Command Line: dd and mkisofs Creating ISO images with dd and mkisofsJul 31, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
Command Line: mount & fstab Media access with mount and fstabJun 30, 2006
This month we look at tools for mounting and unmounting storage media.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncMay 31, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Command Line: Processes Monitoring and terminating processes at the command lineApr 30, 2006
Innumerable processes may be running on your Linux system. We’ll show you how to halt, continue, or kill tasks, and we’ll examine how to send the remnants of crashed programs to the happy hunting grounds.more »
Command Line: at and cron Cron, atMar 31, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
Command Line: File Viewers Viewing files with cat, more, less, head, and tailFeb 28, 2006
Practical tools such as cat, less, and head are convenient for viewing text.more »
Desktopia: Wmii A look at the Wmii Window ManagerFeb 28, 2006
If you’d rather rule the desktop from your keyboard, try the powerful Wmii window manager.more »
KTools: Klik Software distribution with KlikFeb 28, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.