Category: Theory

BIOS vs UEFI 0

BIOS and UEFI explained, all you need to know about

BIOS and UEFI are two of a kind, but completely different from each other. They serve one major purpose: booting the machine and they do it in different ways and with different options. Without them, all...

Git 0

Git: learn how to manage your code

If you are a developer, chances are that sooner or later you will start working with lots of files, and if you distribute your code, chances are you will start working with lots of people too....

RAM module 0

Swap partitions: what are they? Do I need them?

One of the most asked question by Linux beginners is: “What is this swap partition?” usually followed by “Do I need it?”. In this article I try to explain what these partitions are and if you...

Ethernet switch with cables 0

Ethernet Cables: The complete guide

Ethernet cables are everywhere. From your home network to large enterprises to places where you wouldn’t expect them. Learning cable types and cabling is often regarded as less important than learning networks, but as a matter...

0

Containers: What are they and why do you need them?

Virtual machines revolutionised pretty much the industry at the time of their inception. Today another huge revolution is happening in the IT: containers. Many are speaking of it, but as any buzz-word, it can be difficult...

server OpenStack 0

What is a Virtual Machine?

One of the biggest revolutions in the IT industry was Virtual Machines. The capability of using a machine to host different operating systems (and consequently parallelize workloads) opened a whole new world. But what is a...

linux permissions security text hash crypt encryption decryption cryptography 0

Encryption and Hashing differences and use cases

One of the most common misunderstanding among beginners (and sometimes even IT professionals) is the difference between encryption and Hashing. Let’s take this as a good chance to make things clear.

linux permissions security text hash crypt encryption decryption cryptography 0

Y2038 and Millennium Bug, analysis of a disaster

If you’re old enough you’ve surely heard of this event: the Millennium Bug. No it isn’t some resonant media news, it was or rather is one of the most feared bugs in the computer history.

hard disks 0

Data Corruption what is it, strategies to avoid it

In front of a file damaged, even a system file, you may not be desperate. However, when it comes to personal photo, valuable data or work files, the reaction changes drastically. Let’s discover the world of...

ram bank 0

ECC RAM why is it important and do I need it?

Now everyone knows RAM, maybe you also know there are different types of RAM, and maybe you also know what purpose RAM serves. However when it comes to ECC rams it is often regarded to as...