes. But what exactly is Unix, and who is behind the development of this influential operating system?
Google Chrome, Mozilla Firefox, Apple Safari, Opera, or good old Microsoft Edge? The debate about which web browser is number one has been going on for years in online communities. But what is a browser exactly? And is there one that can trump the competition and be touted as the best browser?
Various computer networks are connected with one another via the internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. Netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access attempts.
If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.
The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognizing incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.
Partitions help you to manage disk space more efficiently. For example, by splitting up the available disk space into smaller sections, you can easily separate system files from application files and personal data. However, if you want to create a partition, you will have to decide whether to use MBR or GPT. So how does each of these partitioning styles work? And what’s the difference between...
With Linux, access rights for directories and files are often set through the terminal where file owners can be defined and groups can be assigned. With the ‘chmod’ command, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.