Issue #134 · October 28, 2019

Creating a custom focus style

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain”

Best 7 links of week #43, 2019

Articles

A cartoon intro to DNS over HTTPS

A very friendly explanation about how DNS and HTTP work and how Trusted Recursive Resolver (TRR) and DNS over HTTPS (DoH) can help to make the web more secure!

How Bash completion works

Ever wondered how Bash completion works? In this first article on the topic, we’ll look at how it works under the hood.

Book of the week

Linux Pocket Guide: Essential Commands

Linux Pocket Guide: Essential Commands

by Daniel J. Barrett

If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. You’ll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash. Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers. Selected topics include:The filesystem and shell, File creation and editing, Text manipulation and pipelines, Backups and remote storage, Viewing and controlling processes, User account management, Becoming the superuser, Network connections, Audio and video, Installing softwar, Programming with shell scripts.