Command Line: dd and mkisofs Creating ISO images with dd and mkisofsAug 01, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
Command Line: mount & fstab Media access with mount and fstabJul 01, 2006
This month we look at tools for mounting and unmounting storage media.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncJun 01, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Command Line: Processes Monitoring and terminating processes at the command lineMay 01, 2006
Innumerable processes may be running on your Linux system. We’ll show you how to halt, continue, or kill tasks, and we’ll examine how to send the remnants of crashed programs to the happy hunting grounds.more »
Command Line: at and cron Cron, atApr 01, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
Command Line: File Viewers Viewing files with cat, more, less, head, and tailMar 01, 2006
Practical tools such as cat, less, and head are convenient for viewing text.more »
Desktopia: Wmii A look at the Wmii Window ManagerMar 01, 2006
If you’d rather rule the desktop from your keyboard, try the powerful Wmii window manager.more »
KTools: Klik Software distribution with KlikMar 01, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.