New public key pinning feature will help prevent man-in-the-middle attacks.more »
Google Apps Script Cloud scripting with Google Apps ScriptMar 15, 2013
Processing Map Data with OpenLayers Integrating OpenStreetMap data into your web pages with OpenLayersFeb 22, 2013
Perl: CMS with GitHub An alternative use for GitHubDec 19, 2012
With its easy-to-use web interface, GitHub can be put to totally different uses than archiving code. For example, Perlmeister Mike Schilli used GitHub to deploy a content management system for simple websites.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
3D with Three.js Three-dimensional scenes in web browsers with Three.jsOct 26, 2012
Table of Contents: 145 What's inside the December 2012 issueOct 26, 2012
Building a botnet doesn’t necessarily make you an outlaw; we show you how one programmer automated a timesensitive business application with a botnet. Next, get ready to hit the ground running with HTML5, and secure your websites with sound PHP programming principles.more »
Security Lessons: Web Frameworks Evaluating web frameworksOct 26, 2012
Stop re-inventing the wheel and build your web applications with the excellent tools already available.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.