SHC Shell Compiler WrappedMar 25, 2014
The Bash Shell Script Compiler converts shell scripts directly into binaries. Compiling your scripts provides protection against accidental changes, but you will have to contend with some quirks.more »
Data Rescue LifebuoyFeb 24, 2014
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.more »
Trick Attackers with Portspoof FlytrapFeb 24, 2014
The Internet is a tough place to live – especially for publicly accessible computers. A small tool called Portspoof makes port scanning a real challenge for attackers.more »
Cloud Backup with Duplicity Data SafeNov 04, 2013
If you’re looking for a secure and portable backup technique, try combining the trusty command-line utility Duplicity with an available cloud account.more »
Recovering Deleted Files with Scalpel Scalpel File CarverSep 23, 2013
The Scalpel file carver helps users restore what they thought were lost files.more »
Reimagining the Virtual Desktop Final TermJul 30, 2013
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.more »
Command Line – Alien Converting packages with AlienJul 02, 2013
The Alien package conversion tool can be very effective but can also generate unpredictable results. We show how to get the most out of this tool.more »
Command Line: Logging Tools User commands and logsMay 31, 2013
Many logging and user-related commands can help you check on your system and keep track of security matters. We guide you through several helpful tools.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.