Command Line: Wodim Burning with wodimJun 21, 2012
Wodim works behind the scenes in popular CD/ DVD-burning software, but it’s even more powerful at the command line.more »
Fabric Python Library Stitching together a crazy sys admin world with PythonJun 21, 2012
The Fabric Python library makes it extremely easy to create repeatable scripts of commands over SSH to any number of servers.more »
Command Line: Vim Outliner Vim Outliner orders your thoughtsMay 29, 2012
If you need to outline an essay, make a list, or write something highly structured like a CSS file for a website, then look no further than the command line, especially if you’re already comfortable with the Vim text editor.more »
PHP-CLI PHP for the command lineMay 29, 2012
PHP is not just for websites. Command-line PHP scripting has been around for more than 10 years, which makes the language and its comprehensive libraries eminently suitable for the toolbox of any administrator who manages web servers.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
Steer around errors and save yourself some typing by adding autocompletion to your Bash scripts.more »
A complete introduction to the shell for novices and masters alike.more »
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm