You can always browse the Bash history using your arrow keys, but Bash's search capabilities are very limited. Enter the clever Bash History Suggest Box.
The recent revelations about NSA spying have sparked renewed interest in data encryption. Encrypting at the file level is quick and easy, but if you're looking for an extra dose of protection, try encrypting the whole block device.
Innovative project offers cloud storage with the "Principle of Least Authority."
Tripwire is a powerful tool that protects your systems against unwanted changes.
Community managers, professional marketers, and active social media users want to know the effect their messages have on followers. ThinkUp can help.
Knoppix 7.3 comprises the current state of Debian GNU/Linux development and comes with the current hardware support of kernel 3.13, a new update function, and extended security and privacy features.
Giada is a small piece of musical software that can be used in many ways. Mainly designed for working with loops, Giada also can be used as a drum machine or be flexibly integrated into your workflow, thanks to VST and MIDI support.
OpenHatch teaches projects how to welcome recruits.
The Java-based TV-Browser software provides a wealth of features that help you organize your evening television viewing.
A laptop with no proprietary BIOS and 100 percent open source software may sound too good to be true, but that’s exactly what Gluglug delivers. Is it a good deal? Read on to find out.
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.