The first step towards improving a system's security, is discovering the status quo. Lynis, a small command line program helps users do so.more »
ntfsprogs Exploring the ntfsprogs toolsetJul 15, 2008
The ntfsprogs toolset lets you manage NTFS resources from the Linux command line.more »
Command Line: Diffutils The Diffutils tool collectionJul 11, 2008
The Diffutils tool set helps you compare text files, discover and display the differences between files, and even automatically synchronize files.more »
Command Line: make Handling of complex tasks with makeJul 11, 2008
Developers, LaTeX users, and system administrators can all harness the power of make.more »
Command Line: FTP and NcFTP FTP and NcFTPJul 10, 2008
FTP and NcFTP are both FTP clients for the command line. While FTP only has basic file transfer functionality, NcFTP has a whole bunch of additional features.more »
Command Line: File Management Data management in the ShellJul 09, 2008
Do some serious spring cleaning and reorganize your data. The right commands can help you to keep on top of your file and directory management.more »
Command Line: Access Control chmod, chgrp, and chownJul 07, 2008
A sophisticated system of users and permissions precisely controls who has access to what on Linux. At the command line, you can define ownership with the chmod, chgrp, and chown tools.more »
Command Line: Mailx Mail at the command lineJun 01, 2008
The simple mailx command-line mail client handles mail either interactively or via command-line options. Although it lacks the convenience of a GUI-based tool, mailx compares well in scripting.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.