Perl: Tmux Configuration A Perl script controls Tmux configurationMay 31, 2013
Instead of manually rearranging windows in a development environment time and time again, the Tmux terminal multiplexer can restore them from a configuration script.more »
Charly's Column: Snoopy The sys admin's daily grind: SnoopyMay 31, 2013
Sometimes sys admin Charly needs to know when exactly he did something ingenious on one of his servers. Finding an infallible memory aid is difficult, you might think. "Peanuts!" says Charly.more »
Traffic Watch Analyzing Network Traffic with iftopMay 01, 2013
Sluggish network connections can be nerve-wracking. Checking live statistics about network traffic can help pinpoint the problem. Iftop is a command-line system monitoring tool that can help you identify bandwidth hogs and keep traffic moving.more »
Coping with the UEFI Boot Process New SheriffApr 07, 2013
The UEFI boot specification offers new capabilities – and new headaches if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
Charly's Column: ifdata The sys admin’s daily grind – ifdata InfoJan 23, 2013
Script-friendly ifdata from the Moreutils package delivers absolutely precise network interface status information, with no need to extract individual values.more »
Timeline Tools Four timeline tools testedJan 23, 2013
Back in 1962, the threat of a third world war loomed for 13 days, but what happened during the Cuban missile crisis and when? What was the timing of events for the first moon landing? Four timeline tools present complex topics of world history and current affairs in clear context.more »
ngrep: Network Grep Network grepJan 23, 2013
Ngrep is a pattern-matching tool that sorts the wheat from the chaff and doubles as a lightweight packet sniffer.more »
Tune Your Hard Disk with hdparm Disk Inspector: Retrieving and setting hard drive parameters with hdparmDec 16, 2012
Hdparm is the tool to use when it comes to tuning your hard disk or DVD drive, but it can also measure read speed, deliver valuable information about the device, change important drive settings, and even erase SSDs securely.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.