The first step towards improving a system's security, is discovering the status quo. Lynis, a small command line program helps users do so.more »
ntfsprogs Exploring the ntfsprogs toolsetJul 15, 2008
The ntfsprogs toolset lets you manage NTFS resources from the Linux command line.more »
Command Line: Diffutils The Diffutils tool collectionJul 11, 2008
The Diffutils tool set helps you compare text files, discover and display the differences between files, and even automatically synchronize files.more »
Command Line: make Handling of complex tasks with makeJul 11, 2008
Developers, LaTeX users, and system administrators can all harness the power of make.more »
Command Line: FTP and NcFTP FTP and NcFTPJul 10, 2008
FTP and NcFTP are both FTP clients for the command line. While FTP only has basic file transfer functionality, NcFTP has a whole bunch of additional features.more »
Command Line: File Management Data management in the ShellJul 09, 2008
Do some serious spring cleaning and reorganize your data. The right commands can help you to keep on top of your file and directory management.more »
Command Line: Access Control chmod, chgrp, and chownJul 07, 2008
A sophisticated system of users and permissions precisely controls who has access to what on Linux. At the command line, you can define ownership with the chmod, chgrp, and chown tools.more »
Command Line: Mailx Mail at the command lineJun 01, 2008
The simple mailx command-line mail client handles mail either interactively or via command-line options. Although it lacks the convenience of a GUI-based tool, mailx compares well in scripting.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.
Legendary Uber-distro splits over the systemd controversy.
New LTS version offers many refinements for the Cinnamon and Mate desktops and significant improvement under the hood.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives