| Subject | Datestamp | Replies | Score | |||
|---|---|---|---|---|---|---|
| Re:Corporations have more rights than individuals | ||||||
| This Is Shocking? | ||||||
| attached to Google Street View Logs Wi-Fi Networks, MAC Addresses | ||||||
| From Second Hand Experience... | ||||||
| attached to Fixing Internet Censorship In Schools | ||||||
| Parse Tree Analytics | ||||||
| attached to How Easy Is It To Cheat In CS? | ||||||
| My Method... | ||||||
| attached to How Do You Accurately Estimate Programming Time? | ||||||
| Re:Voicing This Problem Now | ||||||
| Re:Voicing This Problem Now | ||||||
| Re:Voicing This Problem Now | ||||||
| Voicing This Problem Now | ||||||
| attached to FCC Preparing Transition To VoIP Telephone Network | ||||||
| A Reply From A Non-Nerd | ||||||
| attached to Inside the Windows 7 Launch Party Pack | ||||||
| Awesome! | ||||||
| attached to Apple Open Sources Grand Central Dispatch | ||||||
| HIdden Cost | ||||||
| attached to US Call-Center Jobs — That Pay $100K a Year | ||||||
| Site and Serial | ||||||
| attached to Suitable Naming Conventions For Workstations? | ||||||
| Security Is About Trust | ||||||
| attached to Why Should I Trust My Network Administrator? | ||||||
| Re:Vim | ||||||
| attached to What Free IDE Do You Use? | ||||||
| Handbrake | ||||||
| attached to Decent DVD-Ripping Solution For Linux? | ||||||
| O2 | ||||||
| attached to Rackable Buying SGI Assets For $25M? | ||||||
| It works out here... | ||||||
| attached to How Do I Make My Netbook More Manly? | ||||||
| Re:ActiveX | ||||||
| ActiveX | ||||||
| attached to IE8 May Be End of the Line For Internet Explorer | ||||||
| Shakespeare | ||||||
| attached to Why Do We Name Servers the Way We Do? | ||||||
| I Can Hook You Up | ||||||
| attached to AIX On the Desktop Is Getting the Boot | ||||||
| I Wish I Could Have Investigated More | ||||||
| attached to Cracked Linux Boxes Used to Wield Windows Botnets | ||||||
| Get *ALL* Keys | ||||||
| attached to Vista Activation Cracked by Brute Force | ||||||
"The algorithm to do that is extremely nasty. You might want to mug someone with it." -- M. Devine, Computer Science 340