The first step towards improving a system's security, is discovering the status quo. Lynis, a small command line program helps users do so.more »
ntfsprogs Exploring the ntfsprogs toolsetJul 15, 2008
The ntfsprogs toolset lets you manage NTFS resources from the Linux command line.more »
Command Line: Diffutils The Diffutils tool collectionJul 11, 2008
The Diffutils tool set helps you compare text files, discover and display the differences between files, and even automatically synchronize files.more »
Command Line: make Handling of complex tasks with makeJul 11, 2008
Developers, LaTeX users, and system administrators can all harness the power of make.more »
Command Line: FTP and NcFTP FTP and NcFTPJul 10, 2008
FTP and NcFTP are both FTP clients for the command line. While FTP only has basic file transfer functionality, NcFTP has a whole bunch of additional features.more »
Command Line: File Management Data management in the ShellJul 09, 2008
Do some serious spring cleaning and reorganize your data. The right commands can help you to keep on top of your file and directory management.more »
Command Line: Access Control chmod, chgrp, and chownJul 07, 2008
A sophisticated system of users and permissions precisely controls who has access to what on Linux. At the command line, you can define ownership with the chmod, chgrp, and chown tools.more »
Command Line: Mailx Mail at the command lineMay 31, 2008
The simple mailx command-line mail client handles mail either interactively or via command-line options. Although it lacks the convenience of a GUI-based tool, mailx compares well in scripting.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm