Charly's Column The sys admin's daily grind: NloadMay 01, 2008
Network monitors are a dime a dozen, but Nload, which separates incoming and outgoing traffic and draws graphs on the console without X, is unique.more »
Command Line: SSH SSH, SCP, and SFTPMay 01, 2008
SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.more »
Linux consultant Matthias Kettner has just released Version 1.0 of his Waitmax Software. It gives programs a specified time to complete after terminating them.more »
Moving from version 7.7 to 8.1 gives users of the hard disk tool new options and new information displays.more »
ImageMagick Image processing on the consoleJan 28, 2008
GIMP isn’t the only option for photo manipulation. ImageMagick, a collection of command-line programs for image processing, can help you process multiple images in one go.more »
Version 1.3 of dwdiff, a free front-end for the Unix diff program has just been released and is now licensed under the GPLv3.more »
Command-Line Tools Sound, Video, and News at the Command LineDec 18, 2007
Learn more about Linux text-based multimedia utilities for playing streams, editing images, and reading CDs or DVDs from the command-line.more »
Livecd-creator Building a custom live CD with Fedora’s livecd-creatorOct 31, 2007
Fedora 7 comes with new tools for creating custom live CDs and custom .iso files. We’ll show you how to get started with Fedora's new command-line tool, livecd-creator.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.