Charly's Column The sys admin's daily grind: NloadApr 30, 2008
Network monitors are a dime a dozen, but Nload, which separates incoming and outgoing traffic and draws graphs on the console without X, is unique.more »
Command Line: SSH SSH, SCP, and SFTPApr 30, 2008
SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.more »
Linux consultant Matthias Kettner has just released Version 1.0 of his Waitmax Software. It gives programs a specified time to complete after terminating them.more »
Moving from version 7.7 to 8.1 gives users of the hard disk tool new options and new information displays.more »
ImageMagick Image processing on the consoleJan 28, 2008
GIMP isn’t the only option for photo manipulation. ImageMagick, a collection of command-line programs for image processing, can help you process multiple images in one go.more »
Version 1.3 of dwdiff, a free front-end for the Unix diff program has just been released and is now licensed under the GPLv3.more »
Command-Line Tools Sound, Video, and News at the Command LineDec 18, 2007
Learn more about Linux text-based multimedia utilities for playing streams, editing images, and reading CDs or DVDs from the command-line.more »
Livecd-creator Building a custom live CD with Fedora’s livecd-creatorOct 31, 2007
Fedora 7 comes with new tools for creating custom live CDs and custom .iso files. We’ll show you how to get started with Fedora's new command-line tool, livecd-creator.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm