Command Line: sort Organizing Lists with the sort CommandFeb 28, 2005
sort helps you organize file lists and program
output. And if you like, you can even use this small
but powerful tool to merge and sort multiple files.more »
DeskTOPia: Skippy Working with the Skippy Screen PagerFeb 28, 2005
If your window manager is too boring or Spartan for your liking, why not add a touch of pep? Skippy is an imaginative screen pager with an integrated preview function.more »
KTools: Kdict Searching for Answers with KdictFeb 28, 2005
Don’t worry if your memory lets you down. All you need is a place to look for answers. If you want definitions, explanations, and vocubulary, Kdict, KDE’s dictionary utility, is the tool you need.more »
Kontact with IMAP Kontact with IMAP-based Calendar and Address ManagementJan 31, 2005
Kontact gives you email,address books,and calendaring in a neat package. And IMAP supportmeans you can access this data from anywhere on the network.more »
Linux for Layout: Preparing for Print Templates and PDFs in ScribusJan 31, 2005
In this final part of our three-part series ,we’ll put the finishing touches on our Linux newspaper. You’ll learn how to generate a PDF,and you’ll find out what a real pre-press professional thinks about our project.more »
Command Line Creating Manpages with groffJan 31, 2005
Do have difficulty remembering
command syntax? It often pays to
check the manpage. In this issue of
Command Line,we look at how to
create your own manpages,and
how to convert manpages to other
GFTP File Transfer with the Versatile GFTPJan 31, 2005
Whether you like your file transfers with a GUI or from a command prompt,
GFTP has the right tool for every job.The GFTP client also supports advanced
features such as secure file transfer with SSH.more »
KTools Ktools: SuperkarambaJan 31, 2005
SuperKaramba is always a pretty sight,with a collection of themes that
allow users to give their desktops that personal touch.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm