Tweet from the Command Line with Twidge
When it comes to graphical Twitter clients, you are spoiled for choice. But what if you want to use the popular micro-blogging service from the command line? Then you need Twidge, a command-line utility that supports both Twitter and Identi.ca.
Before you can use Twidge, you have to configure it using the twidge setup command. Enter your Twitter user name and password, and you are all set. Using Twidge couldn't be easier. To view the 20 most recent updates from the people you follow, use the twidge lsrecent -su command. The twidge update command allows you to post a tweet, for example:
twidge update "Status goes here."
If you want to send a direct message to a specific user, you can do so by using the twidge dmsend command as follows (replace username with the actual Twitter user):
twidge dmsend username "Message goes here."
Following or unfollowing a Twitter user using twidge is equally simple:
twidge follow username twidge unfollow username
By default, Twidge works with Twitter, but you can easily reconfigure it for use with Identi.ca. Open the .twidgerc configuration file stored in your home directory in a text editor and change the default urlbase URL to http://identi.ca/api, so it looks like this:
These commands are enough to get you started with Twidge, but it also has a few clever tricks up its sleeve. Make sure to check the How-to page in the Twidge wiki to learn a trick or two.comments powered by Disqus
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.