AboutWelcome to Free Software Daily (FSD). FSD is a hub for news and articles by and for the free and open source community. FSD is a community driven site where members of the community submit and vote for the stories that they think are important and interesting to them. Click the "About" link to read more...
Mozilla's Aza Raskin has demonstrated a phishing technique which exploits tabbed browsing by changing page contents while the user isn't looking at the tab
Recently consumer auction giant eBay announced that nearly 1,200 registered eBay users information was stolen via phishing attacks. That’s not shocking. What’s shocking is that it’s very likely the phishers were using rootkitted Linux boxes. They expected the attacks to come from Microsoft boxes. This time that’s not the case.
The Register reports today that eBay’s new chief information security officer (CISO) has noted a surprising trend (”eBay: Botnets are Linux-happy“). Specifically, in his previous employment as the CISO of Washington Mutual, evidence suggested that the majority of phishing attempts targeting the company originated on Linux systems.
There are several ways you can learn how to use the Linux command line. The way I took was the traditional one. I read the, ahem, fine manual, RTFM as we like to say, and I used the 'man' command a lot. That was well back before O'Reilly started publishing its great Unix and Linux technology books.
When you are using Linux command line frequently, using the history effectively can be a major productivity boost. In fact, once you have mastered the 15 examples that I’ve provided here, you’ll find using command line more enjoyable and fun.
A very quick command line tip today, for users of pretty much any Unix-based operating system, including Linux distributions. When you're looking up information on a certain web site or domain name, you might be used to using whois functions on websites such as to see who owns a domain.
Using UNIX® in a day-to-day office setting doesn't have to be clumsy. Learn some of the many ways, both simple and complex, to use the power of the UNIX shell and available system tools to greatly increase your productivity in the office.