Forgot your password?

IT Stories for 2002

The Spam Problem: Moving Beyond RBLs 508 comments
Mac OS X Ruby/Objective-C Bridge Updated 35 comments
Windows Security Holes Go Mostly Unexploited 557 comments
New Phrack 239 comments
Military Healthcare Data Stolen 302 comments
Spam Conference in Boston 241 comments
Contractors on Salary? 100 comments
Pike Scripting Language 56 comments
Estimating Software Development Costs? 53 comments
Fixing Wireless Security By Pulling The Plug 133 comments
Setting Up Pelco-Based A/V Surveillance? 12 comments
Fighting Back Against Messenger Popup SPAM 87 comments
When Spammers Attack? 16 comments
What Happened to Starium? 9 comments
OpenGL Widget Set Recommendations? 154 comments
Talk To a Successful Free Software Project Leader 150 comments
More On Kapor's Attempt To Best Outlook 229 comments
Apple Previews New Script Editor 21 comments
RC Car Craze: The Spam Connection 314 comments
Computer Attack and Defense As Spectator Sport 142 comments
Mac OS X Dec 2002 Developer Tools 42 comments
ISP Chief on Spam 292 comments
Multi-User Subversion 159 comments
IRIX Multithreading Emulation on NetBSD 18 comments
Spam Blocking Engine for OpenBSD 274 comments
Systrace for Mac OS X 23 comments
CUPS Security Vulnerabilities 155 comments
E-gift Certificates = Spam? 25 comments
Troll Technology (QT) Releases Scripting Language 64 comments
WinXP and WinAmp Vulnerable to Malicious MP3s 505 comments
New Software Secures Data when Owners Walk Away 304 comments
Killing Unwanted Text Messages from Yahoo! Alerts? 388 comments
Real World Linux Security, 2nd Edition 109 comments
AOL Awarded Millions in Spam Case 256 comments
UCE Fallout - Newsletter/Mailing List Confirmations are SPAM? 36 comments
Intel Compiler Compared To gcc 101 comments
A Conference About Spam 403 comments
New SSH Vulnerabilities Discovered 33 comments
AOL Wins Anti-Spam Case 374 comments
Software Architecture 95 comments
Dutch Case Says Email Harvesting Illegal 46 comments
Spammer Gets Spam Mailed 347 comments
Adelphia's Cable Modems Compromised 182 comments
MacScan Detects Spyware 43 comments
Remote hole, DoS in MySQL 68 comments
Sun Security Patch Introduces Security Hole 265 comments
Cutting Security To Cut Costs? 124 comments
Tim Perdue on GForge & Building SourceForge 147 comments
Information for Managers - Understanding pthreads? 69 comments
Dealing w/ Copying of Online Articles via Open Proxies? 34 comments
Giving the Customer What They Wanted? 75 comments
Human vs Computer Intelligence 421 comments
One Answer To Spam: Sell Your Interruption Time 322 comments
Qt 3.1.1 Released 18 comments
How Best To Launch Free Software? 38 comments
OpenBSD SMP In The Works 260 comments
Specifications of Intuit's .QFX Format? 56 comments
Genetic Algorithm Improves Shellsort 71 comments
Known-Good MD5 Database 309 comments
MSNBC: Offices Remain Spam Free Zones 310 comments
Secure, Efficient and Easy C programming 357 comments
Because Only Terrorists Use 802.11 813 comments
SmartEiffel 1.0 Released 365 comments
Usability and Open Source Software 383 comments
SDSC Secure Syslog 100 comments
The Poetry Of Programming 416 comments
Secure Interaction Design 120 comments
The PPK Tiny Programming Results 23 comments
X-Force Changes Vulnerability Disclosure Policy 98 comments
RC5-72 Clients Available on distributed.net 197 comments
OpenSSL or CDSA for Portable TLS? 11 comments
Manning's Struts in Action 163 comments
Jupiter Forecasts 50% Increase In Spam 474 comments
Data-Corrupting ext3 Bug In Linux 2.4.20 27 comments
Stack-Smashing Protection Added To OpenBSD gcc 44 comments
Secure Webmail Providers? 56 comments
Securing 802.11b with PPPoE? 40 comments
TMDC5 100 comments
UN Advised on Wireless Insecurity 81 comments
Can Copyright Apply to SPAM? 159 comments
Interview With Martin Fowler 101 comments
Water, a Newish Web Language Out of MIT 60 comments
All Source Code Should Be Open, Revisited 513 comments
Concept Programming 78 comments
Overview of Computational Biology 7 comments
Location-based Security for Wireless Apps 60 comments
Qplus, An Open Source Embedded Linux Toolkit 10 comments
Protecting Your Code While Allowing Source Access? 553 comments
Internet Site Security 122 comments
Has Software Development Improved? 848 comments
Survey Of Editing Tools For Building Ontologies 31 comments
Authoring Schemas With XSD 111 comments
Spam King Lives Large off Others' E-Mail Troubles 294 comments
PPK debuts the tiny programming challenge 67 comments
What Features Would Make a "Better" GUI? 158 comments
Bootable CDROM-based Firewalls? 50 comments
Portable.NET Now 100% Free Software 429 comments
GCC 3.2.1 Released 56 comments
Sony Adds New Copyright Method to CDs in 2003 630 comments
Is Tripwire Still Relevent? 49 comments
Apple Posts Security Update 2002-11-21 36 comments
Another Millionaire Spammer Story 979 comments
Throttling Computer Viruses 268 comments
Ettiquette For Restarting Abandoned Open Source Projects? 60 comments
Possible SAMBA Vulnerability 32 comments
Another Critical Microsoft Hole 601 comments
SpamArchive.org Launched 269 comments
Report from the ACM DRM Workshop 274 comments
Controversy Surrounds Huge IE Hole 907 comments
Email (As We Know It) Doomed? 747 comments
Black Ops of TCP/IP: Paketto Keiretsu 1.0 Release 319 comments
EiffelStudio 5.2 For Linux Released 43 comments
Open Source Natural Language Processing? 31 comments
Justifying the Common Criteria Security Evaluation 168 comments
As the Spam Turns 408 comments
Reverse Engineering Win32 Trojans on Linux 86 comments
Doing Open-Source Development, Anonymously? 75 comments
Due Diligence? 226 comments
The Peon's Guide To Secure System Development 347 comments
Single Sign-On for Integrated Open-Source Apps? 28 comments
FTC Sues Six in Spam E-Mail Round-Up 304 comments
Thursday Release Party 62 comments
The Law of Leaky Abstractions 524 comments
Tools for Manipulating MPEG Headers? 21 comments
The Measured Effectiveness of Blocking Asian Spam 381 comments
Trolltech Releases Qt 3.1 35 comments
CA Law Demands Public Disclosure Of Break-Ins 188 comments
Security Vulnerabilities in KDE 2.1-3.0.4, 3.1 RC3 8 comments
Are You Using OMG's Model-Driven Architecture? 22 comments
Questioning Extreme Programming 492 comments
The Economics of Spam 832 comments
Trojan Found in libpcap and tcpdump 486 comments
Getting Programming Guide Data into TiVo Series 2 Units? 19 comments
NSA Approves First 802.11b Product for Secret Data 254 comments
Bind 4 and 8 Vulnerabilities 408 comments
US Busts Military Network Hacker 466 comments
Detecting 802.11 Discovery Apps 165 comments
New TiBook Handle Also Sports a Stand 47 comments
Improving Open Source Using Software Process Concepts? 34 comments
.NET CLI Now Runs On Mac OS X 28 comments
Build Your Own Mac OS X Apache/mod_perl Server 22 comments
When Good Interfaces Go Crufty 668 comments
Vulnerability In Linksys Cable/DSL Router 262 comments
Midweek Upgrades 25 comments
Weak Elliptic Curve Cryptography Brute-Forced 270 comments
Open Source More Expensive In the Long Run? 736 comments
SQL Fundamentals 233 comments
Competitive Cross-Platform Development? 411 comments
Design Patterns 314 comments
Organizing Large Key-Signing Events? 31 comments
Jay Beale On Overcoming Linux Security Holes 30 comments
OpenAntiVirus Project Founders Interviewed 7 comments
Developing Grid computing applications, Part 1 10 comments
Building Open Source Network Security Tools 33 comments
Working Bayesian Mail Filter 313 comments
Beware the Haunted Cordless keyboard 291 comments
Hacking Crime Victims to Remain Secret 179 comments
Computerized Betting System Proves Vulnerable 310 comments
Realtime OS Jaluna 87 comments
X-Forge 3D Engine Arrives 18 comments
ActiveState releases Komodo for GNU/Linux 38 comments
Submitting Bug Reports To Open Source Projects? 288 comments
Windows 2000 Gets Common Criteria Certification 533 comments
Forth Application Techniques 260 comments
Replacing WEP for Wireless Security 79 comments
Protecting System Binaries From Trojan Attack 44 comments
The All-Red Route 100 Years On 158 comments
Bram Moolenaar (of VIM fame) On A-A-P 18 comments
Another J2EE vs .NET Performance Comparison 533 comments
Linux Programming By Example 155 comments
Why Isn't SPAM Regulated Like Fax? 69 comments
Programming Marathons? 109 comments
When is Database Muscle Too Much? 93 comments
Dynamic HTML The Definitive Reference (2nd edition) 243 comments
Curious Yellow, Superworm 167 comments
Overspecialization in the Computer Field? 120 comments
Saddam's Inbox Hacked 764 comments
What Software Do Cable Installers Place on Your PC? 973 comments
New Spam Frontier: Referer Logs 317 comments
Examples of Programming Gone Wrong? 674 comments
As Languages Evolve... 81 comments
Pushback against DDOS Attacks 159 comments
Storefront-in-a-Box 21 comments
Multi-Monitors and Increased Development Productivity? 58 comments
Blogger Hacked 340 comments
Malicious Distributed Computing 208 comments
Critical Kerberos Flaw Revealed 200 comments
Donating Time To Goodwill Projects? 179 comments
ECCp-109 Solved 290 comments
Direct Marketers Association Asks To Be Regulated 334 comments
Encrypt Information In Images Without Distortion 236 comments
Bernstein's Continued Progress in Crypto Suit 9 comments
Postmodern Computer Science 390 comments
FreeBSD Gets 'Fast IPsec' Implementation 62 comments
Enabling Mouse Gestures for Cocoa Apps 36 comments
Researching Searching Algorithms? 62 comments
Protecting Servers From Nmap's Idlescan? 37 comments
Striving for HIPAA Compiance? 278 comments
Formalizing the Software Development Life Cycle? 27 comments
Mac OS X Built For CISC, Not RISC 82 comments
Spammer Fined $2,000 Plus Costs in Washington 244 comments
WiFi Triangulation 233 comments
Gnarly Error Messages 1315 comments
Lucky Green vs. Palladium 392 comments
Load Tests for Distributed Systems? 14 comments
Windows/NetBIOS pop-up Spam: 411 comments
Books on Programming Theory? 85 comments
Complex GUI Architecture Discussion? 367 comments
Web Application UI Guidelines? 27 comments
OpenSSH 3.5 Released 140 comments
Former FBI Chief Keeps Up Anti-Crypto Campaign 83 comments
Windows vs Linux On Security 480 comments
Australian Anti-Spammer Wins Court Case 156 comments
Write Pure Python Cocoa Apps 30 comments
PGP 8.0 Beta Released 122 comments
A Digital Certificate For Every Canadian 336 comments
A Distributed Front-end for GCC 195 comments
Chroot Jails Made Easy 87 comments
Predicting User Behavior to Improve Security 133 comments
C# and CLI Fast-tracked to ISO 83 comments
ColdFusion Programming Methodologies? 40 comments
Stopping NetBIOS Spam? 97 comments
Reuters: 80% of Chinese Computers Virus Infected 362 comments
Pre-Processers for Inlined C Code? 62 comments
Math Toolkit for Real-Time Programming 153 comments
Wartrapping? 266 comments
Handling Campus AUP (non-)Violations? 134 comments
Spam, Spam, Spam, Dole & Spam 26 comments
Tuning Java Swing apps for Mac OS X 37 comments
The Python Cookbook 242 comments
Fighting Telemarketers with Technology 561 comments
Synchronizing Forced Password Changes? 51 comments
CERT: Sendmail Distribution Contained Trojan Horse 335 comments
Programming BREW Phones 28 comments
Compiling Snort Rules 10 comments
WEP Keys in Mac OS X? 37 comments
Suing Spammers: What works? 29 comments
ICFP 2002 Contest Winners Announced 254 comments
Weekend Apple Software Updates 47 comments
Russian Snared By The FBI Sentenced To 3 Years 510 comments
Anonymous Surfing? 42 comments
Open Source Requirements Management Systems? 117 comments
Designing Computer Animation Software? 354 comments
Bugbear Windows Virus Making the Rounds 516 comments
Beginning Developers: Free Course from MIT 34 comments
Fortran 2000 Committee Draft 274 comments
Red Hat & Dell Host Open Source Security Summit 79 comments
Interview With Jon Callas of PGP Corp 18 comments
SANS/FBI Release Top 20 Security Vulnerabilities 268 comments
Questioning Security Certifications 103 comments
Page: 1 2 →

If at first you don't succeed, you must be a programmer.

 



Forgot your password?