Computers & Technology
mobi |eng | 2011-03-05 | Author:David Kushner

Another wrote a poem called “The Night Before Doom”: “ ‘Twas the night before Doom, / and all through the house, / I had set up my multi-playing networks, / ...
( Category: Business June 11,2015 )
mobi |eng | 2005-06-30 | Author:David Litchfield; Chris Anley; John Heasman

Trojanning Sybase The options for inserting backdoors into a database system of Sybase's complexity are numerous. Following are a few ideas; there are plenty of variations on these themes. Grant ...
( Category: Hacking June 11,2015 )
mobi, azw3, epub, pdf |eng | 2011-01-14 | Author:Chris Sanders

Figure 6-31. The first ping packet, packet 1 Common sense tells us that if a computer sends an echo request, it should receive an echo reply, and that's just what ...
( Category: Networks June 11,2015 )
mobi |eng | 2009-02-09 | Author:Robert Mecklenburg

Automake The focus of this chapter has been on using GNU make and supporting tools effectively to achieve a portable build system. There are times, however, when even these modest ...
( Category: Software Development June 11,2015 )
mobi |eng | 2008-01-15 | Author:Andrew King

Tip #10: Replace JavaScript Behavior with CSS Techniques JavaScript is commonly used for rollovers and drop-down menus. However, in many cases you can substitute CSS :hover effects for JavaScript rollovers. ...
( Category: E-Commerce June 11,2015 )
mobi |eng | 2009-10-08 | Author:Peachpit Press

Monitoring Processes via Activity Monitor The primary Mac OS X application for monitoring processes as they are running is Activity Monitor. This extremely useful tool shows you the vital signs ...
( Category: Computers & Technology June 11,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash

[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category: Networking & System Administration June 11,2015 )
mobi |eng | 2007-01-15 | Author:W. Curtis Preston

Making the CD or DVD image bootable... Copying the remainder of the backup to the CD or DVD file system... Creating Rock Ridge format image: /mkcd/cd_images/cd_image_295108.vol2 Running mkisofs ... . ...
( Category: Disaster & Recovery June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein

Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category: Hacking June 11,2015 )
mobi, pdf |eng | 2010-10-26 | Author:Ken Auletta

CHAPTER ELEVEN Google Enters Adolescence (2007-2008) For all its democratic ethos, its belief in “the wisdom of crowds,” at Google the engineer is king, held above the crowd. The vaunted ...
( Category: Communications June 11,2015 )
epub, pdf |eng | 2010-12-27 | Author:Rod Stephens

Again, you don't need to use psychic powers to build all of the features that the customer will need in the next 15 years, but keep your eyes open during ...
( Category: Data Warehousing June 11,2015 )
mobi, pdf |eng | 2011-01-20 | Author:Fehily, Chris [Fehily, Chris]

Metasearch Sites A metasearch site doesn’t compile its own index but searches other sites and aggregates the results. A Torrentz search, for example, returns a list of links to other ...
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]

To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category: Quality Control June 11,2015 )
mobi |eng | 2006-01-02 | Author:Ed Skoudis; Tom Liston

Next, Metasploit offers a huge set of payloads, that is, the code the attacker wants to run on the target machine, triggered by the exploit itself. An attacker using Metasploit ...
( Category: Computers & Technology June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin

Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category: Hacking June 11,2015 )