Charly's Column The sys admin's daily grind: NloadApr 30, 2008
Network monitors are a dime a dozen, but Nload, which separates incoming and outgoing traffic and draws graphs on the console without X, is unique.more »
Command Line: SSH SSH, SCP, and SFTPApr 30, 2008
SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.more »
Linux consultant Matthias Kettner has just released Version 1.0 of his Waitmax Software. It gives programs a specified time to complete after terminating them.more »
Moving from version 7.7 to 8.1 gives users of the hard disk tool new options and new information displays.more »
ImageMagick Image processing on the consoleJan 28, 2008
GIMP isn’t the only option for photo manipulation. ImageMagick, a collection of command-line programs for image processing, can help you process multiple images in one go.more »
Version 1.3 of dwdiff, a free front-end for the Unix diff program has just been released and is now licensed under the GPLv3.more »
Command-Line Tools Sound, Video, and News at the Command LineDec 18, 2007
Learn more about Linux text-based multimedia utilities for playing streams, editing images, and reading CDs or DVDs from the command-line.more »
Livecd-creator Building a custom live CD with Fedora’s livecd-creatorOct 31, 2007
Fedora 7 comes with new tools for creating custom live CDs and custom .iso files. We’ll show you how to get started with Fedora's new command-line tool, livecd-creator.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.