Perl: Desktop Searches Desktop search in PerlSep 30, 2005
On a big, busy Linux desktop, it is too easy for files to get lost. We’ll show you a Perl script that creates a MySQL database to find files in next to no time.more »
Perl: XML parsers Comparing Perl XML parsersAug 31, 2005
XML is one of today’s most popular data exchange formats. Perl has a huge collection of methods for handling XML. This month’s Perl column discusses the pros and cons of the most common XML modules to help you choose the best tool for your job.more »
Perl: Tricks with Vim Tips and tricks for easy Perl programming in VimJul 31, 2005
The Vim editor has any number of tricks for helping you avoid unnecessary typing. In this month’s article, we look at some effort-saving Vim techniques for Perl hackers.more »
Perl: Yahoo API Scripting Using the Yahoo Search API with PerlJun 30, 2005
Following in the footsteps of Google, Amazon, and eBay, Yahoo recently introduced a web service API to its search engine. In this month’s column, we look at three Perl scripts that can help you correct typos, view other people’s vacation pictures, and track those long lost pals from school.more »
Perl Snapshot: Debugging Working with the Perl debuggerApr 30, 2005
Some developers condemn the use of debuggers, but in many cases, a debugger is a programmer’s last hope. In this Month’s Perl Snapshot, we’ll look at Perl’s integrated debugger.more »
Perl: Personal Finances An Extensible Viewer for your Personal FinancesMar 31, 2005
A helpful Perl script gives you an immediate overview of your financial status, adding the balances of multiple accounts and share depots. It even allows users to add their own plugins.more »
Perl: Shell Functions Emulating Shell Functions in PerlFeb 28, 2005
Perl gives you better shell scripts. Sysadm::Install, a new module from CPAN, helps shell addicts let go of Bash.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.