Language Selection

English French German Italian Portuguese Spanish

Book Review: The Linux Command Line

Filed under
Linux

Mastery of the shell is what separates boys from men, in the memorable words of The Olde Unix Greybeard. This machudo test of computing proficiency has indeed stood the test of time – a kind of cultural hazing ritual for those who are in the know, as opposed to the namby-pamby who require a graphic interface with options spelled out for every possible task. As one who was struck early by the beauty and versatility of the Unix Shell, I cannot but be pleased by the recent proliferation of books on the subject, popularizing what was often seen as a subject hard to approach and difficult to master. It does certainly pacify my inner drill sergeant!

The Linux Command Line, By William E. Shotts Jr. (No Starch Press, US$ 39.95), is the most recent entry in a veritable pantheon of books dedicated to the subject of using and scripting the *nix shell interface, and to its credit, it is probably the most approachable tome on the subject that is still willing to cover all of its breadth and depth.

rest here




More in Tux Machines

Leftovers: KDE/Qt

Leftovers: OSS

Security Leftovers

  • DNS server attacks begin using BIND software flaw
    Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses. Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.
  • Researchers Create First Firmware Worm That Attacks Macs
    The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. Two researchers have found that several known vulnerabilities affecting the firmware of all the top PC makers can also hit the firmware of MACs. What’s more, the researchers have designed a proof-of-concept worm for the first time that would allow a firmware attack to spread automatically from MacBook to MacBook, without the need for them to be networked.

Brocade CEO: Transition To Open Source Will Be Difficult For Cisco

Communications CEO Lloyd Carney said traditional vendors like Cisco will have a tough time adapting to a more software-defined, open source space. That's because traditional vendors like Cisco's revenue streams are tied to closed architectures, Carney said. Read more