LinuxToday.com
Getting started with the Geany text editor
Geany is a light and swift text editor with IDE features ideal for Linux users who enjoy a hackable and simple interface.
GNOME 3.32 Desktop Environment to Feature Fractional Scaling on Wayland
Support for HiDPI monitors was available in GNOME for a while now, but it's limited to scaling windows by integral factors
Linux bash exit status and how to set exit status in bash
Nixcraft: Can you explain bash exit status code?
ClusterShell - A Nifty Tool To Run Commands On Cluster Nodes In Parallel
2DayGeek: ClusterShell allow users to run the command on multiple cluster nodes and remote systems in parallel.
How to Encrypt Files with Gocryptfs
MakeTechEasier: Gocryptfs is an encrypted overlay filesystem and encrypts files individually using chunked AES-GCM.
How to Enable and Disable Root User Account in Ubuntu
Linuxize: In Ubuntu Linux, the root user account is disabled by default for security reasons.
3 popular programming languages you can learn with Raspberry Pi
Become more valuable on the job market by learning to program with the Raspberry Pi.
Protection Poker: An agile game for mitigating risk
This game builds risk mitigation into your workflow before iteration planning to decrease security threats.
VMware Linux lawsuit moves closer to a resolution
ZDnet: For over a decade, VMware has been accused of illegally using Linux code in its VMware ESX bare-metal virtual machine hypervisor.
Rename - A Command Line Tool For Renaming Multiple Files in Linux
Linux comes with a very powerful built-in tool called rename.
Using the Linux column command
In this tutorial we take a look at the little known column command
How to Transfer Files Between Linux and Windows via LAN
MakeTechEasier: For sharing files between different operating systems, it can easily be done with Network Share.
How to Change the Keyboard Layout in Linux
Linux offers plenty of options to make your PC your own.
Ping Command in Linux with Examples
PING stands for Packet INternet Grouper mostly used for checking connectivity between two network nodes.
10 Vendors Making Product Announcements at RSA Conference 2019
eSecurityPlanet: Here are 10 vendors with interesting product announcements at the 2019 RSA Conference, spanning email security, container security, threat detection, SIEM, EDR and cloud security.
How Superforecasting Can Help Improve Cyber-Security Risk Assessment
eWEEK: Understanding and evaluating risk is always a hot top for security professionals.
How rootless Buildah works: Building containers in unprivileged environments
Buildah is a tool and library for building Open Container Initiative (OCI) container images.
What you need to know about Ansible modules
Learn how and when to develop custom modules for Ansible.
A Linux user review of the Darter Pro laptop from System76
In spite of its light weight, the Darter Pro stacks up well against other powerful laptops.
Screwdriver: A scalable build platform for continuous delivery
Open source build platform emerged from Yahoo's search to find a CI/CD platform to meet its growing developer requirements.