3D with Three.js Three-dimensional scenes in web browsers with Three.jsOct 26, 2012
Security Lessons: Web Frameworks Evaluating web frameworksOct 26, 2012
Stop re-inventing the wheel and build your web applications with the excellent tools already available.more »
PHP Security Principles Seven principles for preventing vulnerabilities in PHP programmingOct 26, 2012
Many web attacks are the result of programmer error. Sloppy code testing leaves a door open for the uninvited.more »
Future Platforms What would be the role of Linux in web-based operating systems?Oct 26, 2012
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make the Linux distro you’re running less important than the desktop environment?more »
HTML5 Tools Tools and resources for HTML5 developersOct 26, 2012
“HMTL5 rocks” – and Google is not the only one who feels that way. You will find many resources, frameworks, and utilities that will help you get started with the new standard.more »
HTML5 Offline Offline-capable applications with HTML5Oct 26, 2012
An offline cache in your browser and a bit of HTML5 acrobatics combine for interactive web applications that keep working even when the Internet connection breaks down.more »
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make which Linux distro you’re running less important than the desktop environment?more »
Peppermint Three Announced
Zsh 5.0 Released
ActiveState Releases Komodo 7.1
IPFire 2.11 Releasedmore »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.