Realbasic Porting Visual Basic apps to LinuxFeb 28, 2006
Realbasic provides an easy solution for converting Visual Basic programs to Linux.more »
Scripting Secrets Intro New tools and techniques for scripting in LinuxFeb 28, 2006
Even the experts know there is always more to learn about scripting. In this month's cover story, we'll show you the Google Maps API, a networking framework for Python, and some other fine tools.more »
Mono and DotGNU comComparing the free .NET implementations Mono and DotGNUNov 30, 2005
The Open Source projects Mono and DotGNU open Microsoft’s .NET platform to Linux developers. This article investigates how well-suited these alternative implementations are for building simple GUI applications.more »
Secure Programming Studies in secure programming for adminsOct 31, 2005
Like a poison apple, a Web program that is tasty on the surface may contain a highly dangerous core. Admins who do their own programming need to follow secure programming practices to avoid the bitter taste of insecurity.more »
Cascading Style Sheets Better HTML with Cascading Style SheetsSep 30, 2005
Cascading Style Sheets (CSS) help you polish up your websites without taking a crash course in programming.more »
Linux Flash Options A Look at Flash tools for the Linux environmentSep 30, 2005
Flash is today’s tool of choice for animated, interactive web content. But Flash and Linux are worlds colliding. We'll show you the current crop of Open Source Flash authoring solutions.more »
Web Design Intro Professional Web design for everybodySep 30, 2005
Drupal Drupal, the Community FrameworkMay 31, 2005
The PHP-based Drupal framework makes dynamic websites simple. The modular system is extensible using free modules and the appearance is template-driven. In this article, we will be delving into Drupal’s range of functions and discussing installation and basic configuration.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.