PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
File Management Learning file management commandsFeb 28, 2011
We give you an overview of commands for moving, editing, compressing, and generally manipulating files.more »
Shell scripts are now bourne-compatiblemore »
Bash Builtins Moving beyond basic BashDec 21, 2009
Even beginners can benefit from a greater understanding of the Bash shell’s many builtin commands.more »
Introducing Bash Working at the command lineDec 03, 2009
Beyond all the splash screens, screen savers, and vivid rock-star wallpaper is the simple yet powerful Bash shell.more »
Command Line: Customizing Bash Take control of the command lineJun 30, 2009
Ease into your comfort zone with these tips for customizing Bash.more »
Tech Tools We thought you might be interested in the following new products and updatesMay 26, 2009
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job.more »
With version 1.0, log4bash makes its first appearance in providing logging functions for shell scripts.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm