Command Line: Wodim Burning with wodimJun 21, 2012
Wodim works behind the scenes in popular CD/ DVD-burning software, but it’s even more powerful at the command line.more »
Fabric Python Library Stitching together a crazy sys admin world with PythonJun 21, 2012
The Fabric Python library makes it extremely easy to create repeatable scripts of commands over SSH to any number of servers.more »
Command Line: Vim Outliner Vim Outliner orders your thoughtsMay 29, 2012
If you need to outline an essay, make a list, or write something highly structured like a CSS file for a website, then look no further than the command line, especially if you’re already comfortable with the Vim text editor.more »
PHP-CLI PHP for the command lineMay 29, 2012
PHP is not just for websites. Command-line PHP scripting has been around for more than 10 years, which makes the language and its comprehensive libraries eminently suitable for the toolbox of any administrator who manages web servers.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
Steer around errors and save yourself some typing by adding autocompletion to your Bash scripts.more »
A complete introduction to the shell for novices and masters alike.more »
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.