Developing Botnets Secrets of a botnet developerOct 26, 2012
Botnets aren’t all bad. We’ll show you how to harness the power of the botnet architecture to solve realworld problems in a business context.more »
- AMD/OpenJDK/Oracle explore use of GPUs
- Smartphone security
- ASF Airavata
- Slackware 14 release
- Shuttleworth funds Inktank/Ceph
- New Apache toplevel project
- Zentyal 3.0 small business server reveals major release
- Keccak wins NIST
- SHA-3 competition
Future Platforms What would be the role of Linux in web-based operating systems?Oct 26, 2012
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make the Linux distro you’re running less important than the desktop environment?more »
Perl: Microformats Microformats help plan your vacationSep 21, 2012
Microformats add generally accepted tags, such as social network connections or geodetic coordinates, to HTML pages. Automated scripts collect them and help represent the data in graphically appealing ways – for example, geodata for vacation destinations.more »
Table of Contents: 144 HadoopSep 21, 2012
Getting into high-performance computing has never been easier. We investigate HPC cloud computing and a popular Big Data platform.more »
The World Wide Web Foundation has launched the Web Index – a new global study that “measures the impact of the Web on the world’s people and nations.”more »
The World Wide Web Consortium (W3C) sends out last call for public review of HTML5 specifications.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.