Table of Contents: 139 Automation for AdminsApr 24, 2012
Command Line: Grep Finding files with grepApr 24, 2012
Once you understand the intricacies of grep, you can find just about anything.more »
Table of Contents: 138 In the CloudsMar 29, 2012 Jan 27, 2012
Windows secure boot controversy gets uglier.more »
Table of Contents: 128 Device TricksMay 31, 2011 May 05, 2011
Nokia announces the release and immediate availability Qt SDK 1.1 as its next step in tools support for Qt based development.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.