Home Search

for - search results

If you're not happy with the results, please do another search

old.

Author: JT Smith "Ah, life is good with DSL. Everyone has enough bandwidth to have fun. ...

Nasa cyber-criminal pleads guilty

Author: JT Smith A 20-year-old man from California has pleaded guilty to breaking into several computers at Nasa's Jet Propulsion Laboratory in 1998. VNUnet reports. Category:...

Interfacing with Java from PHP

Author: JT Smith At zez.org: PHP4 ext/java provides a simple and effective means for creating and invoking methods on Java objects from PHP. This article will...

Whistler to include ‘block all unsigned apps’ secure mode

Author: JT Smith The Register reports that Microsoft is to incorporate a "signed application" system in ...

Three-tier web site architecture

Author: JT Smith Penguin Computing will employ its newest servers - including ones introduced at LBE - to demonstrate three-tier Web site architecture...

Law’s not the answer to cybercrime

Author: JT Smith From Upside Today: "Take a good look at the RIAA and how much of a damn the public gives about their...

P2P’s real issues – 1st amendment, captive markets

Author: JT Smith Technocrat is carrying an article by the lyricist for Grateful Dead about the pending death of the music industry, citing Napster as...

Web review: The unofficial Mandrake Linux page

Author: JT Smith By Tina Gasperson - The Unofficial Mandrake Linux page provides clear, step-by-step instructions for performing a variety of tasks on your Mandrake...

Using clone()

Author: JT Smith Linux Journal has a programmer's article describing how to use clone(), a low level system call in C. Though the article is...

Virgin wants free computer equipment returned

Author: JT Smith CNet News is reporting that Virgin, a company that gave out free computers in exchange for targeted advertising, is askings its customers...