Charly's Column The sys admin's daily grind: NloadMay 01, 2008
Network monitors are a dime a dozen, but Nload, which separates incoming and outgoing traffic and draws graphs on the console without X, is unique.more »
Command Line: SSH SSH, SCP, and SFTPMay 01, 2008
SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.more »
Linux consultant Matthias Kettner has just released Version 1.0 of his Waitmax Software. It gives programs a specified time to complete after terminating them.more »
Moving from version 7.7 to 8.1 gives users of the hard disk tool new options and new information displays.more »
ImageMagick Image processing on the consoleJan 28, 2008
GIMP isn’t the only option for photo manipulation. ImageMagick, a collection of command-line programs for image processing, can help you process multiple images in one go.more »
Version 1.3 of dwdiff, a free front-end for the Unix diff program has just been released and is now licensed under the GPLv3.more »
Command-Line Tools Sound, Video, and News at the Command LineDec 18, 2007
Learn more about Linux text-based multimedia utilities for playing streams, editing images, and reading CDs or DVDs from the command-line.more »
Livecd-creator Building a custom live CD with Fedora’s livecd-creatorOct 31, 2007
Fedora 7 comes with new tools for creating custom live CDs and custom .iso files. We’ll show you how to get started with Fedora's new command-line tool, livecd-creator.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.