Command Line: CD Images mkisofs, mount, md5sumJun 01, 2005
Before you burn a data CD in Linux, you need an ISO image – mkisofs
helps you create an Iso image. To save disks, you might like to check
the image before you burn it with md5sum.more »
Command Line: Browsers Command-line browsers Lynx, Links, and w3mMay 01, 2005
If you’re working at the command line and you need to reach the
Internet, or if you just want to convert an HTML file into neatly formatted
ASCII text, try a text-based web browser.more »
Command Line: tr & dos2unix Using tr and dos2unixApr 01, 2005
The tr tool is a real wizard. This simple command lets you replace strings in text files. Whether you are replacing letters or just removing whitespace, you will be amazed at tr‘s versatility.more »
Command Line: sort Organizing Lists with the sort CommandMar 01, 2005
sort helps you organize file lists and program
output. And if you like, you can even use this small
but powerful tool to merge and sort multiple files.more »
Command Line Creating Manpages with groffFeb 01, 2005
Do have difficulty remembering
command syntax? It often pays to
check the manpage. In this issue of
Command Line,we look at how to
create your own manpages,and
how to convert manpages to other
Command Line Converting Audio FormatsJan 01, 2005
The command line swings. In this
issue of “Command Line”we investigate
how you can grab tracks from
audio CDs and convert sound files to
other formats. No matter whether
you choose wav,MP3 or Ogg Vorbis,
you can rely on the shell to convert
your files.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.