Command Line: dd and mkisofs Creating ISO images with dd and mkisofsAug 01, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
Command Line: mount & fstab Media access with mount and fstabJul 01, 2006
This month we look at tools for mounting and unmounting storage media.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncJun 01, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Command Line: Processes Monitoring and terminating processes at the command lineMay 01, 2006
Innumerable processes may be running on your Linux system. We’ll show you how to halt, continue, or kill tasks, and we’ll examine how to send the remnants of crashed programs to the happy hunting grounds.more »
Command Line: at and cron Cron, atApr 01, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
Command Line: File Viewers Viewing files with cat, more, less, head, and tailMar 01, 2006
Practical tools such as cat, less, and head are convenient for viewing text.more »
Desktopia: Wmii A look at the Wmii Window ManagerMar 01, 2006
If you’d rather rule the desktop from your keyboard, try the powerful Wmii window manager.more »
KTools: Klik Software distribution with KlikMar 01, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.