Command Line: Vim Search Commands Search and search-and-replace in VimDec 19, 2012
We show you how to build on the basic functionality of Vim by introducing some useful search commands.more »
Charly's Column: Di The sys admin’s daily grind – DiDec 19, 2012
The more frequently a command is used, the fewer letters it should have, so the use of twokey commands like ls, mv, and df is second nature. We look at a previously little-known representative of this club, di.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashDec 04, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
Command Line: File Management Advanced file managementNov 26, 2012
Once you’ve mastered the everyday commands for manipulating files, you might want to do more. We show you some powerful commands for advanced file management.more »
Command Line – Killing Processes Shutting down applications and systemsOct 26, 2012
Linux offers a variety of tools for shutting down systems and processes. We describe some important commands.more »
Command Line: Mounting Devices Readying devices for useSep 21, 2012
We show you how to add devices to and remove them from your system while keeping it stable and secure.more »
Charly's Column: GeoIP Lookup The sys admin’s daily grind – GeoIP lookupAug 23, 2012
The global village is big enough to want to find out where your friend and enemies have set up camp. Charly offers a quick IP-based introduction to geography.more »
Command Line: More Secure Passwords Improving account passwordsJul 24, 2012
Even with encrypted drives, account passwords remain one of the prime security methods for any Linux system. With a little knowledge of the available commands and their options, you can make your account passwords more secure.more »
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.