• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Unix

Optimizing Linux Power Management for Maximum Laptop Battery Life
Unix

Optimizing Linux Power Management for Maximum Laptop Battery Life

2 days ago14/09/2025Ilya Ostapenko3840
Be honest: how many times have you felt like spitting in the face of the marketer who dreams up those ridiculous “10–12 hours of battery life” claims? Six or seven is closer to reality—and even then only…
CONTINUE READING 🡒
Monitor and Control: How to Audit and Track Everything on Your Linux System
Unix

Monitor and Control: How to Audit and Track Everything on…

6 days ago14/09/2025Nikolai enchantner Markov3080
Are you sure you’re on top of everything happening on your system? Maybe you’re already using a monitoring stack like Prometheus or Zabbix, but do you know how to generate your own detailed reports on system and…
CONTINUE READING 🡒
Linux Hardening: Essential Tools for Comprehensive Security Auditing
Unix

Linux Hardening: Essential Tools for Comprehensive Security Auditing

2 weeks ago13/09/2025Ivan Piskunov2040
In this article, we’ll explore the key utilities for Linux hardening—tools for assessing a Linux system’s security posture and validating configurations from an information security perspective. We’ll not only review the tools but also provide practical examples…
CONTINUE READING 🡒
How to Build an Unconventional Raspberry Pi Media Center: A DIY Recipe
Unix

How to Build an Unconventional Raspberry Pi Media Center: A…

2 weeks ago13/09/2025Eugene Zobnin1430
In the six years since the Raspberry Pi appeared, countless guides have shown how to turn it into a home media center. The problem is, the classic media-center setup on a Pi is so underwhelming it loses…
CONTINUE READING 🡒
Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting
Unix

Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting

1 month ago23/08/2025Daniil Baturin1780
Ping, traceroute, and whois are among the first tools new admins learn. Many people who aren’t network specialists stop there—and that’s a mistake. With the standard toolset you can pull far more information about a problem than…
CONTINUE READING 🡒
Hardware Over the Network: Passthrough USB Devices, GPU, Sound Card, and Disks to a Remote Machine
Unix

Hardware Over the Network: Passthrough USB Devices, GPU, Sound Card,…

1 month ago23/08/2025Ilya Ostapenko740
In one of our earlier articles, we explored ways to expose all kinds of resources as files and directories—WebDAV, BitTorrent, SSH, and even GPU memory. But what if we want access not to a remote or local…
CONTINUE READING 🡒
Vulnerability Scanning with Kali Linux: Penetration Testing Essentials
Unix

Vulnerability Scanning with Kali Linux: Penetration Testing Essentials

1 month ago23/08/2025Piter Publishing House1020
Vulnerability scanning is the process of identifying and analyzing critical security weaknesses in a target environment. It’s sometimes referred to as a vulnerability assessment. Vulnerability scanning is a core function of a vulnerability management program focused on…
CONTINUE READING 🡒
Corosync and Pacemaker: Best Practices for Deploying a High‑Availability (HA) Cluster
Unix

Corosync and Pacemaker: Best Practices for Deploying a High‑Availability (HA)…

2 months ago23/08/2025Ivan Ryzhevtsev1450
Getting a service to handle heavy traffic is a challenge every sysadmin runs into sooner or later. It’s best to put high-availability mechanisms in place ahead of time—before critical nodes start failing. In this article, I’ll cover…
CONTINUE READING 🡒
13 Essential Sysadmin Utilities Every System Administrator Should Know
Unix

13 Essential Sysadmin Utilities Every System Administrator Should Know

2 months ago23/08/2025Eugene Zobnin900
A well-stocked toolbox is what sets a seasoned pro apart from a newbie. And in Linux administration, that toolbox is about as critical as it gets. In this article, we’re not going to cover things like Nagios,…
CONTINUE READING 🡒
Set Up a Private VPN Server for Friends with Telegram Payments
Unix

Set Up a Private VPN Server for Friends with Telegram…

2 months ago19/08/2025driver0black880
In this article, I’ll show you not only how to build your own WireGuard-based VPN service, but also how to configure it so all your friends can use it. And if you want, they can even chip…
CONTINUE READING 🡒
Creating a Bootable USB Drive with Arch Linux Live Image
Unix

Creating a Bootable USB Drive with Arch Linux Live Image

2 months ago06/08/2025ksandr4100
Today, we will create a live USB drive with an Arch Linux installation image. By "live," I mean it will allow you to install and remove programs, modify any files, and save changes while in use. I've…
CONTINUE READING 🡒
Exploring firewalld: A Simple and Powerful Firewall for Linux to Replace iptables
Unix

Exploring firewalld: A Simple and Powerful Firewall for Linux to…

2 months ago06/08/2025Martin Prankevich880
There are numerous articles dedicated to configuring a firewall using iptables in Linux, and given the topic's popularity, many more are likely to be written. While basic configurations are relatively straightforward, things get complicated with complex networks…
CONTINUE READING 🡒
10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with Maximum Power
Unix

10 Compelling Reasons to Choose Arch Linux: Embracing Minimalism with…

2 months ago03/08/2025Eugene Zobnin870
We felt that writing about installing and configuring Arch Linux was a bit passé and redundant. So, we decided to take a different approach and discuss why this system exists in the first place and why millions…
CONTINUE READING 🡒
Manjaro vs Arch Linux: Why Stick with Arch for Advanced Users?
Unix

Manjaro vs Arch Linux: Why Stick with Arch for Advanced…

2 months ago03/08/2025Ilya Ostapenko1760
The world of Linux desktop systems is incredibly diverse. As of now, Distrowatch.com lists 288 different distributions, each with its own philosophy and area of application. Throughout the history of the rankings, hundreds of distributions have come…
CONTINUE READING 🡒
Hacker’s Toolkit: Essential Tools for Windows and Linux
Unix

Hacker’s Toolkit: Essential Tools for Windows and Linux

2 months ago02/08/2025Polski Kot890
Live and learn, always collecting useful tools along the way! Following this principle, I've gathered an extensive collection of utilities, and I'd like to share the best with you. Perhaps you'll find something that will be helpful…
CONTINUE READING 🡒
Mastering systemd: Creating Your Own Linux Service
Unix

Mastering systemd: Creating Your Own Linux Service

3 months ago27/07/2025Daniil Baturin660
Despite numerous issues and mixed feelings from users, systemd has become the de facto standard in most Linux distributions. It allows you to create a simple service in just a few minutes and a handful of configuration…
CONTINUE READING 🡒
Conducting Forensics on Linux: Memory, Disk, and Network Dumping for Evidence Collection
Unix

Conducting Forensics on Linux: Memory, Disk, and Network Dumping for…

3 months ago22/07/2025Ivan Piskunov1620
The first task in digital forensics is data collection, specifically acquiring images of hard drives and RAM, as well as network connection dumps if they might be helpful. In this article, we'll explore what needs to be…
CONTINUE READING 🡒
Run a Full Ubuntu Desktop on Windows 10 with Linux Integration Tools
Unix

Run a Full Ubuntu Desktop on Windows 10 with Linux…

3 months ago19/07/2025Artem Zorin680
It's been over six months since the author wrote the previous article about Windows Subsystem for Linux. During this time, Microsoft released its first major update for Windows 10—the Anniversary Update 1607. With this update, all new…
CONTINUE READING 🡒
Exploring Endless OS: A Package-Free Linux Distribution
Unix

Exploring Endless OS: A Package-Free Linux Distribution

3 months ago12/07/2025Eugene Zobnin1050
What does an average Linux distribution look like? Typically, it's a system assembled like a modular kit from thousands of packages, plus various desktop customizations, possibly its own installer and configuration system. In any case, almost all…
CONTINUE READING 🡒
Understanding the Linux Boot Process: From Power-On to Desktop
Unix

Understanding the Linux Boot Process: From Power-On to Desktop

3 months ago12/07/2025Eugene Zobnin1000
The best way to understand how an operating system works is to trace its boot process step by step. It is during this boot process that all the mechanisms that get the OS up and running are…
CONTINUE READING 🡒
1 2 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com