The first step towards improving a system's security, is discovering the status quo. Lynis, a small command line program helps users do so.more »
ntfsprogs Exploring the ntfsprogs toolsetJul 15, 2008
The ntfsprogs toolset lets you manage NTFS resources from the Linux command line.more »
Command Line: Diffutils The Diffutils tool collectionJul 11, 2008
The Diffutils tool set helps you compare text files, discover and display the differences between files, and even automatically synchronize files.more »
Command Line: make Handling of complex tasks with makeJul 11, 2008
Developers, LaTeX users, and system administrators can all harness the power of make.more »
Command Line: FTP and NcFTP FTP and NcFTPJul 10, 2008
FTP and NcFTP are both FTP clients for the command line. While FTP only has basic file transfer functionality, NcFTP has a whole bunch of additional features.more »
Command Line: File Management Data management in the ShellJul 09, 2008
Do some serious spring cleaning and reorganize your data. The right commands can help you to keep on top of your file and directory management.more »
Command Line: Access Control chmod, chgrp, and chownJul 07, 2008
A sophisticated system of users and permissions precisely controls who has access to what on Linux. At the command line, you can define ownership with the chmod, chgrp, and chown tools.more »
Command Line: Mailx Mail at the command lineMay 31, 2008
The simple mailx command-line mail client handles mail either interactively or via command-line options. Although it lacks the convenience of a GUI-based tool, mailx compares well in scripting.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.