PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
File Management Learning file management commandsFeb 28, 2011
We give you an overview of commands for moving, editing, compressing, and generally manipulating files.more »
Shell scripts are now bourne-compatiblemore »
Bash Builtins Moving beyond basic BashDec 21, 2009
Even beginners can benefit from a greater understanding of the Bash shell’s many builtin commands.more »
Introducing Bash Working at the command lineDec 03, 2009
Beyond all the splash screens, screen savers, and vivid rock-star wallpaper is the simple yet powerful Bash shell.more »
Command Line: Customizing Bash Take control of the command lineJul 01, 2009
Ease into your comfort zone with these tips for customizing Bash.more »
Tech Tools We thought you might be interested in the following new products and updatesMay 26, 2009
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job.more »
With version 1.0, log4bash makes its first appearance in providing logging functions for shell scripts.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.