| Subject | Datestamp | Replies | Score | |||
|---|---|---|---|---|---|---|
| Yate | ||||||
| Re:Asterisk is something special | ||||||
| attached to Interview with Mark Spencer of Asterisk | ||||||
| Re:Ok- I'll bite... | ||||||
| attached to Google Changes Privacy Policy | ||||||
| Right! | ||||||
| attached to Microsoft Adopts Virtual Licenses | ||||||
| Re:Subnotebooks ... | ||||||
| Re:Subnotebooks ... | ||||||
| Subnotebooks ... | ||||||
| attached to USB FlashDrives The New PC? | ||||||
| Re:Invalid markup from such people is a disgrace. | ||||||
| attached to Mambo Changes its Name to Joomla! | ||||||
| Re:SIP and NAT | ||||||
| It won't scale | ||||||
| attached to Project Gizmo Challenges Skype | ||||||
| Re:Oh well.... | ||||||
| attached to Red Hat releases Netscape Directory Server to OSS | ||||||
| http://www.i2p.net/ | ||||||
| attached to Revamping Freenet | ||||||
| Too little, too late... | ||||||
| attached to On the Horizon: an Apache-License Version of Java | ||||||
| Re:Useless... | ||||||
| Useless... | ||||||
| attached to Ciphire, A Transparent, Easy PGP Alternative | ||||||
| Re:Statistics | ||||||
| Re:We could use some background info | ||||||
| attached to New Fee For Internet-Capable PCs In Germany | ||||||
| Security Through Obscurity | ||||||
| attached to Combining Port Knocking With OS Fingerprinting | ||||||
| Google Filesystem Blocksize | ||||||
| attached to Kevin Rose Load Tests Gmail | ||||||
| Why use WLAN encryption at all? Use IPsec! | ||||||
| attached to Security evaluation of 802.11i | ||||||
| Re:Firmware update or driver? | ||||||
| attached to Apple Offers Update to Recent AirPort Update | ||||||
| this driver wasn't released by Intel | ||||||
| attached to Intel Releases Linux Driver For Centrino WLAN | ||||||
| known since 18. feb. 2004 | ||||||
| attached to New Linux Kernel Vulnerability | ||||||
| http://groups.google.com/groups?selm=2odj9q%2425q% | ||||||
| attached to Celebrating Spam's Ten-Year Anniversary | ||||||
(1) Never draw what you can copy. (2) Never copy what you can trace. (3) Never trace what you can cut out and paste down.