Command Line: Vim Search Commands Search and search-and-replace in VimDec 19, 2012
We show you how to build on the basic functionality of Vim by introducing some useful search commands.more »
Charly's Column: Di The sys admin’s daily grind – DiDec 19, 2012
The more frequently a command is used, the fewer letters it should have, so the use of twokey commands like ls, mv, and df is second nature. We look at a previously little-known representative of this club, di.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashDec 04, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
Command Line: File Management Advanced file managementNov 26, 2012
Once you’ve mastered the everyday commands for manipulating files, you might want to do more. We show you some powerful commands for advanced file management.more »
Command Line – Killing Processes Shutting down applications and systemsOct 26, 2012
Linux offers a variety of tools for shutting down systems and processes. We describe some important commands.more »
Command Line: Mounting Devices Readying devices for useSep 21, 2012
We show you how to add devices to and remove them from your system while keeping it stable and secure.more »
Charly's Column: GeoIP Lookup The sys admin’s daily grind – GeoIP lookupAug 23, 2012
The global village is big enough to want to find out where your friend and enemies have set up camp. Charly offers a quick IP-based introduction to geography.more »
Command Line: More Secure Passwords Improving account passwordsJul 24, 2012
Even with encrypted drives, account passwords remain one of the prime security methods for any Linux system. With a little knowledge of the available commands and their options, you can make your account passwords more secure.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.