Zenity and KDialog Adding graphic elements to your scripts with Zenity and KDialogFeb 01, 2009
Zenity and KDialog let you integrate your scripts with the native KDE or Gnome environment.more »
Hotwire Interactive Shell Graphical shellsNov 05, 2008
The Hotwire shell removes the complexities of interactive consoles. We’ll show you how to Hotwire your Linux with this handy text and graphical shell for developers and administrators.more »
Command Line: Text Editors Editors for the shellJul 03, 2008
More is not always better, especially at the command line. Lean text editors such as nano, JOE, and ee fit Linux novices and experts alike.more »
Command Line: Environmental Variables Make your self at homeJul 02, 2008
Environmental variables give users the ability to set up the command line to suit their own needs.more »
Command Line: Data Flow Redirecting input and outputJul 01, 2008
Working in the shell has many benefits. Pipelines, redirectors, and chains of commands give users almost infinite options.more »
Command Line: Bash Prompt Configuring the Bash promptJun 20, 2008
Color-coding your prompt may help avoid configuration errors and data loss. We’ll show you how to design your own custom shell prompt with color and control sequences.more »
Bluetooth with GPRS Using your mobile phone as a wireless modemJun 09, 2008
If your mobile phone contract includes GPRS mobile Internet service,
you can use a Bluetooth phone as a wireless modem for your Linux
Load Average Understanding load averages and stretch factorsOct 26, 2007
What is the real meaning of those little “load average” values in the output of shell commands like procinfo and uptime, and what can you do with these numbers?more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.