Command Line: CD Images mkisofs, mount, md5sumMay 31, 2005
Before you burn a data CD in Linux, you need an ISO image – mkisofs
helps you create an Iso image. To save disks, you might like to check
the image before you burn it with md5sum.more »
Command Line: Browsers Command-line browsers Lynx, Links, and w3mApr 30, 2005
If you’re working at the command line and you need to reach the
Internet, or if you just want to convert an HTML file into neatly formatted
ASCII text, try a text-based web browser.more »
Command Line: tr & dos2unix Using tr and dos2unixMar 31, 2005
The tr tool is a real wizard. This simple command lets you replace strings in text files. Whether you are replacing letters or just removing whitespace, you will be amazed at tr‘s versatility.more »
Command Line: sort Organizing Lists with the sort CommandFeb 28, 2005
sort helps you organize file lists and program
output. And if you like, you can even use this small
but powerful tool to merge and sort multiple files.more »
Command Line Creating Manpages with groffJan 31, 2005
Do have difficulty remembering
command syntax? It often pays to
check the manpage. In this issue of
Command Line,we look at how to
create your own manpages,and
how to convert manpages to other
Command Line Converting Audio FormatsDec 31, 2004
The command line swings. In this
issue of “Command Line”we investigate
how you can grab tracks from
audio CDs and convert sound files to
other formats. No matter whether
you choose wav,MP3 or Ogg Vorbis,
you can rely on the shell to convert
your files.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm