Command Line: CD Images mkisofs, mount, md5sumMay 31, 2005
Before you burn a data CD in Linux, you need an ISO image – mkisofs
helps you create an Iso image. To save disks, you might like to check
the image before you burn it with md5sum.more »
Command Line: Browsers Command-line browsers Lynx, Links, and w3mApr 30, 2005
If you’re working at the command line and you need to reach the
Internet, or if you just want to convert an HTML file into neatly formatted
ASCII text, try a text-based web browser.more »
Command Line: tr & dos2unix Using tr and dos2unixMar 31, 2005
The tr tool is a real wizard. This simple command lets you replace strings in text files. Whether you are replacing letters or just removing whitespace, you will be amazed at tr‘s versatility.more »
Command Line: sort Organizing Lists with the sort CommandFeb 28, 2005
sort helps you organize file lists and program
output. And if you like, you can even use this small
but powerful tool to merge and sort multiple files.more »
Command Line Creating Manpages with groffJan 31, 2005
Do have difficulty remembering
command syntax? It often pays to
check the manpage. In this issue of
Command Line,we look at how to
create your own manpages,and
how to convert manpages to other
Command Line Converting Audio FormatsDec 31, 2004
The command line swings. In this
issue of “Command Line”we investigate
how you can grab tracks from
audio CDs and convert sound files to
other formats. No matter whether
you choose wav,MP3 or Ogg Vorbis,
you can rely on the shell to convert
your files.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.