Language Selection

English French German Italian Portuguese Spanish

5 ways to pimp your terminal in linux

Filed under
Software

Most people tend to think of the terminal as boring. But here I will list a number of choices you can pick to snaz it up a bit. The following applications can increase the usability and the speed in which you use a terminal, from drop down screens, syntax highlighting, or having multiple terminals in one window.

Yakuake - Yet another Kuake KDE terminal emulator.

Yakuake gives you a drop down screen for your terminal. Simply start the application and assign the key to make the terminal window drop down and bang away on the keyboard until you need it out of your sight. Yakuake is based on Konsole so you can theme it just the same. It also allows you to adjust the width, height and screen placement.

Multi-Gnome-Terminal

Or lets say you want QuadKonsole goodness, but on a GTK application? Then you need Multi-Gnome Terminal. This is in most distributions repositories, if not you can obtain this here: http://multignometerm.sourceforge.net/

figlet

More Here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News