Computer security methods are designed to keep private things, well, private. There are many ways to secure a system. Some users use a simple username/password login scheme for basic protection. Other users may use extra protection through encryption in various ways like
Read More
Seeing too many loop devices in Ubuntu? Learn what are these loop devices and why is it used on your Linux system.
The :(){ :|:& };: is a popular fork bomb for Linux systems. Learn how it works and what you can do to prevent such a malicious command.
As a Linux user, you’ll come across the term upstream and downstream in various discussions. This jargon buster explains what these terms mean.
You might have come across the term POSIX. Have you ever wondered what it is and why programmers often discuss POSIX compliance?
When you switch to Linux, you’ll find that folders are often termed as directory. Should you call it folder or directory? Is there even a difference? This article explains it all.
You must have heard about the term “TTY” when it comes to Linux and UNIX. But, what is it actually? This article explains the essentials.
In this part of our Linux Jargon Buster, you’ll learn about cron in Linux. You’ll also learn the basics of creating cron jobs by editing crontab.
When you are new to Linux, you’ll often come across advice to never run sudo rm -rf /. There are so many memes in the Linux world around sudo rm -rf. But it seems that there are some confusions around it. In
Read More
As a Linux user, you might have come across a long text that starts with “I’d like to interject for a moment. What you are referring to as Linux, is in fact, GNU/Linux”. It makes some people confused about what is Linux
Read More