Perl: Desktop Searches Desktop search in PerlSep 30, 2005
On a big, busy Linux desktop, it is too easy for files to get lost. We’ll show you a Perl script that creates a MySQL database to find files in next to no time.more »
Perl: XML parsers Comparing Perl XML parsersAug 31, 2005
XML is one of today’s most popular data exchange formats. Perl has a huge collection of methods for handling XML. This month’s Perl column discusses the pros and cons of the most common XML modules to help you choose the best tool for your job.more »
Perl: Tricks with Vim Tips and tricks for easy Perl programming in VimJul 31, 2005
The Vim editor has any number of tricks for helping you avoid unnecessary typing. In this month’s article, we look at some effort-saving Vim techniques for Perl hackers.more »
Perl: Yahoo API Scripting Using the Yahoo Search API with PerlJun 30, 2005
Following in the footsteps of Google, Amazon, and eBay, Yahoo recently introduced a web service API to its search engine. In this month’s column, we look at three Perl scripts that can help you correct typos, view other people’s vacation pictures, and track those long lost pals from school.more »
Perl Snapshot: Debugging Working with the Perl debuggerApr 30, 2005
Some developers condemn the use of debuggers, but in many cases, a debugger is a programmer’s last hope. In this Month’s Perl Snapshot, we’ll look at Perl’s integrated debugger.more »
Perl: Personal Finances An Extensible Viewer for your Personal FinancesMar 31, 2005
A helpful Perl script gives you an immediate overview of your financial status, adding the balances of multiple accounts and share depots. It even allows users to add their own plugins.more »
Perl: Shell Functions Emulating Shell Functions in PerlFeb 28, 2005
Perl gives you better shell scripts. Sysadm::Install, a new module from CPAN, helps shell addicts let go of Bash.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm