Irssi Text-based chat with IrssiFeb 28, 2006
The Irssi console chat utility is powerful yet frugal with resources. And Irssi’s scripting features make it a giant among chat tools.more »
Bash Tuning Script tuning in BashFeb 28, 2006
In the old days, shells were capable of little more than calling external programs and executing basic, internal commands. With all the bells and whistles in the latest versions of Bash, however, you hardly need the support of external tools.more »
Scripting Secrets Intro New tools and techniques for scripting in LinuxFeb 28, 2006
Even the experts know there is always more to learn about scripting. In this month's cover story, we'll show you the Google Maps API, a networking framework for Python, and some other fine tools.more »
Command Line: Ispell and Aspell The Ispell and Aspell command line spellcheckersJan 31, 2006
Nobody is safe from typos and jumbled up words. Spellcheckers like Ispell and Aspell keep the letters in the right places.more »
Fortune Fortune cookies for LinuxJan 31, 2006
Fortune brings you a saying or a joke when you launch a terminal
session. Or you can attach a fortune to your email signature to
brighten up your messges.more »
Command Line: Wget FTP Downloads and website mirroring with WgetDec 31, 2005
Wget downloads files and even whole websites from the command line.more »
Command Line: gzip, bzip2, tar gzip, bzip2 and tarNov 30, 2005
A short command is all it takes to pack your data or extract it from an archive.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm