Apr 032013
 

Having free tutorials in your mother tounge is especially important when you are young and don’t know English good enough.

A few weeks ago Felipe Leprevost started to translate the articles of the Perl tutorial on the Perl Maven site to Portuguese.
There are already 8 articles in the Perl tutorial in Portuguese.

Today, thanks to Tudor Constantin, I posted the first article in the Romanian Perl tutorial.

I am looking for more volunteers to help these translations, and to start the translations to other languages as well. If you are interested, please get in touch with me: szabgab at gmail.com.

Mar 182013
 

The cut off for submitting talks for YAPC::NA in Austin was originally the 15th, but we’re moving the deadline to the end of this month and ask readers to spread this news wherever they encounter folk they’d like to see give talks at YAPC.

More details..

You can submit your talks at: http://www.yapcna.org/yn2013/newtalk.

 Posted by at 06:39
Mar 162013
 

PrePAN provides a place to discuss your modules.

It’s aim is to help with questions like…

  • Are there any similar modules?
  • I’m not confident about the implementation…
  • How can I distribute the module in keeping with CPAN’s conventions?
  • I want someone to review my module..

The PrePAN team recently made two announcements – PrePAN is now on AWS hosting, and they have also joined the MetaCPAN team.

MetaCPAN is an open source search engine for the Comprehensive Perl Archive Network (CPAN), an ever growing archive of code and documentation for the Perl programming language.

Mar 042013
 

The following message concerns a hash-related flaw in perl 5

This issue affects all production versions of perl from 5.8.2 to 5.16.x. It does not affect the upcoming perl 5.18.

In order to prevent an algorithmic complexity attack against its hashing mechanism, perl will sometimes recalculate keys and redistribute the contents of a hash.  This mechanism has made perl robust against attacks that have been demonstrated against other systems.

Research by Yves Orton has recently uncovered a flaw in the rehashing code which can result in pathological behavior.  This flaw could be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys.

Because using user-provided strings as hash keys is a very common operation, we urge users of perl to update their perl executable as soon as possible.

Updates to address this issue have been pushed to maint-5.8, maint-5.10maint-5.12, maint-5.14, and maint-5.16 branches today, perl 5.14.4 and 5.16.3 will be released soon, including these fixes. There is no plan to make a new release of any other version.

Vendors* were informed of this problem two weeks ago and are expected to be shipping updates today (or otherwise very soon).

bleadperl is not affected.

This issue has been assigned the identifier CVE-2013-1667.