Command Line: Wodim Burning with wodimJun 21, 2012
Wodim works behind the scenes in popular CD/ DVD-burning software, but it’s even more powerful at the command line.more »
Fabric Python Library Stitching together a crazy sys admin world with PythonJun 21, 2012
The Fabric Python library makes it extremely easy to create repeatable scripts of commands over SSH to any number of servers.more »
Command Line: Vim Outliner Vim Outliner orders your thoughtsMay 29, 2012
If you need to outline an essay, make a list, or write something highly structured like a CSS file for a website, then look no further than the command line, especially if you’re already comfortable with the Vim text editor.more »
PHP-CLI PHP for the command lineMay 29, 2012
PHP is not just for websites. Command-line PHP scripting has been around for more than 10 years, which makes the language and its comprehensive libraries eminently suitable for the toolbox of any administrator who manages web servers.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
Steer around errors and save yourself some typing by adding autocompletion to your Bash scripts.more »
A complete introduction to the shell for novices and masters alike.more »
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.