Home Tags System

Tag: system

The Story Behind the Development of the UNIX Operating System

This article relates the story behind the development of the UNIX operating system — how it became the world’s most popular OS, the visionaries...

Top 10 android Smartphones & Tablets of 2018

The mobile technology has been expanding its outreach for years. The trends provide us with a great variety from great features in small budgets to...
Advertisement

Serverless: Best Practices for Architecting a Serverless System

Serverless architecture is becoming an exciting option for many cloud architectects considering its specific benefits. Also known as function-as-a-service, serverless architecture is enabling developers...

How To Secure Your Operating System

Hackers are smart. The more you secure your operating system, the less likely someone else may attempt to gain access to information that they...

SSHFS: A Simple System for Working with Remote Directories

In Linux, SSHFS or the SSH File System is used to mount and interact with directories and files that are located on a remote...

Getting a Better Understanding of the System Log Architecture

System logs greatly aid sysadmins in keeping the system running like a well-oiled machine. Since an ounce of prevention is better than a pound...
Advertisement

Enjoy Better Flexibility in Granting File System Permissions with Access Control...

ACLs provide additional and more flexible permissions for file systems. They give better control over who can read, write and execute a file or...

Open Source Productivity Tools that Run on Windows

Productivity tools are software programs that allow a computer user to do certain specific tasks quickly and efficiently. The productivity tools listed here are...

The DevOps Series Using Docker with Ansible

This article is the eighth in the DevOps series. This month, we shall learn to set up Docker in the host system and use...

Top 10 operating systems for ethical hackers and penetration testers

A hacker is a highly skilled computer operator who uses bugs and exploits to break into computer systems and networks. An ethical hacker, on...
Advertisement

Block title