SHC Shell Compiler WrappedMar 25, 2014
The Bash Shell Script Compiler converts shell scripts directly into binaries. Compiling your scripts provides protection against accidental changes, but you will have to contend with some quirks.more »
Data Rescue LifebuoyFeb 24, 2014
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.more »
Trick Attackers with Portspoof FlytrapFeb 24, 2014
The Internet is a tough place to live – especially for publicly accessible computers. A small tool called Portspoof makes port scanning a real challenge for attackers.more »
Cloud Backup with Duplicity Data SafeNov 04, 2013
If you’re looking for a secure and portable backup technique, try combining the trusty command-line utility Duplicity with an available cloud account.more »
Recovering Deleted Files with Scalpel Scalpel File CarverSep 23, 2013
The Scalpel file carver helps users restore what they thought were lost files.more »
Reimagining the Virtual Desktop Final TermJul 30, 2013
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.more »
Command Line – Alien Converting packages with AlienJul 02, 2013
The Alien package conversion tool can be very effective but can also generate unpredictable results. We show how to get the most out of this tool.more »
Command Line: Logging Tools User commands and logsMay 31, 2013
Many logging and user-related commands can help you check on your system and keep track of security matters. We guide you through several helpful tools.more »
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?