Narrow your search
Provide low level access to audio,keyboard, mouse,joystick,3D hardware via OpenGL and 2D video framebuffer.
Create charts, graphics, diagrams, and maps easily.
Scrub mailing and post address lists from CSV files, Excel spreadsheets, or SQL tables.
Find all mines without blowing up whole field.
SDL Edit is a easy to use SDL diagram drawer. Use this tool to create professional flow charts. Easily share your drawings with colleagues through...
SDL Translate just got better! You can now chat with your friends in their language. Just type or speak your message and your friend will receive...
Read event logs from local and networked computers.
Special e-Library for university students which allows them to have a special reading experience with many features.Insert your reader account and...
Find and resolve design issues early in the software lifecycle period.
Test regular expressions for potential denial of service vulnerabilities.
Microsoft products are much more secure than they were 10 years ago, security experts say.
CNET asks a host of security experts which of the major operating-system platforms is more secure for consumers. Here's what they have to say.
Security researchers say Apple's new Mac OS X security enhancements could give Mac users something to really brag about.
Microsoft blog admits extra ampersand led to security bug exploited by hackers since early July.
Hurdles still exist, but on the eve of a big security conference, industry execs say the prospect of vulnerability-free software may not be that far away.
Casting the blame for Internet security problems solely on Microsoft is unproductive and unjustified.
Jon Oltsik recommends that network administrators treat Microsoft's newest patch with urgency, but says the out-of-cycle release bodes well for the company's security efforts.
Redmond has found secure development skills in a number of partners, including a small Massachusetts company named Security Innovation.
Dan Kaminsky and others will make presentations to Microsoft employees at the company's eighth Blue Hat security conference.
The company, which has undergone a security development rebirth over the past six years, offers free tools to help outside developers build more secure software.