SHC Shell Compiler WrappedMar 25, 2014
The Bash Shell Script Compiler converts shell scripts directly into binaries. Compiling your scripts provides protection against accidental changes, but you will have to contend with some quirks.more »
Byobu Byobu, a session manager for the command lineJun 21, 2012
The Byobu session manager extends the shell, adding a range of useful functions, such as splitting the screen, running programs in the background, or organizing programs in tabs. In particular, administrators who rely on SSH will appreciate Byobu.more »
Bash offers any number of simplifications, especially when it comes to pesky individual steps in installation routines for larger software packages. Some caution is advisable, though, if you need to handle database and application passwords, which can easily be compromised.more »
Steer around errors and save yourself some typing by adding autocompletion to your Bash scripts.more »
A complete introduction to the shell for novices and masters alike.more »
Qemu and the Kernel DebuggerFeb 23, 2012
Debugging the kernel of a running operating system has always been tricky, but now the Qemu emulator supports cross-platform kernel and module debugging at the programming language level.more »
Better Bash Shell scripts from hell: ShebangJan 30, 2012
In the beginning was the double pound sign and the exclamation mark – or at least shell scripts always start this way. The inventor, Dennis Ritchie, really didn’t know how much pain this was going to cause users.more »
The sys admin’s daily grind Calendar-related crontab issuesMay 31, 2011
This month, Charly considers Jacobin rule, Napoleon Bonaparte’s neoconservatism, Jewish and Islamic tradition, and a cronjob that nearly worked.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm