After years of development, version 1.0 of the Parrot virtual machine has arrived for Perl, Python and other dynamic languages. Whether the Parrot will take a firm foothold in software development is still up in the air.more »
Perl: Pinpointing Spammers Find spammers with the help of a database and Google ChartsFeb 28, 2009
To identify the geographic regions from which link spam originated, a database locates IP addresses and the Google Charts service puts them onto a world map.more »
Perl: Speed Bumps Profilers identify bottlenecks in Perl programsJan 31, 2009
Instead of souped up CPUs, simple programming tricks are often all it takes to speed up a program. Profilers can discover bottlenecks that need more TLC from the developer.more »
Advisory Check (advchk), a small tool for monitoring installed software security, is now available in version 2.20. It has extended its source feeds and is now supported on HP-UX.more »
Perl: Lyrical Logfiles A Perl script implements a singing, musical InternetDec 31, 2008
Instead of just monitoring incoming requests in your web server's logfile, a sound server makes them audible and lets you listen to the tune of users surfing the site.more »
Perl: Barcodes A Perl script catalogs books and CDs with the help of barcodesNov 30, 2008
Barcodes efficiently speed us through supermarket checkout lines, but the technology is also useful for totally different applications. An inexpensive barcode scanner can help you organize your private library, CD, or DVD collection.more »
Open source developer Tobias Oetiker, in his presentation at the USENIX LISA conference in San Diego, described how he could help one thousand Windows users at Swisscom.com speed up their computers.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm