Perl: Desktop Searches Desktop search in PerlSep 30, 2005
On a big, busy Linux desktop, it is too easy for files to get lost. We’ll show you a Perl script that creates a MySQL database to find files in next to no time.more »
Perl: XML parsers Comparing Perl XML parsersAug 31, 2005
XML is one of today’s most popular data exchange formats. Perl has a huge collection of methods for handling XML. This month’s Perl column discusses the pros and cons of the most common XML modules to help you choose the best tool for your job.more »
Perl: Tricks with Vim Tips and tricks for easy Perl programming in VimJul 31, 2005
The Vim editor has any number of tricks for helping you avoid unnecessary typing. In this month’s article, we look at some effort-saving Vim techniques for Perl hackers.more »
Perl: Yahoo API Scripting Using the Yahoo Search API with PerlJun 30, 2005
Following in the footsteps of Google, Amazon, and eBay, Yahoo recently introduced a web service API to its search engine. In this month’s column, we look at three Perl scripts that can help you correct typos, view other people’s vacation pictures, and track those long lost pals from school.more »
Perl Snapshot: Debugging Working with the Perl debuggerApr 30, 2005
Some developers condemn the use of debuggers, but in many cases, a debugger is a programmer’s last hope. In this Month’s Perl Snapshot, we’ll look at Perl’s integrated debugger.more »
Perl: Personal Finances An Extensible Viewer for your Personal FinancesMar 31, 2005
A helpful Perl script gives you an immediate overview of your financial status, adding the balances of multiple accounts and share depots. It even allows users to add their own plugins.more »
Perl: Shell Functions Emulating Shell Functions in PerlFeb 28, 2005
Perl gives you better shell scripts. Sysadm::Install, a new module from CPAN, helps shell addicts let go of Bash.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.