Security Lessons Overflows, underflows, and other security flawsDec 21, 2009
Our security guy looks at software tools that you can use to audit and secure your software.more »
Microsoft had released a tool in mid-November that generated bootable USB media or a DVD from the download version of Windows 7 and that conflicted with the GNU Public License. They now followed up by putting the tool under GPLv2.more »
Tea, a source code editor for HTML, DocBook and Latex, is now available in version 26.0.0. The new release includes support for more programming languages and new features.more »
The Eclipse Foundation has hit its planned date of June 24 of releasing Galileo, its newest annual collection of development platform projects.more »
strace Get started with strace and debug fasterMay 31, 2009
Get started with strace by examining a pair of "Hello World" programs. Next month, in the second part of this two-part series, I'll take a deeper look at strace output.more »
Java and .NET Intro Implementing Java and .NET in LinuxApr 30, 2009
In today's heterogeneous environments, it is hard to escape the influence of Java and .NET. So why not come prepared? This month we examine some tools and techniques for integrating the Java and .NET frameworks with Linux.more »
After years of development, version 1.0 of the Parrot virtual machine has arrived for Perl, Python and other dynamic languages. Whether the Parrot will take a firm foothold in software development is still up in the air.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.