Charly's Column The sys admin's daily grind: NloadMay 01, 2008
Network monitors are a dime a dozen, but Nload, which separates incoming and outgoing traffic and draws graphs on the console without X, is unique.more »
Command Line: SSH SSH, SCP, and SFTPMay 01, 2008
SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.more »
Linux consultant Matthias Kettner has just released Version 1.0 of his Waitmax Software. It gives programs a specified time to complete after terminating them.more »
Moving from version 7.7 to 8.1 gives users of the hard disk tool new options and new information displays.more »
ImageMagick Image processing on the consoleJan 28, 2008
GIMP isn’t the only option for photo manipulation. ImageMagick, a collection of command-line programs for image processing, can help you process multiple images in one go.more »
Version 1.3 of dwdiff, a free front-end for the Unix diff program has just been released and is now licensed under the GPLv3.more »
Command-Line Tools Sound, Video, and News at the Command LineDec 18, 2007
Learn more about Linux text-based multimedia utilities for playing streams, editing images, and reading CDs or DVDs from the command-line.more »
Livecd-creator Building a custom live CD with Fedora’s livecd-creatorOct 31, 2007
Fedora 7 comes with new tools for creating custom live CDs and custom .iso files. We’ll show you how to get started with Fedora's new command-line tool, livecd-creator.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.