Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
3D with Three.js Three-dimensional scenes in web browsers with Three.jsOct 26, 2012
Security Lessons: Web Frameworks Evaluating web frameworksOct 26, 2012
Stop re-inventing the wheel and build your web applications with the excellent tools already available.more »
PHP Security Principles Seven principles for preventing vulnerabilities in PHP programmingOct 26, 2012
Many web attacks are the result of programmer error. Sloppy code testing leaves a door open for the uninvited.more »
Future Platforms What would be the role of Linux in web-based operating systems?Oct 26, 2012
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make the Linux distro you’re running less important than the desktop environment?more »
HTML5 Tools Tools and resources for HTML5 developersOct 26, 2012
“HMTL5 rocks” – and Google is not the only one who feels that way. You will find many resources, frameworks, and utilities that will help you get started with the new standard.more »
HTML5 Offline Offline-capable applications with HTML5Oct 26, 2012
An offline cache in your browser and a bit of HTML5 acrobatics combine for interactive web applications that keep working even when the Internet connection breaks down.more »
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make which Linux distro you’re running less important than the desktop environment?more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm