Ctags generate index (tag) files of the names in header and source files, which speeds up source code navigation in your favorite text editor. Juliet Kemp introduces exuberant-ctags in Vim and Emacs.
Tips Section Index
A little color makes the Linux command line easier to read. Juliet Kemp shows how easy it is to add a little color to your command shell.
Juliet Kemp is a Mutt (powerful text email client) user, even in these modern times, and shows us how to use old-school Mutt + SSH for security on the newfangled Android G1.
Multitail improves on the well-known and useful program tail, adding colors and multiple-file monitoring. Juliet Kemp offers some great tips on using this excellent file-monitoring utility.
Today's Tip from Juliet Kemp shows us how to run multiple remote sessions from the Linux console using GNU screen without needing to run an x terminal, and how to attach to an existing session on a remote computer for remote helpdesk chores.
In this tip, Juliet Kemp shows how to use xclip for copy-and-paste on the Linux command line-- without using the mouse.
Vim is one of the most powerful text editors on any platform, and is full of time-saving shortcuts. Juliet Kemp shows us how to use Vim's map and abbreviation features to insert commonly-used words and phrases with a few keystrokes.
Vim has native Unicode support, and Juliet Kemp shows us several different ways to enable it.
Modern mobile phones and PDAs have increasingly sophisticated data/internet connectivity. The globe-trotting Juliet Kemp gives us some good tips on how they can liberate us from the server room, and allow us to roam freely.
Linux has a lot of great tools for recovering deleted files, including filesystem commands that aren't specifically designed for recovery, but can do it anyway. Juliet Kemp shows us how the lsof command can be used to recover deleted files.
Juliet Kemp introduces us to TrueCrypt, an excellent, easy-to-use encryption tool for Linux, Mac OS X, and Windows. Using TrueCrypt will instantly make you smarter than all the big government agencies and companies who compromise terabytes of data when their unencrypted laptops and backup media are stolen.
"Whoever has physical access to the machine owns it" is an old and true Unix saying. Still, there are some steps you can take to add extra security to your Linux box, such as password-protecting the boot process. Juliet Kemp shows how.
Without encryption protecting your email messages, you might as well be sending postcards because anyone can intercept and read them. Juliet Kemp tells how to protect your email privacy with GPG and Thunderbird.
One download can upgrade your entire Debian network; Juliet Kemp shows us how to save time and bandwidth by using approx to cache and serve updates locally.
Sometimes you may want to know which process is accessing a particular file or filesystem -- for example, if you get a "device is busy" error message.
- 1Linux Top 3: Fedora 24, Peppermint 7 and Solus 1.2
- 2Linux Top 3: Alpine Linux 3.4, deepin 15.2 and Linux Lite 3.0
- 3Linux 4.7 Set to Boost Live Patching, Security and Power Management
- 4Linux 4.6 Charred Weasel adds USB 3.1 Support
- 5Linux Top 3: OpenIndiana 2016.04, Ubuntu 16.04 and Debian's New Leader