| Subject | Datestamp | Replies | Score | |||
|---|---|---|---|---|---|---|
| AKA the straw man attack | ||||||
| attached to McBride's New Open Letter on Copyrights | ||||||
| I work with similar robots | ||||||
| attached to Robocoaster | ||||||
| My latest NDA, written by a lawyer? doubtful | ||||||
| attached to Apple Accuses Worker of Leaks | ||||||
| I am also reading this book. | ||||||
| attached to Smart Mobs | ||||||
| Re:you can use the songs in spite of editor commen | ||||||
| attached to Gateway to Ship PCs with Pre-Installed DRM Music Files | ||||||
| If downtime counts for much, how did MS win? | ||||||
| attached to Win2k Cheaper than Linux | ||||||
| this is just another example... | ||||||
| attached to Stanford Researchers Trying to Protect P2P Networks | ||||||
| Re:This would be useful! | ||||||
| This would be useful! | ||||||
| attached to Grab A Bunk In The Dot-Com Dorm | ||||||
| Fiber/Telecomm companies need to fight this | ||||||
| attached to Cable Industry Taking Control of the Net | ||||||
| goldmine for software publishers | ||||||
| attached to Reuters: 80% of Chinese Computers Virus Infected | ||||||
| Re:Math in CS programs | ||||||
| Math in CS programs | ||||||
| attached to Math Toolkit for Real-Time Programming | ||||||
| Re:802.11 can be secure, if the admins know how to | ||||||
| 802.11 can be secure, if the admins know how to! | ||||||
| attached to Wartrapping? | ||||||
| Use in remote places | ||||||
| attached to Batteries Powered by Leftover Food | ||||||
How many Unix hacks does it take to change a light bulb? Let's see, can you use a shell script for that or does it need a C program?