Linux Journal Contents #28, August 1996
Aug 01, 1996 By Staff
Beyond Your First Shell Script
by Brian Rice
How to write versatile, robust Bourne shell scripts that will run flawlessly under other shells as well.
Diff, Patch, and Friends
by Michael K Johnson
De-mystifying patches and the tools used to create and apply them.
Auto-loading Kernel Modules
by Preston F. Crow
Make your system leaner by modularizing the kernel.
The Cold, Thin Edge
by Todd Graham Lewis
Taking the Shell Paradigm to its Brutal Limits. Whether you use Tcl, shells, Perl, or C, there is usually an option whereby tools from one programming environment can be imported into another. Here's how to “push the envelope”.
Basic fvwm Configuration, Part 2
by John M Fisk
Customizing the Desktop. Organize and customize those pop-up menu entries.
News and Articles
by Ben Lancki, Abhijit Dixit, and Vipul Gupta
Transparent Host Migration on the Internet
Graphing with Gnuplot and Xmgr
by Andy Vaught
Two graphing packages available under Linux
by Heiko Eissfeldt
Letters to the Editor
Stop the Presses
Device Drivers Concluded
Bandits on the Information Superhighway
World Wide Web Journal, Issue One
Directories & References
|Android Candy: Copay—the Next-Generation Bitcoin Wallet||Sep 03, 2015|
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
- The True Internet of Things
- Using tshark to Watch and Inspect Network Traffic
- Android Candy: Copay—the Next-Generation Bitcoin Wallet
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- September 2015 Issue of Linux Journal: HOW-TOs
- Firefox Security Exploit Targets Linux Users and Web Developers
- Concerning Containers' Connections: on Docker Networking
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- My Network Go-Bag