30 days in a terminal: Days 2-5 — Social media in shell

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Cool Tools Alert

Jun 23, 2016
Featured Image

Riding the new Wi-Fi wave (part 1)

A review of the Luma wireless mesh networking system, which changes the way home networks will use their Wi-Fi. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

30 days in a terminal: Days 2-5 — Social media in shell
5 things you should know about password managers
This Android malware can secretly root your phone and install programs
10 major headaches Apple fixed

White Paper: Aruba, an HP Enterprise Company

8 Best Practices to Protect Your Enterprise Network

Mobile and IoT devices such as laptops, smartphones, and smart watches can now be found in most businesses, as users demand access to the corporate network from anywhere, anytime. Securing for BYOD is a conversation IT needs to have, but it doesn't have to be a painful one. Employ these 8 best practices to boost your network security and end those headaches for good. Read More

Thumbnail Image

30 days in a terminal: Days 2-5 — Social media in shell

Using social media in a GUI-free world is possible, but it can be painful. Learn how Bryan Lunduke got Twitter, G+ and Reddit running in a Linux shell. Read More

Thumbnail Image

5 things you should know about password managers

New data breaches are coming to light almost weekly and they reveal a simple fact: many people still choose weak passwords and reuse them across multiple sites. Password managers offer a solution. Read More

Thumbnail Image

This Android malware can secretly root your phone and install programs

Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs. Read More

Thumbnail Image

10 major headaches Apple fixed

Among Apple's many (many, many) announcements at WWDC were plenty of fixes for little frustrations in each of its major platforms. Read More

White Paper: Aruba, an HP Enterprise Company

Definitive Guide: Securing the Mobile Enterprise

As smart devices and IoT are becoming more and more common in the workplace, the days of relying solely on perimeter firewalls to secure the network are long gone. Download the Definitive eGuide to Securing the Mobile Enterprise to learn how to ease IT headaches and leverage an Adaptive Trust defense to protect your network . Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Malware Museum’s 10 greatest hits

7 ways to make your IoT-connected Raspberry Pi smarter Read More

Most-Read Stories

1. Top U.S. states and cities with unsecured security cameras
2. Activists fighting expansion of government powers to hack private computers
3. 19 free cloud storage options
4. 20 highest paid tech CEOs
5. Microsoft has had enough of OEM bloatware
6. Hackers sold access to 170,000 compromised servers, many in the US
7. 7 free tools every network needs
8. Tech pros share advice for new computer science graduates
9. Peeping into 73,000 unsecured security cameras thanks to default passwords
10. Tech CEOs rake in the big bucks
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Cool Tools Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.