Shell accounts give access to a remote system via a shell, like early internet users in the '90s. A shell account offers a ...
Welcome to old-style Internet access -- souped up for your surfing pleasure! In this chapter I take you on a fast flight through the few Macintosh programs that can work over a Unix command-line ...
Ever wondered why programming in Bash is so difficult? Bash employs the same constructs as traditional programming languages; however, under the hood, the logic is rather different. The Bourne-Again ...
I know "encrypt" isn't the right description here. It's more like trying to "obfuscate" or "scramble" a password in a plaintext shell script. Say you have a UNIX shell script that does FTP to Windows ...
Attaching a remote drive or directory on a Windows box is called “drive mapping” though the process is essentially the same as what we call mounting in the Unix world. While I rarely spend any ...
One particular frustration with the UNIX shell is the inability to easily schedule multiple, concurrent tasks that fully utilize CPU cores presented on modern systems. The example of focus in this ...
The good news is that there's a fast, highly customizable, and easy-to-use shell on Windows that'll let you experience your terminal in all its 24-bit color glory. And if you use the Windows command ...
This week you may have heard about something called Shellshock. It’s a vulnerability in something else called Bash. Oh, and Bash is a Unix shell. And the Shellshock vulnerability may be larger than ...
A critical remote code execution vulnerability in Bash, present in almost all Linux, UNIX and Mac OS X deployments, has been discovered. Experts advise immediate patching. A critical vulnerability in ...
UPDATE, 9/25: The Bash vulnerability, now dubbed by some as "Shellshock," has been reportedly found in use by an active exploit against Web servers. Additionally, the initial patch for the ...