Command Line: Wodim Burning with wodimJun 21, 2012
Wodim works behind the scenes in popular CD/ DVD-burning software, but it’s even more powerful at the command line.more »
Fabric Python Library Stitching together a crazy sys admin world with PythonJun 21, 2012
The Fabric Python library makes it extremely easy to create repeatable scripts of commands over SSH to any number of servers.more »
Command Line: Vim Outliner Vim Outliner orders your thoughtsMay 29, 2012
If you need to outline an essay, make a list, or write something highly structured like a CSS file for a website, then look no further than the command line, especially if you’re already comfortable with the Vim text editor.more »
PHP-CLI PHP for the command lineMay 29, 2012
PHP is not just for websites. Command-line PHP scripting has been around for more than 10 years, which makes the language and its comprehensive libraries eminently suitable for the toolbox of any administrator who manages web servers.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
Steer around errors and save yourself some typing by adding autocompletion to your Bash scripts.more »
A complete introduction to the shell for novices and masters alike.more »
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.