New public key pinning feature will help prevent man-in-the-middle attacks.more »
Google Apps Script Cloud scripting with Google Apps ScriptMar 15, 2013
Processing Map Data with OpenLayers Integrating OpenStreetMap data into your web pages with OpenLayersFeb 22, 2013
Perl: CMS with GitHub An alternative use for GitHubDec 19, 2012
With its easy-to-use web interface, GitHub can be put to totally different uses than archiving code. For example, Perlmeister Mike Schilli used GitHub to deploy a content management system for simple websites.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
3D with Three.js Three-dimensional scenes in web browsers with Three.jsOct 26, 2012
Table of Contents: 145 What's inside the December 2012 issueOct 26, 2012
Building a botnet doesn’t necessarily make you an outlaw; we show you how one programmer automated a timesensitive business application with a botnet. Next, get ready to hit the ground running with HTML5, and secure your websites with sound PHP programming principles.more »
Security Lessons: Web Frameworks Evaluating web frameworksOct 26, 2012
Stop re-inventing the wheel and build your web applications with the excellent tools already available.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm