A complete introduction to the shell for novices and masters alike.
Debugging the kernel of a running operating system has always been tricky, but now the Qemu emulator supports cross-platform kernel and module debugging at the programming language level.
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.
Like it or not, DevOps is here to stay, and the demands of cloud and distributed computing are bringing a host of new tools to help coders and admins manage these ever-changing systems.
In the beginning was the double pound sign and the exclamation mark – or at least shell scripts always start this way. The inventor, Dennis Ritchie, really didn’t know how much pain this was going to cause users.
The Anonymous Hacktivist group has been in many headlines this past year. Who are they? What did they attack? How do they communicate?
Subscribe now: http://www.smart-developer.com/Subscribe
Don't miss free live streaming from the CeBIT Open Source Forum!
A user interface can be loosely defined as the point where a person interacts with a machine. Currently, that interaction point can be a laptop or a smart phone, quite different types of physical presentation space. A solution might look fantastic on a laptop, but not work on smart phone's browser, causing the user to have to scroll around on the page. What we need is a comprehensive collection of interface patterns to use as a guide. Designing Interfaces is that guide.
I'm amazed at all the technical people living here in Lawrence, Kansas, so I've decided to do a series of interviews to highlight what our small college town has to offer the international tech community. Recently I sat down with local author Stephen Figgins at a coffee shop to talk about what's new in the latest release of the popular Linux in a Nutshell book.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.