SHC Shell Compiler WrappedMar 25, 2014
The Bash Shell Script Compiler converts shell scripts directly into binaries. Compiling your scripts provides protection against accidental changes, but you will have to contend with some quirks.more »
Data Rescue LifebuoyFeb 24, 2014
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.more »
Trick Attackers with Portspoof FlytrapFeb 24, 2014
The Internet is a tough place to live – especially for publicly accessible computers. A small tool called Portspoof makes port scanning a real challenge for attackers.more »
Cloud Backup with Duplicity Data SafeNov 04, 2013
If you’re looking for a secure and portable backup technique, try combining the trusty command-line utility Duplicity with an available cloud account.more »
Recovering Deleted Files with Scalpel Scalpel File CarverSep 23, 2013
The Scalpel file carver helps users restore what they thought were lost files.more »
Reimagining the Virtual Desktop Final TermJul 30, 2013
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.more »
Command Line – Alien Converting packages with AlienJul 02, 2013
The Alien package conversion tool can be very effective but can also generate unpredictable results. We show how to get the most out of this tool.more »
Command Line: Logging Tools User commands and logsMay 31, 2013
Many logging and user-related commands can help you check on your system and keep track of security matters. We guide you through several helpful tools.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems