Tagged: Theory

Theoretical concept or topic not involving practice.

BIOS vs UEFI 0

BIOS and UEFI explained, all you need to know about

BIOS and UEFI are two of a kind, but completely different from each other. They serve one major purpose: booting the machine and they do it in different ways and with different options. Without them, all...

Ethernet switch with cables 0

Ethernet Cables: The complete guide

Ethernet cables are everywhere. From your home network to large enterprises to places where you wouldn’t expect them. Learning cable types and cabling is often regarded as less important than learning networks, but as a matter...

server OpenStack 0

What is a Virtual Machine?

One of the biggest revolutions in the IT industry was Virtual Machines. The capability of using a machine to host different operating systems (and consequently parallelize workloads) opened a whole new world. But what is a...

linux permissions security text hash crypt encryption decryption cryptography 0

Encryption and Hashing differences and use cases

One of the most common misunderstanding among beginners (and sometimes even IT professionals) is the difference between encryption and Hashing. Let’s take this as a good chance to make things clear.

HP storage server macro 0

BTRFS: what is it and why is it great?

In the computer world and particularly in the Linux world there are many filesystems available: ext, XFS, NTFS, FAT32 to name a few. BTRFS is a relatively new filesystem that is quickly gaining attention in the...

linux permissions security text hash crypt encryption decryption cryptography 0

Y2038 and Millennium Bug, analysis of a disaster

If you’re old enough you’ve surely heard of this event: the Millennium Bug. No it isn’t some resonant media news, it was or rather is one of the most feared bugs in the computer history.

virus 0

Linux viruses: are you immune?

Many times you’ve probably heard this: “Linux is secure”, “Linux can’t be infected by viruses” and phrases like that, but are they really true? Are there Linux viruses? Or is it really impenetrable?

hard disks 0

Data Corruption what is it, strategies to avoid it

In front of a file damaged, even a system file, you may not be desperate. However, when it comes to personal photo, valuable data or work files, the reaction changes drastically. Let’s discover the world of...

Hoodie hacker behind a laptop 0

SSL: What is it? Do I need it?

SSL (Secure Socket Layer) is the industry standard to secure a link between two computers, usually server and client. SSL and its successor TLS are so your first choice, but do you really need it? And...

0

If you care, backup

I won’t ever emphasize enough how much backups are important, they help in case of difficulty yet many won’t even consider backing up files… In this article you will learn why backups are important and what...