16633 shaares
930 results
tagged
linux
Via river.
Analyse : Une note populaire sur la liste de diffusion du noyau Linux affirme que l'auteur d'un programme peut empêcher des tiers d'utiliser son code selon son bon vouloir. C'est faux.
Learn to make the most of the tools that hackers have been using for decades.
As hackers, we spend a lot of time on our computers, so it makes sense to make that experience as fluid and frictionless as possible. In this class, we’ll help you learn how to make the most of tools that productive programmers use.
We’ll show you how to navigate the command line, use a powerful text editor, use version control efficiently, automate mundane tasks, manage packages and software, configure your desktop environment, and more.
Via river.