Zenity and KDialog Adding graphic elements to your scripts with Zenity and KDialogFeb 01, 2009
Zenity and KDialog let you integrate your scripts with the native KDE or Gnome environment.more »
Hotwire Interactive Shell Graphical shellsNov 05, 2008
The Hotwire shell removes the complexities of interactive consoles. We’ll show you how to Hotwire your Linux with this handy text and graphical shell for developers and administrators.more »
Command Line: Text Editors Editors for the shellJul 03, 2008
More is not always better, especially at the command line. Lean text editors such as nano, JOE, and ee fit Linux novices and experts alike.more »
Command Line: Environmental Variables Make your self at homeJul 02, 2008
Environmental variables give users the ability to set up the command line to suit their own needs.more »
Command Line: Data Flow Redirecting input and outputJul 01, 2008
Working in the shell has many benefits. Pipelines, redirectors, and chains of commands give users almost infinite options.more »
Command Line: Bash Prompt Configuring the Bash promptJun 20, 2008
Color-coding your prompt may help avoid configuration errors and data loss. We’ll show you how to design your own custom shell prompt with color and control sequences.more »
Bluetooth with GPRS Using your mobile phone as a wireless modemJun 09, 2008
If your mobile phone contract includes GPRS mobile Internet service,
you can use a Bluetooth phone as a wireless modem for your Linux
Load Average Understanding load averages and stretch factorsOct 26, 2007
What is the real meaning of those little “load average” values in the output of shell commands like procinfo and uptime, and what can you do with these numbers?more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.