Version 3.00 of the free logfile analyzer W3Perl has just been released, and includes a number of enhancements. Among other features, the program now supports weekly and monthly statistics with the same granularity as daily reports, and can email the results if needed.more »
The Yahoo search engine's developer team today released a new Open Source program library for Flash and Flex.more »
A critical vulnerability has been discovered in the Opera Web browser.more »
Web-based Groupware Exploring web-based groupware toolsAug 15, 2007
Open source groupware tools have come of age. You are no longer limited to email and an address book. Some of these tools surpass the commercial alternatives – once you get them installed.more »
Version 6.0 of the Bittorrent filesharing client will no longer be Open Source and it is currently available for Windows only.more »
Following Firefox and Thunderbird, a known URL security bug was closed in the Seamonkey browser suite in August. A similar bug has now been found in Konqueror.more »
The seventh pre-release version of the upcoming Mozilla Firefox 3 browser (codename Gran Paradiso) includes new features and several bugfixes.more »
Google Web Toolkit Creating dynamic web applications with the Google Web ToolkitJan 01, 2007
The Google Web Toolkit lets you develop complex web applications in Java and automatically converts them to AJAX apps.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.