Command Line: dd and mkisofs Creating ISO images with dd and mkisofsJul 31, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
Command Line: mount & fstab Media access with mount and fstabJun 30, 2006
This month we look at tools for mounting and unmounting storage media.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncMay 31, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Command Line: Processes Monitoring and terminating processes at the command lineApr 30, 2006
Innumerable processes may be running on your Linux system. We’ll show you how to halt, continue, or kill tasks, and we’ll examine how to send the remnants of crashed programs to the happy hunting grounds.more »
Command Line: at and cron Cron, atMar 31, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
Command Line: File Viewers Viewing files with cat, more, less, head, and tailFeb 28, 2006
Practical tools such as cat, less, and head are convenient for viewing text.more »
Desktopia: Wmii A look at the Wmii Window ManagerFeb 28, 2006
If you’d rather rule the desktop from your keyboard, try the powerful Wmii window manager.more »
KTools: Klik Software distribution with KlikFeb 28, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm