Zenity and KDialog Adding graphic elements to your scripts with Zenity and KDialogJan 31, 2009
Zenity and KDialog let you integrate your scripts with the native KDE or Gnome environment.more »
Hotwire Interactive Shell Graphical shellsNov 05, 2008
The Hotwire shell removes the complexities of interactive consoles. We’ll show you how to Hotwire your Linux with this handy text and graphical shell for developers and administrators.more »
Command Line: Text Editors Editors for the shellJul 03, 2008
More is not always better, especially at the command line. Lean text editors such as nano, JOE, and ee fit Linux novices and experts alike.more »
Command Line: Environmental Variables Make your self at homeJul 02, 2008
Environmental variables give users the ability to set up the command line to suit their own needs.more »
Command Line: Data Flow Redirecting input and outputJul 01, 2008
Working in the shell has many benefits. Pipelines, redirectors, and chains of commands give users almost infinite options.more »
Command Line: Bash Prompt Configuring the Bash promptJun 20, 2008
Color-coding your prompt may help avoid configuration errors and data loss. We’ll show you how to design your own custom shell prompt with color and control sequences.more »
Bluetooth with GPRS Using your mobile phone as a wireless modemJun 09, 2008
If your mobile phone contract includes GPRS mobile Internet service,
you can use a Bluetooth phone as a wireless modem for your Linux
Load Average Understanding load averages and stretch factorsOct 26, 2007
What is the real meaning of those little “load average” values in the output of shell commands like procinfo and uptime, and what can you do with these numbers?more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.