Workspace: Command-Line Tools Command-line productivity toolsMar 31, 2009
Read email, use your calendar, and check RSS feeds faster than you can say, "Ooooo, pretty."more »
Command Line: Archives Compressed text filesMar 29, 2009
Gzip and bzip2 not only compress files, they also provide lean and powerful tools for viewing, searching, and comparing text files.more »
Command Line: Searching Logfiles Searching logfiles with tail, grep, and companyMar 24, 2009
If your hardware or software goes on strike, or the graphical system or your Internet connection fail, checking the logfiles can often be a big help. In this month’s column, we will look at the command-line tools that can help you scour the depths of these critical files.more »
The GNU Project's Bourne Again Shell (bash) is now in its fourth major version, which provides numerous enhancements.more »
MLN Administering virtual machines with MLNDec 31, 2008
This simple command-line tool helps you keep ahead of your virtual infrastructure.more »
Command Line: MPlayer and MEncoder Video and audio players for the shellNov 12, 2008
MPlayer and MEncoder have considerable potential, and you can control them by means of intelligent command-line options. We’ll put both programs to work.more »
On August 20, developer Andreas Krennmair announced the official release of Newsbeuter, the “mutt of RSS feed readers.”more »
Command Line: Process Control Process and job controlJul 31, 2008
What is happening on your Linux machine? Various shell commands give you details about system processes and help you control them.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.