Home Search
for - search results
If you're not happy with the results, please do another search
old.
Author: JT Smith
"Ah, life is good with DSL. Everyone has enough bandwidth to have fun.
...
Nasa cyber-criminal pleads guilty
Author: JT Smith
A 20-year-old man from California has pleaded guilty to breaking into several computers at Nasa's Jet Propulsion Laboratory in 1998. VNUnet reports.
Category:...
Interfacing with Java from PHP
Author: JT Smith
At zez.org:
PHP4 ext/java provides a simple and effective means for creating and invoking methods on Java objects from PHP. This article will...
Whistler to include ‘block all unsigned apps’ secure mode
Author: JT Smith
The Register reports that Microsoft is to incorporate a "signed application" system in
...
Three-tier web site architecture
Author: JT Smith
Penguin Computing will employ its newest servers - including
ones introduced at LBE - to demonstrate three-tier Web site architecture...
Law’s not the answer to cybercrime
Author: JT Smith
From Upside Today: "Take a good look at the RIAA and how much of a
damn the public gives about their...
P2P’s real issues – 1st amendment, captive markets
Author: JT Smith
Technocrat is carrying an article by the lyricist for Grateful Dead about the pending death of the music industry, citing Napster as...
Web review: The unofficial Mandrake Linux page
Author: JT Smith
By Tina Gasperson -
The Unofficial Mandrake Linux page provides clear, step-by-step instructions for performing a variety of tasks on your Mandrake...
Using clone()
Author: JT Smith
Linux Journal has a programmer's article describing how to use clone(), a low level system call in C. Though the article is...
Virgin wants free computer equipment returned
Author: JT Smith
CNet News is reporting that Virgin, a company that gave out free computers in exchange for targeted advertising, is askings its customers...