Command Line: dd and mkisofs Creating ISO images with dd and mkisofsJul 31, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
Command Line: mount & fstab Media access with mount and fstabJun 30, 2006
This month we look at tools for mounting and unmounting storage media.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncMay 31, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Command Line: Processes Monitoring and terminating processes at the command lineApr 30, 2006
Innumerable processes may be running on your Linux system. We’ll show you how to halt, continue, or kill tasks, and we’ll examine how to send the remnants of crashed programs to the happy hunting grounds.more »
Command Line: at and cron Cron, atMar 31, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
Command Line: File Viewers Viewing files with cat, more, less, head, and tailFeb 28, 2006
Practical tools such as cat, less, and head are convenient for viewing text.more »
Desktopia: Wmii A look at the Wmii Window ManagerFeb 28, 2006
If you’d rather rule the desktop from your keyboard, try the powerful Wmii window manager.more »
KTools: Klik Software distribution with KlikFeb 28, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.