Tweet from the Command Line with Twidge
When it comes to graphical Twitter clients, you are spoiled for choice. But what if you want to use the popular micro-blogging service from the command line? Then you need Twidge, a command-line utility that supports both Twitter and Identi.ca.
Before you can use Twidge, you have to configure it using the twidge setup command. Enter your Twitter user name and password, and you are all set. Using Twidge couldn't be easier. To view the 20 most recent updates from the people you follow, use the twidge lsrecent -su command. The twidge update command allows you to post a tweet, for example:
twidge update "Status goes here."
If you want to send a direct message to a specific user, you can do so by using the twidge dmsend command as follows (replace username with the actual Twitter user):
twidge dmsend username "Message goes here."
Following or unfollowing a Twitter user using twidge is equally simple:
twidge follow username twidge unfollow username
By default, Twidge works with Twitter, but you can easily reconfigure it for use with Identi.ca. Open the .twidgerc configuration file stored in your home directory in a text editor and change the default urlbase URL to http://identi.ca/api, so it looks like this:
These commands are enough to get you started with Twidge, but it also has a few clever tricks up its sleeve. Make sure to check the How-to page in the Twidge wiki to learn a trick or two.comments powered by Disqus
The bug was introduced back in 2009 and has been lurking around all this time.
The new release deprecates the sshd_config UsePrivilegeSeparation option.
Lives on as a community project
Five new systems join Dell XPS 13 Developer Edition that come with Ubuntu pre-installed.
The Skype Linux client now has almost the same capabilities that it enjoys on other platforms.
At CeBIT 2017, OpenStack Day will offer a wide range of lectures and discussions.
A major setback for the Linux desktop.
Improved support for GPU in virtualization.
News site for the openSUSE community falls victim to a Wordpress exploit.
The source code is available online.