Perl: isp-switch Reconfigure your network connection with isp-switchNov 12, 2008
When an Internet provider goes down, users suffer. Alternatively, users can immediately switch to another ISP. We’ll show you a Perl script that can help you reconfigure your computer to make the switch.more »
Perl: Math Tricks Perl script reveals math trickNov 12, 2008
A trick that anybody can learn lets you determine the day of the week from the date. We’ll apply some Perl technology to discover whether the method is reliable.more »
Perl: Vim Problem solving with VimNov 05, 2008
The Vim editor supports Perl plugins that let users manipulate the text they have just edited. Complex functions can be developed far faster than with Vim’s integrated scripting language.more »
Perl: Automating Color Correction Automate your color correction with a Perl scriptSep 30, 2008
If you have grown tired of manually correcting color-casted images (as described in last month's Perl column), you might appreciate a script that automates this procedure.more »
Nagiosgraph, an extension of the Nagios monitoring software, is available as version 1.0.0. The program merges the performance data from the Nagios plug-in and presents them graphically on a webpage.more »
Perl: Retouching Photos Retouching with PerlAug 31, 2008
In many cases, whole series of digital images need the same kind of modifications, which forces the photo-grapher to repeat the same steps time and time again in GIMP. Have you ever considered retouching in Perl?more »
Perl: Call Waiting Alternative call waiting service with PerlJul 15, 2008
If you can’t get through to your home number, a script can check the line status and send a signal to you via the Web to tell you when the line is free.more »
Perl: Perl Debugger Digging down into Perl hood with the debuggerJul 11, 2008
The Perl interpreter, perl, doesn’t often crash, but if it happens, not even the excellent Perl debugger will be able to help you.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.