Top Stories

Latest Posts

Top 5 Linux Shells That You Can Use in Your Daily Work

In Linux the shell is the command interpreter in an operating system that executes other programs. There are many shells available for Linux, but in this article, we only include the top five Linux shells and thoroughly discuss their features.

Firewalld 1.0 Firewall Management Tool is Here with Big Improvements

Firewalld is front-end controller for iptables and nftables used to implement persistent network traffic rules. Ten years after its first release, Firewalld reached version 1.0. The biggest change is removing Python 2 support.

Hyperconverged Infrastructure and Harvester

Harvester, created by Rancher, is open source HCI software built using Kubernetes. While Kubernetes has become the defacto standard for container orchestration, it may seem like an odd choice as the foundation for managing VMs. However, when you think of Kubernetes as an extensible orchestration platform, this choice makes sense. Kubernetes...

Untar tar.gz Files in Linux Using the Command Line

A lot of the downloadable Linux/Unix files found on the internet are compressed using a tar.gz format. In this article you will learn how to extract tar.gz files in Linux systems through the command line using the tar command.

How to Upgrade Debian 10 Buster to Debian 11 Bullseye

In the following tutorial, you will learn how to upgrade Debian 10 Buster to Debian 11 successfully. The new upcoming release of Debian 11 codenamed Bullseye is scheduled to be released on August 14, 2021. The upgrade that has been in testing for the past few years brings updates to many well-known packages such as LibreOffice being...

How to Backup and Restore Files Using Deja Dup in Linux

Deja Dup is a simple and powerful backup tool for Linux operating systems. In this tutorial, I will show you how to install the Deja Dup backup tool on Debian, Ubuntu, and CentOS Linux.

Emulate the Commodore 64 Home Computer with Linux

The Commodore 64 home computer is notable for being one of the first widespread home computers, helping it to expand its collection of games as a result. We recommend the best free and open-source emulators.

How to Recursively Change File Permissions in Linux

Sometimes you can’t edit files because of the “Permission denied” error. Learn how to recursively change file permissions in Linux.

eSecurity Planet: “Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros”

eSecurity Planet goes into more detail on a pair of vulnerabilities in the Linux kernel disclosed this week. The vulnerability—dubbed Sequoia— exposes major Linux operating systems in a way that could let a hacker either gain root privileges on a compromised host or shut down the entire OS altogether. The...

How to Set Up Network Bonding in Ubuntu 20.04

The practice of merging different network interfaces into one is known as network bonding or pairing. The main goal of network bonding is to enhance performance and capacity while also ensuring network redundancy. This guide shows you how to set up network bonding on Ubuntu 20.04.

How to Install eSpeak Text to Speech Software on Ubuntu 20.04

eSpeak is a free, open-source software (FOSS) speech synthesizer for English and other languages. It can be run on most platforms, including Linux, Windows, and macOS. This article covers the installation of eSpeak on Ubuntu 20.04, which is the most used and popular Linux distribution.

How to Setup Firewall with Gufw on Linux Desktop

Gufw is a graphical front-end application to manage the Uncomplicated Firewall (UFW) in Linux. Learn how to set it up here.

OpenShift vs. Kubernetes – Container Deployment Platform Comparison

OpenShift and Kubernetes are the two most common platforms for containerized deployment management. OpenShift and Kubernetes share many common features. However, there are some key differences. We will explain some major differences between Kubernetes and OpenShift in this article.

Patch Now: Linux File System Security Hole, Dubbed Sequoia, Can Take Over Systems

Sequoia, a newly dubbed Linux kernel filesystem security vulnerability, can enable any user to grab root privileges. Learn more about patching it here.

Follow us for More