Secure programming with the OpenSSL API

Learning how to use the API for OpenSSL -- the best-known open library for secure communication -- can be intimidating, because the documentation is incomplete. Fill in the gaps, and tame the API, with the tips in this article. After setting up a basic connection, see how to use OpenSSL's BIO library to set up both a secured and unsecured connection. And learn a bit about error detection as well.

IBM releases eclipse Embedded Voice Toolkit

The Embedded Voice Toolkit allows developers to more easily build embedded speech applications using a graphical user interface (GUI) rather than “command-line” coding. The toolkit provides several key components: A set of Eclipse-based plug-ins generate, manage, and test grammar and custom pronunciations. It also provides extension to IBM's range of tools.

Programming Tools for the Hobbyist

Most of us that work in the IT industry have been around for a long time. We started out in our parents basement writing code in some BASIC environment, ussually Commodore BASIC or QBASIC. Do you remember how thrilling it was? Your first program and it was something extremely basic but the point was it worked. Some of us got hooked right away and kept trying to solve problems and added more and more pushing the capabilities of whatever language we used. As we got older the environments progressed and the programming tools progressed and got more complicated.

Unix AIX Security

This paper is meant to serve as an introductory guide to the basic security and server hardening functions present in AIX. Many of the features and functions shown throughout this guide are applicable to AIX 4.3 and above, but are more directed toward AIX 5.2. This guide attempts to cover a lot of ground and offers useful and necessary insight for anyone administering AIX machines.

Web Security Threat Classification

This paper compiles and distills the known unique classes of attack, which have presented a threat to web sites in the past. Each class of attack will be given a standard name and explained with thorough documentation discussing the key points. The formation of a Web Security Threat Classification will be of exceptional value to application developers, security professionals, software vendors or anyone else with an interest in web security.

Opinion: How Desktop Linux Should Behave

The promise of Desktop Linux (DL) has been long coming. It's made significant progress since the mid-90s when GNOME and KDE came out, giving Linux users a somewhat modern desktop to work upon. However, it's been 7 years and DL hasn't progressed much at all since then. Today, DL is still nothing more than a UNIX-clone with a task bar, a start menu, and a desktop with some icons on it. But why has DL evolved at such a glacial pace?

Xandros Ships Version 2.5 of Linux OS

Xandros announced the release of version 2.5 of the Xandros Desktop OS with an updated CrossOver Office suite. Xandros Desktop 2.5 now offers an upgraded CrossOver Office 3.0.1., supporting Lotus Notes 6.5.1, Microsoft Project 2000/2002, and Microsoft Outlook XP. Current Xandros Desktop OS users can upgrade the software with a single click. All versions of the Xandros Desktop OS now include Linux kernel 2.4.24 and version 1.6 of the Mozilla communications suite.

NetBSD 2.0 status report

James Chacon of the NetBSD release engineering team has sent a report covering the status of the NetBSD 2.0 branch to the netbsd-announce mailinglist. The report contains a schedule for the release cycle, and a list of 2.0-specific bugs that need to be closed. This is still a good time to help us making this the best NetBSD release ever, by trying out the latest snapshots, and reporting bugs.