PhpStorm 6 redesigned with a new look and many new features.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
HTML5 Offline Offline-capable applications with HTML5Feb 08, 2013
An offline cache in your browser and a bit of HTML5 acrobatics combine for interactive web applications that keep working even when the Internet connection breaks down.more »
The Eclipse Foundation announces the release of Hudson 3.0 – a continuous integration (CI) server used to improve the software development process.more »
Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
Xen 4.2 offers new features and improvements and supports a wide range of guest operating systems.more »
WebHTTrack Website Copier Grabbing Websites with WebHTTrackSep 10, 2012
WebHTTrack backs up complete websites for offline access and modifies the links automatically.more »
Perforce Software and Assembla announce the availability of an on demand version of Perforce Software Version Management that is integrated with team tools from Assembla.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm