Command Line ANSI escape sequencesAug 24, 2007
This month, we’ll show you how to decorate your console and give it a fresh new look by adding color to the command line with ANSI escape sequences.more »
Command Line: Screen Managing virtual terminals with ScreenNov 30, 2006
Cast a spell upon your console. Instead of juggling multiple terminals, you can manage all your important command line programs in a single window.more »
Fish Shell The Fish shell simplifies the consoleNov 30, 2006
The Fish shell offers some user-friendly features for command line beginners.more »
Command Line: Vim Working with the VIM text editorOct 31, 2006
Vim feels at home with any Linux distribution. This text mode only editor, which completely does without a mouse, is a useful aid for command line fans.more »
Bashish Polishing the terminal window with BashishOct 31, 2006
Bashish adds a dash of style to the command line.more »
Workspace: Bracket Notation Implementing the bracket notation system in OpenOffice.orgOct 31, 2006
We’ll show you a universal system for marking changes in text documents; and along the way, you’ll get some practical experience with writing OpenOffice marcos.more »
Command Line: Network Diagnostic Tools Network diagnostic toolsSep 30, 2006
Linux has the right tools to track down network errors and open the way for data packets.more »
Command Line Bash tricksAug 31, 2006
A few basic tricks can liven up the command line and add a dash of color to your console.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.