SLACKWARE ENCRYPTED SWAP

22. January 2013, 21:36 | by WD Milner | Full Article | Comments

When available memory drops below a certain point, the Linux kernel will swap the contents of memory pages to swap space. This content may include sensitive information such as passwords, usernames, PINS, banking or other identity information. This data is usually in plain text and so can be read without effort. Encrypting the system swap space protects its contents against unauthorized access and attack should access to the hard drive be compromised or physically removed.

Categories: ,



CLOUD RELIABILITY

28. December 2012, 16:03 | by WD Milner | Full Article | Comments

The "Cloud" is supposed to be a flexible, resilient and redundant resource for computing power and data storage. But just how reliable is it?

Categories: ,



WE’VE GOT OUR EYES ON YOU !

28. November 2012, 18:06 | by WD Milner | Full Article | Comments

Think you're location is private because you turned GPS off in your cellular telephone? Think again.

Categories: ,



THE FIRST CLICK

20. June 2012, 16:03 | by WD Milner | Full Article | Comments

Eugene Polley died last month (May 20 , 2012) at the age of 96. Most people don’t recognize his name but millions have used, and continue to use, the device he invented more than fifty years ago. Eugene Polley was the father of the cordless television remote control.

Categories: ,



INSIDER THREAT MITIGATION

21. May 2012, 22:26 | by WD Milner | Full Article | Comments

Ask any computer professional who works in security what the biggest threat to an information system is and you might be surprised at the answer. It's not outside “hackers”, it is insiders within the organization itself. And the best way to stop these internal attacks is by putting a solid prevention program in place.

Categories: ,



GAME REVIEW: ASSASSIN'S CREED REVELATIONS

14. February 2012, 17:04 | by WD Milner | Full Article | Comments

Like its predecessors Revelations has fantastic graphics, an interesting storyline and good game play. Unfortunately, it seems this episode, at least for the PC, was rushed out the door. On a fully patched and up to date OS, I encountered never ending problems with graphics tearing, mouse sensitivity and crashes, so much so I could play no further than a sequence into the game. Many of these problems apparently have been solved in the patches - if one can get the patches. I have tried for almost a month to download the patches without success and so I have been unable to proceed further.

Categories: ,



HARD DRIVE MAKERS CUT WARRANTIES

20. December 2011, 10:16 | by WD Milner | Full Article | Comments

Seagate recently announced that due to a “need to align to current Industry standards”, it intends to reduce warranty periods on its hard drives as of December 31, 2011. Western Digital will follow on January 2, 2012.

Categories: ,



CONSIDERING THE CLOUD?

7. December 2011, 18:24 | by WD Milner | Full Article | Comments

In times such as these where economics is consistently first and foremost, enterprises look to reduce expenditures by removing overlap in IT allocations, consolidating redundancies in infrastructure and in-house applications to the “cloud”. Almost universally cloud services believe in the benefits of optimization and service oriented computing and cater to those wishing to maintain a narrow focus on core objectives rather than having to manage operational detains of providing data services.

Categories: ,



12 DAYS OF COMPUTER WISHES

9. August 2011, 19:39 | by WD Milner | Full Article | Comments

I was recently going through same old papers and found an article titled “Twelve Wishes for a Computer Christmas” by Peter Talbot. It was a fairly old article as such things go, having been published in The Computer Paper, Metro Toronto Edition in December 1992.

Categories: ,



PRODUCT REVIEW: PLANTRONICS EXPLORER 370 SPORT BLUETOOTH HEADSET

21. June 2011, 18:08 | by WD Milner | Full Article | Comments

The Plantronics Explorer 370 is a nice little headset. It’s rugged, seems imunne to casual drops (shoulder height or less) and does well in the rain, being waterproof.

Categories: ,



UNPLEASANT REMINDER

20. June 2011, 13:45 | by WD Milner | Full Article | Comments

In these days of advanced web technologies, multifunctional browsers, high resolution screens and all the paraphernalia of modern computing, it is surprising and sadly amusing when we come across reminders of the “bad old days” of the web.

Categories: ,



TAPE BACKUP STRATEGIES

29. April 2011, 19:55 | by WD Milner | Full Article | Comments

In this day and age of massive inexpensive hard drives high capacity optical disks and flash media an older option for backup is often overlooked; that is except among organizations that need very large scale archival storage. I’m talking about magnetic tape. Always somewhat out of the mind of consumers and small businesses, tape backup has long been a mainstay of archival storage for larger enterprises, organizations such as universities and research centres and government agencies and departments.

Categories: ,



GREED IN OPEN SOURCE

27. February 2011, 16:18 | by WD Milner | Full Article | Comments

Canonical, creator of the Ubuntu distribution of Linux, and the Banshee music player developers have found themselves in a morass over money. Banshee has it, and Canonical wants it - as the price for being included in their distribution’s next version.

Categories: ,



BOOK REVIEW: FOOLS’ EXPERIMENTS

6. February 2011, 16:57 | by WD Milner | Full Article | Comments

A brief review of the book Fools’ Experiments, Edward M. Lerner, Tom Doherty Associates, 447, ISBN-13: 978-0-7653-1901-2896836-43-7.

Categories: ,



A BIT ABOUT OPEN SOURCE

9. September 2010, 15:56 | by WD Milner | Full Article | Comments

There are many myths and misconceptions surrounding the open source model of software design and distribution. Many of these arise from the use of “open source” as a generic marketing term, but it has a very specific meaning. If a project or application you are considering doesn’t allow you to access the code, doesn’t allow the creation of derivative works, doesn’t allow for the redistribution of said works, then it is not open source.

Categories: ,



PRINTER SECURITY - OVERLOOKED LEAK

10. May 2010, 13:51 | by WD Milner | Full Article | Comments

A much overlooked item when considering information security is the printer. Often these printers contain hard drives that retain data even after printing, or in the case of multifunction devices after scanning documents, FAX options that permit sending to anyone, and completed documents left in out and in trays. There are some basic stes that can be taken to help reduce or eliminate security risks associated with printers.

Categories: ,



GAME REVIEW: F.E.A.R. 2: PROJECT ORIGIN

25. April 2010, 19:28 | by WD Milner | Full Article | Comments

Having played a bit of this on a friends machine I can say it is almost as good as the original for FPS play. I think the original was a bit better in terms of audio and some visual effects.

Categories: ,



MAGNETIC TAPE - ALIVE AND WELL

2. March 2010, 22:27 | by WD Milner | Full Article | Comments

For those who thought magnetic tape was old-fashioned, obsolete or simply non-existent anymore, guess again! Magnetic tape, and its billion dollar market are alive and well, and doing better than ever.

Categories: ,



RFID INSECURITY REDUX

30. June 2009, 17:30 | by WD Milner | Full Article | Comments

When RFID was starting to become popular a few years ago, those who suggested that there were security problems that were not being addressed (such as reading tags from a distance) were considered, if not part of the tinfoil hat crowd, then perhaps just that wee bit too paranoid. Proponents of RFID laughed at the idea that tags could be read more than a few inches away and that surrepticiously stealing data wasn't possible. Guess what?

Categories: ,



MICROSOFT INJECTS VULNERABILITY INTO FIREFOX

3. June 2009, 17:49 | by WD Milner | Full Article | Comments

Microsoft has done it again. The draconian and sheer corporate arrogance have resurfaced yet again in a Windows Update that surrepticiously installs a FireFox extension that opens wide vulnerabilities in that browser. Not surprisingly Microsoft feels no need to apologize and indeed considers this compromise to system security to be a service.

Categories: ,



WHEN E-MAIL STANDARDS ARE NOT

26. January 2009, 05:42 | by WD Milner | Full Article | Comments

I was recently recruited to help a friend set up e-mail on their Linux system. I discovered that not all providers follow the various e-mail standards that have developed over the years.

Categories: ,



MANAGING PARTITIONS

30. December 2008, 20:16 | by WD Milner | Full Article | Comments

While most average computer users never have a need, or desire, to play with or otherwise manipulate the partitions on their hard drive(s), those enthusiast users and computer professionals often have a need to do so. A great free tool can make this a painless operation. That free tool is GParted.

Categories: ,



OSI MNEMONIC (Humour)

19. October 2008, 18:48 | by WD Milner | Full Article | Comments

For those not intimately acquainted with networking theory remembering the Open Systems Interconnect Reference model can be difficult. Those needing to remember the layers can devise a mnemonic - a phrase where the first letter of each word in the phrase corresponds to the first letter in the name of each layer

Categories: ,



SUMMER IN THE DATA CENTER

24. June 2008, 00:27 | by WD Milner | Full Article | Comments

Summer is once again upon us in the Northern hemisphere and with it elevated temperatures. While good for the beach and outdoor activities, it can be a major concern for data center operators. Air conditioning is a major concern at any time of the year but more so of an issue now as the outdoor ambient temperatures rise. There are some factors to take into account when providing cooling and maintaining stable operations as temperatures climb which can help alleviate much of the burden on power air conditioning and computer systems.

Categories: ,



PRODUCT REVIEW: SAMSUNG SM932B PLUS

9. May 2008, 22:37 | by WD Milner | Full Article | Comments

While I've done product evaluations/reviews before I've never really published one on the Internet. A couple of months ago I needed a fairly inexpensive monitor and found the Samsung 932B Plus on sale at Staples. After several weeks of usage I thought I'd write a review as a practice piece . I hope you find it useful.

Categories: ,



MICROSOFT HOME SERVER PROBLEMS

12. April 2008, 20:42 | by WD Milner | Full Article | Comments

Microsoft discovered that many people had small home servers, and many more, especially those with large media collections, would like to have one and so it brought out Windows Home Server™. And then the gremlins appeared.

Categories: ,



GUARDING YOUR LAPTOP

29. March 2008, 19:41 | by WD Milner | Full Article | Comments [1]

It is estimated that a laptop computer is stolen about once every 50-55 seconds. The odds of this happening to you are one in ten. Some common sense in managing your laptop can go a long way to reducing its vulnerability to theft and the resultant hassles.

Categories: ,



MICROSOFT GETTING DESPERATE IN PUSHING VISTA ?

20. February 2008, 17:51 | by WD Milner | Full Article | Comments

A study by Info-Tech, and sponsored by Microsoft, has determined that upgrading an enterprise with 5000 systems from Windows XP to Windows Vista could save close to $50,000 and reduce carbon emissions by over 100 tonnes. But what's the catch?

Categories: ,



NEXT YOU’LL NEED TO VET YOUR PHONEBOOK

31. October 2007, 16:09 | by WD Milner | Full Article | Comments

Well Apple makes the news again with its iPhone. When introduced, Apple made news, and disgruntled customers, by tying it to a single carrier, AT&T. Associated Press reported last week that Apple was limiting the purchases to two devices per purchaser. But now, in what is sure to fuel even more sentiment against the company, if not its product, Apple has directed its retailers to only allow users to purchase them with credit or debit cards — no cash.

Categories: ,



THE AUTOMOTIVE INDUSTRY & THE ENVIRONMENT: GREEN OR GREED

15. October 2007, 15:41 | by WD Milner | Full Article | Comments

Let me start by saying that I'm not an environmental zealot by any means, but I do care about environmental issues. I picked up my printed copy of Electronic Engineering Times magazine today to read with coffee at lunch. An article lead in spread across the cover just begged for a response.

Categories: ,



ISO, ODF, OOXML & MICROSOFT

5. October 2007, 15:31 | by WD Milner | Full Article | Comments

Despite hard lobbying, and perhaps some attempted “ballot box stuffing” techniques, Microsoft has failed in its attempt to have its OOXML (Open Office XML) file format declared an ISO standard.

Categories: ,



OUT DAMN SPOT, I MEAN MICROSOFT !

11. September 2007, 15:14 | by WD Milner | Full Article | Comments

Microsoft, as usual doesn’t get it. While touting a renewed commitment to operating system security, they go and bypass the basic tenet of such - systems changes are not made without the owner’s explicit permission.

Categories: ,



WHO ARE YOU ?

14. August 2007, 14:04 | by WD Milner | Full Article | Comments

How much data would it take to uniquely identify you? No names, no Social Insurance or driver's license or passport numbers, no fingerprints or retinal patterns or DNA profiles. The answer might surprise you.

Categories: ,



802.11 INTERFERENCE STANDARDS

13. June 2007, 20:51 | by WD Milner | Full Article | Comments

Products based on the upcoming 802.11n standard are in the pipeline as the Wi-Fi Alliance announced the first products certified to the standard and a new test suite for latter in the summer. A question still unanswered is just how compatible these devices will be with legacy clients and how robust it will be as it is phased in.

Categories: ,



PITFALLS TO SSID CLOAKING

7. April 2007, 18:07 | by WD Milner | Full Article | Comments

Service Set Identification (SSID) has been frequently used as a method to add another layer of security to wireless LANs. While commonly considered a means to improve security, and indeed a recommended best-practice, it can in many cases actually reduce the effective security of the network.

Categories: ,



VANITY & SEGREGATION COME TO SECOND LIFE

3. April 2007, 21:37 | by WD Milner | Full Article | Comments [1]

As if there wasn’t enough vanity, prejudice, discrimination and subtle segregation in real society, now those who seek a break from the frustrating and demeaning judgements of day to day existance can reimmerse themselves in all the same superficial mind games when they go on-line.

Categories: ,



IPv6 SLOWLY DEPLOYED

26. March 2007, 20:49 | by WD Milner | Full Article | Comments

In the face of an advancing United States government deadline, major network and security vendors continue to scramble to include support for IPv6 in their leading router and firewall products.

Categories: ,



ULTRA CERTIFIED OR CERTIFIABLY USELESS ?

13. March 2007, 16:05 | by WD Milner | Full Article | Comments

I recent received a letter from Verisign promoting their new Extended Validation (EV) SSL Certificates. The latest “spin” seems just another way to get companies to jump through more compliance hoops and spend more of their money, most likely ineffectually.

Categories: ,



RFID, YOUR SHOES, AND YOU

15. December 2006, 17:47 | by WD Milner | Full Article | Comments

It appears that a group of researchers at the University of Washington have shown how you can use RFID for surveillance.

Categories: ,



COST OF MODERN PRINTING

15. November 2006, 21:13 | by WD Milner | Full Article | Comments

When it comes to making hard copies of the plethora of documents used on computers daily, the true cost of printing cannot be found in the price of the printer but in the consumables and other hidden costs.

Categories: ,



MICROSOFT GIVETH & MICROSOFT TAKETH AWAY

1. November 2006, 14:29 | by WD Milner | Full Article | Comments

Microsoft alters Vista licening to a friendlier version and at the same time attempts a subversion of open source.

Categories: ,



INTERNET EXPLORER 7 BUGGED ALREADY

20. October 2006, 15:10 | by WD Milner | Full Article | Comments

After almost two years of development and over five years since the last major upgrade to the company's browser Microsoft has released Internet Explorer 7. Within hours, a security company warned users of the new browser's first official bug.

Categories: ,



MICROSOFT (IN)SECURITY AWARDS

9. October 2006, 15:03 | by WD Milner | Full Article | Comments

In interesting, but not surprising irony, Microsoft has apparently awarded one of it᾿s “coveted” Most Valuable Professional (MVP) Award which honours developers and others who Microsoft believes made significant contributions to users in the past year, to a creator of adware that Microsoft’s own security scanner tags as malware.

Categories: ,



INTEL & nVIDIA

5. October 2006, 22:19 | by WD Milner | Full Article | Comments

Fueled by the recent acquisition of ATI Technologies by AMD, rumours have been crculating that Intel may be acquiring nVidia. This is a disquieting thought.

Categories: ,



PASSPORT SECURITY - GET IT NOW !

19. September 2006, 15:50 | by WD Milner | Full Article | Comments

Despite all the warnings and demonstrations about the ease of data theft from RFID tags from surreptitious reading of data to outright cloning, the United States government in its seemingly infinite blind stubborness has decided that RFID are just the thing for new passports.

Categories: ,



MICROSOFT PRIORITIES & DRM

13. September 2006, 15:38 | by WD Milner | Full Article | Comments

Microsoft bypassed its normal monthly patch cycle Tuesday and delivered what is probably the fastest security patch ever from the company.

Categories: ,



RESPONSE TIME & COMPUTER ANGST

9. September 2006, 21:04 | by WD Milner | Full Article | Comments

When a researcher at the University at Arlington, J.L. Guynes, started looking at how different people react to a slow computer, she thought that the greatest frustrations would be experienced by Type “A” personalities. Her comments was, “You can tell them by the way they bang on their keyboards.”

Categories: ,



SECURITY, CENSORSHIP & COPYRIGHT

4. September 2006, 22:00 | by WD Milner | Full Article | Comments [1]

Microsoft researchers are apparently experimenting with an automatic “ edit and replace” function for inclusion in the Internet Explorer Web browser. Intended for security it could have other uses.

Categories: ,



DESIGN AND QUALITY CONTROL

1. September 2006, 18:49 | by WD Milner | Full Article | Comments

Following the massive recall of lithium-ion batteries in Dell and Apple laptops batteries, speculation has arisen as to whether or not the problem indicates a larger problem - that laptop designs are just too hot and need to be redesigned. Notebook computers increasingly have higher thermal envelopes, and more localized hot spots.

Categories: ,



REGULAR EXPRESSIONS: AN INTRODUCTION

26. August 2006, 18:04 | by WD Milner | Full Article | Comments

The power and usefulness of good notation reaches beyond traditional programming languages. Regular expressions are one of the most broadly applicable specialized “languages”, a compact and expressive notational format for describing patterns of text. Besides being interesting from an algorithmic viewpoint, they are quite useful and , in their simpler forms, easy to implement.

Categories: ,



LAPTOP, NOTEBOOK ... TARGET!

22. August 2006, 20:26 | by WD Milner | Full Article | Comments

A recent spate of laptop thefts have returned to the spotlight a problem that has existed for as long as there have been laptop computers - theft of same. You would think that after approximately 20 years of use that individuals and business would have learned and this would not be such a serious issue. Sadly that is seldom the case.

Categories: ,



LINUX, MICROSOFT & LENOVO

16. August 2006, 18:25 | by WD Milner | Full Article | Comments

Lenovo, the new owner of the ThinkPad line of ntoebooks, announced plans to release two high-end ThinkPad notebooks that will support Novell SuSE Enterprise Desktop (SLED) 10. While this is a drastic reversal of the statement of a Lenovo executive this spring that the company would not be supporting Linux on the ThinkPad, it is still not quite as good as it sounds.

Categories: ,



SOFTWARE: OPEN, CLOSED AND DOCUMENTED

12. August 2006, 13:47 | by WD Milner | Full Article | Comments

In the world of software and documentation, long before there was closed source and open source there was . . . open source.

Categories: ,



THE OLD IS NEW AGAIN - AND HOT !

5. August 2006, 21:50 | by WD Milner | Full Article | Comments

Dell reinvents its notebooks using innovations that are over 20 years old, and potentially explosive.

Categories: ,



FULL DRIVE ENCRYPTION

2. August 2006, 22:49 | by WD Milner | Full Article | Comments

With the recent epidemic of lost and stolen laptops filled with sensitive information you would think that it wouldn’t be a problem; just encrypt the data. While a reasonable approach and one that many individuals do follow, it requires a certain self-discipline depending on the system chosen. And let’s face it, most people when they are in a hurry are lazy and take shortcuts, or just simply forget. Seagate intends to make such worries a thing of the past. They announced in June their FDE model 2.5 inch drive for notebooks.

Categories: ,



PLANNED OBSOLESCENCE

2. August 2006, 21:57 | by WD Milner | Full Article | Comments

Planned obsolesence. It is nothing new, it has been around for decades - the idea that a company deliberately perceptually renders one of its products less attractive and useful in order to sell a new version. perhaps the most high profile example is the automotive industry but it is pervasive in hi-tech as well.

Categories: ,



OBSOLETE OR JUST UNFASHIONABLE ?

2. August 2006, 13:38 | by WD Milner | Full Article | Comments

Are all those computers out there more than a year or two old obsolete? The PC manufacturers, software makers and marketers would certainly have us think so. But is it true?

Categories: ,



LIFETIME MEMORY

25. July 2006, 11:53 | by WD Milner | Full Article | Comments

MRAM chips have finally hit the market. In a combination of magnetics and silicon, it relies on magnetic tunnel junctions that act like transistors. Data is stored as resistance to current at these junctions. As magnetic polarization doesn't bleed off when power is removed, data can be retained indefinitely.

Categories: ,



INTEL, AMD AND THE CONSUMER

15. July 2006, 17:41 | by WD Milner | Full Article | Comments

While competition is invariably good for advancement of technology, and is generally good for the consumer - it can often lead to questions about how much better it might have served the consumer.

Categories: ,



SCO AND THE MISSING PROOF

10. July 2006, 02:48 | by WD Milner | Full Article | Comments

It would appear that SCO’s attempt to grab the brass ring by dubious means has met yet another setback. In Late June, 182 of 201 claims by SCO against IBM were dismissed by the U.S. District Court for lack of specifity, ie they failed to show where any code infringed their intellectual property.

Categories: ,



MULTICORES DON’T ADD UP

4. July 2006, 20:29 | by WD Milner | Full Article | Comments

A discussion with a colleague over his selection of a new CPU and paraphenalia ended up in a short clarification of what dual-core, and indeed multi-core processors in general mean to computing speed.

Categories: ,



SPAM ADDRESS HARVESTING

11. June 2006, 15:28 | by WD Milner | Full Article | Comments

A discussion of SPAM and how addresses get harvested led to the discovery of a forum where a Chinese stock tip spammer has over 200 pages of e-mail addresses listed on the web, and about 20,000 addresses per page. Stop and think about that for a minute. These addresses are there for any harvest bot that comes by. Despite numerous requests they somehow rationalize it as ‘free capitalism’.

Categories: ,



RESETTING TEXTPATTERN ADMIN PASSWORD

25. May 2006, 21:40 | by WD Milner | Full Article | Comments

Occasionally one forgets passwords. This can be particuarly frustrating when it locks you out of editing your own site content. Her's how to reset your Textpattern administrator password if you forget it.

Categories: ,



ISO & SECURITY

12. May 2006, 15:10 | by WD Milner | Full Article | Comments

While much discussion has occured surrounding the general inability to prevent cyberattacks, the addition of new technology at best impede attackers and forces them to find other approaches. A recently approved ISO specification may help some organizations.

Categories: ,



QUEST FOR A CMS

15. April 2006, 21:09 | by WD Milner | Full Article | Comments

Well, I have broken down and decided that making the site a bit interactive might not be such a bad thing and so am in the process of transferring the content over to a Content Management System. Choosing a CMS isn’t as simple as I thought it might have been.

Categories: ,



ENIAC TURNS 60

14. February 2006, 21:12 | by WD Milner | Full Article | Comments

ENIAC has turned 60. The first digital computer could do 5000 calculations a second. Unlike it's descendants it used a decimal rather than binary system.

Categories: ,



DESPERATION OR ILLUMINATION ?

6. June 2005, 21:31 | by WD Milner | Full Article | Comments

A recent article on TechRepublic regarding Apple’s proposed announcement of a switch to Intel processors started me thinking. Friends and colleagues and I have discussed this many times over the years. The use of the PowerPC and a dedicated operating system have been, along with a certain image, what have separated and marked Apple as distinct in the personal/micro computer marketplace. Will they alienate all those who have bought into the Apple platform and the Apple mystique, for whatever reason?

Categories: ,



RETROGRADE TECHNOLOGY

10. April 2005, 13:40 | by WD Milner | Full Article | Comments

While I don't always agree with John C. Dvorak in his various columns, his piece titled "Failed Promises, Failed Initiatives" ( PC Magazine; October 19, 2004; pp. 67) was dead on, and addresses a pet peeve of mine.

Categories: ,



WHAT IS RSS?

17. September 2004, 19:33 | by WD Milner | Full Article | Comments

RSS is a Web content syndication format. Its name is an acronym for 'Rich Site Summary' (also referred to as 'Really Simple Syndication').

Categories: ,



MANAGING YOUR E-MAIL

12. July 2004, 20:51 | by WD Milner | Full Article | Comments

Increasingly people who regularly use the Internet are seening the amount of e-mail in their inbox swell to considerabl amounts. The following are a few pointers to help control your e-mail before it becomes unmanageable.

Categories: ,



ANALOG MODEMS FOR LINUX & BSD

27. June 2003, 19:56 | by WD Milner | Full Article | Comments

The following is a list of analog, controller (hardware) based modems known to work with Linux systems. Note that this list is only for internal modems. This list is principally PCI as, with few exceptions, ISA modems are hardware based and work fine in a linux system. While there are a few software based ISA modems they are rare. Likewise almost any external RS232 serial port modem should work fine with Linux. There is great variation in USB modem compatibility which is not addressed in this list.

Categories: ,



THEOLOGY MEETS TECHNOLOGY (Humour)

17. May 2003, 20:54 | by WD Milner | Full Article | Comments

I came across a couple of old computer humour files yesterday and as they are amusing I have posted them for perusal. The first one is about a good bit newer than the second which dates back to the 1970's.

Categories: ,



VALLEY PIRATES

1. September 1999, 22:23 | by WD Milner | Full Article | Comments

Those who have seen the movie “Pirates of Silicon Valley” (based in part on Michael Swain’s book “Fire in the Valley”) got a look at some history. The movie used actual Altairs and Apples. The costuming was accurate, as was the portrayal of Steve Jobs. All was not perfect however.

Categories: ,



CHOOSING AN ISP FOR BUSINESS

10. June 1998, 21:00 | by WD Milner | Full Article | Comments

When it comes to choosing an ISP for corporate intranet, extranet or internet access, knowledge of the candidates is essential. The following is a list of considerations that may be used as a checklist when shopping for a corporate ISP.

Categories: ,



IRQ’S, DMA’S, I/O & PORTS

16. September 1997, 22:33 | by WD Milner | Full Article | Comments

When installing, managing and troubleshooting add-on PC cards it is important to understand how the system communicates with the cards in the expansion slots.

Categories: ,



PENTIUM DIVIDED

28. September 1995, 17:26 | by WD Milner | Full Article | Comments

While most people have heard about the Pentium flaw, the more telling concern is whether you really need to ged a replacement processor.

Categories: ,



COMMENTS ON THE HACKER’S MANIFESTO

14. November 1991, 18:08 | by WD Milner | Full Article | Comments [1]

The following are reprinted comments received when the “Conscience of a Hacker” and its preface were published on the Sleepy Hollow BBS. They are reprinted here as reflecting, expressed in less subtle terms, the same angst as Mentor’s more famous declaration.

Categories: ,



XMODEM PROTOCOL BASICS

6. January 1989, 17:34 | by WD Milner | Full Article | Comments

XMODEM is a method for exchanging files over a communications link between two computers. It is based on a program called MODEM written in 1977 by Ward Christensen for the CP/M-80 operating system. It was subsequently modified by Keith Petersen and became known as XMODEM. While many people use the XMODEM protocol on a daily basis, few are familiar with how it actually works. What follows is a basic discussion of the mechanics of XMODEM.

Categories: ,


Article Category: Technology


Comments are not enabled for all articles or documents.


Categories

Business
Communications
Electronics
Entertainment
Environment
Government
Internet and WWW
Miscellany
Music and Audio
News
Photography
Privacy
Psychology
Security
Society and Culture
Stage and Screen
Technology
Theology
Tips and Tricks
Web Design
Web Site


The Birches - Milner.ca Support Child Safety Online

 

 
 
 Help to FIGHT spam!
 • 
  •
•••