PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
File Management Learning file management commandsFeb 28, 2011
We give you an overview of commands for moving, editing, compressing, and generally manipulating files.more »
Shell scripts are now bourne-compatiblemore »
Bash Builtins Moving beyond basic BashDec 21, 2009
Even beginners can benefit from a greater understanding of the Bash shell’s many builtin commands.more »
Introducing Bash Working at the command lineDec 03, 2009
Beyond all the splash screens, screen savers, and vivid rock-star wallpaper is the simple yet powerful Bash shell.more »
Command Line: Customizing Bash Take control of the command lineJul 01, 2009
Ease into your comfort zone with these tips for customizing Bash.more »
Tech Tools We thought you might be interested in the following new products and updatesMay 26, 2009
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job.more »
With version 1.0, log4bash makes its first appearance in providing logging functions for shell scripts.more »
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.