Command Line: Vim Search Commands Search and search-and-replace in VimDec 19, 2012
We show you how to build on the basic functionality of Vim by introducing some useful search commands.more »
Charly's Column: Di The sys admin’s daily grind – DiDec 19, 2012
The more frequently a command is used, the fewer letters it should have, so the use of twokey commands like ls, mv, and df is second nature. We look at a previously little-known representative of this club, di.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashDec 04, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
Command Line: File Management Advanced file managementNov 26, 2012
Once you’ve mastered the everyday commands for manipulating files, you might want to do more. We show you some powerful commands for advanced file management.more »
Command Line – Killing Processes Shutting down applications and systemsOct 26, 2012
Linux offers a variety of tools for shutting down systems and processes. We describe some important commands.more »
Command Line: Mounting Devices Readying devices for useSep 21, 2012
We show you how to add devices to and remove them from your system while keeping it stable and secure.more »
Charly's Column: GeoIP Lookup The sys admin’s daily grind – GeoIP lookupAug 23, 2012
The global village is big enough to want to find out where your friend and enemies have set up camp. Charly offers a quick IP-based introduction to geography.more »
Command Line: More Secure Passwords Improving account passwordsJul 24, 2012
Even with encrypted drives, account passwords remain one of the prime security methods for any Linux system. With a little knowledge of the available commands and their options, you can make your account passwords more secure.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.