Perl: isp-switch Reconfigure your network connection with isp-switchNov 12, 2008
When an Internet provider goes down, users suffer. Alternatively, users can immediately switch to another ISP. We’ll show you a Perl script that can help you reconfigure your computer to make the switch.more »
Perl: Math Tricks Perl script reveals math trickNov 12, 2008
A trick that anybody can learn lets you determine the day of the week from the date. We’ll apply some Perl technology to discover whether the method is reliable.more »
Perl: Vim Problem solving with VimNov 05, 2008
The Vim editor supports Perl plugins that let users manipulate the text they have just edited. Complex functions can be developed far faster than with Vim’s integrated scripting language.more »
Perl: Automating Color Correction Automate your color correction with a Perl scriptSep 30, 2008
If you have grown tired of manually correcting color-casted images (as described in last month's Perl column), you might appreciate a script that automates this procedure.more »
Nagiosgraph, an extension of the Nagios monitoring software, is available as version 1.0.0. The program merges the performance data from the Nagios plug-in and presents them graphically on a webpage.more »
Perl: Retouching Photos Retouching with PerlAug 31, 2008
In many cases, whole series of digital images need the same kind of modifications, which forces the photo-grapher to repeat the same steps time and time again in GIMP. Have you ever considered retouching in Perl?more »
Perl: Call Waiting Alternative call waiting service with PerlJul 15, 2008
If you can’t get through to your home number, a script can check the line status and send a signal to you via the Web to tell you when the line is free.more »
Perl: Perl Debugger Digging down into Perl hood with the debuggerJul 11, 2008
The Perl interpreter, perl, doesn’t often crash, but if it happens, not even the excellent Perl debugger will be able to help you.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm