Dropbox alternatives for file hosting

Cloud storage providers: the best Dropbox alternatives

 

Dropbox is one of the most famous and most successful cloud storage services available. Its success is largely due to its many functions and ease of use. But when it comes to data protection and maximum free online storage space, this popular app isn’t the pick of the bunch....

 

Linux editor: effective code editing with Vim

Linux editor with a vast range of functions – Vim

In order to edit text files or receive source codes from software or websites, you require a text editor. Whether you’re using Linux, Windows, or Mac: the majority of operating systems these days already have them installed by default. There are also editors like Vim, which have a wider range of functions and simplify working with the confusing lines of code.

Introduction to netstat

What is netstat?

Various computer networks are connected with one another via the internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. Netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access attempts.

Image tools in comparison

Image tools: A comparison of the best programs

Double is better, especially when it comes to data backups. Backups shouldn’t only contain important files like documents, tables, presentations, or videos. Generate a comprehensive storage image of your entire system with the help of image-based backup tools and completely restore it including configurations in the event of total failure. Find what makes a good image tool and which functions you...

Traceroute: your digital pathfinder for data packages

What is Traceroute (tracert)?

Whether at home or at your business: network issues can really grind one’s gears. When ensuring that all the cables have been connected and the settings have been checked multiple times is of no help, it may be time to make use of traceroute or tracert. These help users find the source of all their frustration.

VPN service comparison

VPN service providers compared

A virtual private network (VPN) hides internet users in the network, and protects them from targeted attacks. With the help of VPN services, barriers between countries via geo-blocking can also be overcome. There are now numerous VPN providers based in very different countries. Some offer particularly stable servers, although all of them have their own strengths.

SSH: Secure Shell

What is SSH? The secure shell simply explained

If you want to establish a secure connection to your server via the internet, you will need SSH. Whether sending commands, uploading files, or during remote maintenance, secure shell ensures that criminals cannot gain access to your sensitive data. Effective encryption and correct authentication are essential for this. To help you understand what is behind the SSH protocol, we reveal how it works...

How Plesk file sharing works

Plesk file sharing: basics and tutorial

Plesk is undoubtedly one of the best solution for managing web and other server services. The server administration tool, which impresses with its intuitive interface, can also be used to save files on your own server and publish them to selected users. How exactly Plesk file sharing functions, and how you can set it up is explained in this guide.

Tar backup: How to create an archive with Linux

Create a tar backup: How the archiving works

Regular backups are one of the most important factors of IT security. With Linux systems – which are often the backbone of a webserver – you can very efficiently create backup copies with the program tar. What can the archiving program do? We explain to you how tar functions and what its special features are. So that you’re able to create regular backups with tar in the future, we explain step by...

htop – the task manager for Linux, Mac OS X and BSD

Manage simple system processes with htop

Process managers can give experienced computer users and administrators an accurate overview of which programs and services are taking up the system’s capacity. Classic command-line tools are confusing, and can only be controlled with complicated commands. For Unix-like systems, such as Ubuntu, the task manager htop, with its text interface, is a first-class alternative. It can help inexperienced...

iptables tutorial –  rule sets for creating data packets

iptables tutorial: how to configure the filter tables of Linux kernels

Since the first version, Linux kernel has been implementing packet filter modules, with which filter tables can be created. However, additional programs such as iptables are required to configure the rule set. In our tutorial, we present the free software for the Linux kernel 2.4 and 2.6 and give you a little insight into how it all works.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year