X

How to prevent that a user deletes a file owned by root in his home directory

Even though a file is held by root and has 700 rights, if the root user saves it in another…

Get a list of all available Linux commands that you can use

We're all familiar with Linux's command-line interface (CLI), which allows you to execute nearly any job you can think of…

How to prevent a Linux system user from logging into the system

The shell setting in /etc/passwd determines whether a Linux system user may log in via the shell or over SSH.…

Get a list of all virtual hosts which are defined in all apache configuration files

Have you ever looked in the apache config files to see where a website's virtual host is defined? The apache2ctl…

How to Set Up Hello Facial Recognition in Windows 10

Hello facial recognition is another Windows 10 sign-in option that scans your face and then utilizes it to connect to…

Linux Basics: The gunzip command explained (with examples)

The gunzip command is a widely used command for uncompressing files which are made using the gzip utility. It decompresses…

Dealing with MS Exchange Mailbox Corruption – Reasons & Solutions

MS Exchange has undergone many upgrades and a new version with unrivaled features and benefits throughout the years. Despite the…

10 Apt Command Examples You Must Know

The apt is the most powerful command-line utility for managing the packages such as installing packages, updating package info, upgrading…

How to Calibrate Your Monitor in Windows 10

Color Calibration is a feature in Windows 10 that allows you to change the brightness and color contrast of your…

Robocopy single- and multithreaded benchmark on Windows

When copying files, a commenter on my robocopy post wondered if a multithreaded copy tool like robocopy is actually quicker…

X

Headline

You can control the ways in which we improve and personalize your experience. Please choose whether you wish to allow the following:

Privacy Settings