Perl: Tmux Configuration A Perl script controls Tmux configurationMay 31, 2013
Instead of manually rearranging windows in a development environment time and time again, the Tmux terminal multiplexer can restore them from a configuration script.more »
Charly's Column: Snoopy The sys admin's daily grind: SnoopyMay 31, 2013
Sometimes sys admin Charly needs to know when exactly he did something ingenious on one of his servers. Finding an infallible memory aid is difficult, you might think. "Peanuts!" says Charly.more »
Traffic Watch Analyzing Network Traffic with iftopMay 01, 2013
Sluggish network connections can be nerve-wracking. Checking live statistics about network traffic can help pinpoint the problem. Iftop is a command-line system monitoring tool that can help you identify bandwidth hogs and keep traffic moving.more »
Coping with the UEFI Boot Process New SheriffApr 07, 2013
The UEFI boot specification offers new capabilities – and new headaches if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
Charly's Column: ifdata The sys admin’s daily grind – ifdata InfoJan 23, 2013
Script-friendly ifdata from the Moreutils package delivers absolutely precise network interface status information, with no need to extract individual values.more »
Timeline Tools Four timeline tools testedJan 23, 2013
Back in 1962, the threat of a third world war loomed for 13 days, but what happened during the Cuban missile crisis and when? What was the timing of events for the first moon landing? Four timeline tools present complex topics of world history and current affairs in clear context.more »
ngrep: Network Grep Network grepJan 23, 2013
Ngrep is a pattern-matching tool that sorts the wheat from the chaff and doubles as a lightweight packet sniffer.more »
Tune Your Hard Disk with hdparm Disk Inspector: Retrieving and setting hard drive parameters with hdparmDec 16, 2012
Hdparm is the tool to use when it comes to tuning your hard disk or DVD drive, but it can also measure read speed, deliver valuable information about the device, change important drive settings, and even erase SSDs securely.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.