A complete introduction to the shell for novices and masters alike.
Debugging the kernel of a running operating system has always been tricky, but now the Qemu emulator supports cross-platform kernel and module debugging at the programming language level.
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.
Like it or not, DevOps is here to stay, and the demands of cloud and distributed computing are bringing a host of new tools to help coders and admins manage these ever-changing systems.
In the beginning was the double pound sign and the exclamation mark – or at least shell scripts always start this way. The inventor, Dennis Ritchie, really didn’t know how much pain this was going to cause users.
The Anonymous Hacktivist group has been in many headlines this past year. Who are they? What did they attack? How do they communicate?
Subscribe now: http://www.smart-developer.com/Subscribe
Don't miss free live streaming from the CeBIT Open Source Forum!
A user interface can be loosely defined as the point where a person interacts with a machine. Currently, that interaction point can be a laptop or a smart phone, quite different types of physical presentation space. A solution might look fantastic on a laptop, but not work on smart phone's browser, causing the user to have to scroll around on the page. What we need is a comprehensive collection of interface patterns to use as a guide. Designing Interfaces is that guide.
I'm amazed at all the technical people living here in Lawrence, Kansas, so I've decided to do a series of interviews to highlight what our small college town has to offer the international tech community. Recently I sat down with local author Stephen Figgins at a coffee shop to talk about what's new in the latest release of the popular Linux in a Nutshell book.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm