Linux

What is LXC (Linux Containers)?

LXC: features, pros, and cons of Linux Containers

Container technology has shaken up classic application virtualization. It promises more flexibility, higher scalability and an overall carefree package with regard to user friendliness. However, before you decide to use Linux Containers (LXC), you should become more familiar with its features, pros, and cons, different uses as well as the defined limits of this technology.

Introduction to cURL in Linux

cURL in Linux: what you need to know to get started

The cURL command is one of the most important tools in web development. It enables developers to directly interact with websites using the command line. This can be used to test and debug APIs and servers, and to automate frequently performed tasks. We reveal what you need to know to get started with cURL in Linux and provide practical examples.

A comparison of different servers

Web hosting: servers by comparison

Carry out a server comparison and you will notice that website operators have a large selection to choose from. Professional hosts offer virtual, dedicated, and cloud based servers in different performance levels. How do these server models differ from one another? What features does a root server have in comparison to a managed server? Which type of hosting is best for your web project? Take a...

Unix: a history

Unix: the operating system setting new standards

In the context of open source operating systems, the term “unixoid” is often used, indicating that the software is similar to the Unix system published in 1969. Typical indicators are, for example, the file system, or means and rights available to access the system and its processes. But what exactly is Unix, and who is behind the development of this influential operating system?

The best browsers for Windows and Mac

The search for the best browser

Google Chrome, Mozilla Firefox, Apple Safari, Opera, or good old Microsoft Edge? The debate about which web browser is number one has been going on for years in online communities. But what is a browser exactly? And is there one that can trump the competition and be touted as the best browser?

Introduction to netstat

What is netstat?

Various computer networks are connected with one another via the internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. Netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access attempts.

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

Berkeley Packet Filter Explained

BPF – What is the Berkeley Packet Filter?

The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognizing incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.

MBR vs GPT

MBR or GPT: a comparison

Partitions help you to manage disk space more efficiently. For example, by splitting up the available disk space into smaller sections, you can easily separate system files from application files and personal data. However, if you want to create a partition, you will have to decide whether to use MBR or GPT. So how does each of these partitioning styles work? And what’s the difference between...

Allocating directory rights with chmod

What is chmod?

With Linux, access rights for directories and files are often set through the terminal where file owners can be defined and groups can be assigned. With the ‘chmod’ command, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year