Zenity and KDialog Adding graphic elements to your scripts with Zenity and KDialogJan 31, 2009
Zenity and KDialog let you integrate your scripts with the native KDE or Gnome environment.more »
Hotwire Interactive Shell Graphical shellsNov 05, 2008
The Hotwire shell removes the complexities of interactive consoles. We’ll show you how to Hotwire your Linux with this handy text and graphical shell for developers and administrators.more »
Command Line: Text Editors Editors for the shellJul 03, 2008
More is not always better, especially at the command line. Lean text editors such as nano, JOE, and ee fit Linux novices and experts alike.more »
Command Line: Environmental Variables Make your self at homeJul 02, 2008
Environmental variables give users the ability to set up the command line to suit their own needs.more »
Command Line: Data Flow Redirecting input and outputJul 01, 2008
Working in the shell has many benefits. Pipelines, redirectors, and chains of commands give users almost infinite options.more »
Command Line: Bash Prompt Configuring the Bash promptJun 20, 2008
Color-coding your prompt may help avoid configuration errors and data loss. We’ll show you how to design your own custom shell prompt with color and control sequences.more »
Bluetooth with GPRS Using your mobile phone as a wireless modemJun 09, 2008
If your mobile phone contract includes GPRS mobile Internet service,
you can use a Bluetooth phone as a wireless modem for your Linux
Load Average Understanding load averages and stretch factorsOct 26, 2007
What is the real meaning of those little “load average” values in the output of shell commands like procinfo and uptime, and what can you do with these numbers?more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm