Hardware Detection Bash-based hardware detection for PCI and USBNov 01, 2005
If you need fast answers for what's inside, you can use a Bash script to obtain an inventory of hardware on your Linux system.more »
Command Line: ls Detailed directory lists with lsNov 01, 2005
The ls command lists files at the command line and gives you many useful details about file properties. With or without colors, this command keeps you on top of your files.more »
Command Line: sed The stream editor sedOct 01, 2005
Working with a text editor can be difficult if you need to handle frequently recurring tasks or multiple files. sed can save a lot of typing.more »
deskTOPia: Zufall and genbg Random backgrounds for the desktopOct 01, 2005
A new background image is the quickest way to liven up your desktop. Tools such as Zufall and genbg help you change your wallpaper auto matically.more »
Command Line: cal and date Calendar in the command lineSep 01, 2005
The legacy cal and date tools help users keep track of the time and date. You can even change the system time with a single shell command.more »
Command Line: User Accounts Command line user managementAug 01, 2005
Linux is a multiuser system: many users can work at the same machine at the same time on separate accounts. In this month’s column, we take a close look at how to create and manage Linux user accounts from the command line.more »
Command Line: Music Tools Music tools for the command lineJul 01, 2005
You don’t always need a GUI-based tool to play MP3 and Ogg Vorbis tracks. In this month’s column, we look at tools for rocking from the shell.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.