US and British jets still involved in skirmishes with Iraq
Sushi Fortune Telling
4/1/00: Will Spiritual Robots Replace Humanity By 2100? -- a symposium at Stanford with all the usual suspects
Some may find it hard to believe, but there are still people who refuse to see the light of C++, and insist on programming in that backward langauge, C.
Shave your own head with this.
2100 reviews of programming books at ACCU - Reviews Index Page
"In fact, UNIX was originally the _only_ reason C was developed. However, C turned out to be a very powerful language that can be used for all purposes."
-- C and the operating system UNIX
The Programmer Of The Month (POTM) Page
May 19-21 2000, Palo Alto $500:
Spring 2000 Senior Associates Gathering
marvin minsky - Society of Mind
eric raymond - Cathedral and the Bazaar
bill joy - cofounder of Sun
tim o'reilly - those animal print books
hemos - slashdot
I am the Master of Time!!!
Do not heed the stranger with the Antlers of the Damned
Toss a frog in a blender or a gerbil in a microwave here, if you haven't already.
Mozilla dot Party (celebrating 2nd anniversary) at the Sound Factory, 525 harrison at 1st, san francisco
Search for patents by keyword or number here. An interesting example is the National Security Agency's word forest search patent.
NY mayor, Giuliani, who is incidentally running against Hilary Clinton for Senate, denounced
a work of art that criticied his, Jesse Helms', Pat Buchannan's, and Pat Robertson's stance against artistic self-expression.
Use OptOut to detect and remove "Spy Ware" from your computer.
Vermont citizen is silenced for political criticism, a constitutionally protected form of free speech.
Euroblogs and XenoBlogs for a change from the common AmeriBlogs.
Play with the William Shatner Acting Simulator "at all cost!"
Shiny, happy, Cruel Site of the Day
Ahhh... back to blogging...
And Sean, Its not the media but the content that matters. :P
Serge this seems so mainstream for you to participate.
Legalized torture in Israel is becoming a real possibility.
Is this the solution to the dynamic contect cahing problem?
Don't play the part of the offended sausage
So much to blog so little time...
The Internet Junkbuster will block ads and/or cookies. One of the nices features is that you can import large block lists that others have created (and there's no shortage of them on the internet). You can also use Junkbuster to create wafers (forged cookies).
If you're stuck with Winblows and don't have dynamic cookie filtering software yet, check out Cookie Pal from Kookaburra Software
Former CIA Director admits that US conducts industrial espionage.
Thought Reform 101 from Reason magazine
If you like your art dark... Russian Gothic Page - Dark Gothic Art - Paintings - Zdislaw Beksinski
A Picture of Weblogs shows you exactly how incestuous weblogs are.
See? No blowfish in here, little boy!
Meta surveillance at Spook
Rated "Most Highbrow Site" on the Internet by Brill's Best of the Web, Arts & Letters Daily is worth taking a look at at least to determine for yourself whether this is true, and whether its the kind of site you want to look at anyway...
Have The Counter count hits to your site and do some rudimentary statistics for you, free.
You can ask your friendly hackers on this site to scan any site you care to name for you... and they'll do it while you wait!
To experience this in the comfort of your own home check out the The Infinity Project
A perl module to craft custom ethernet packets. Nice!
I've created a bare-bones Arrowpoint load-balancer keep-alive simulator for testing some proprietary software using it. Very very useful... You can find it here:
Net::RawIP Home Page
How much can any web server that you visit find out about you without much trouble?
Look here to do an automatic test.
How about a database of "all publicly known vulnerabilities and security exposures"?
Yesterday I founded a Yahoo club for the discussion of Samhain.
The Samhain filesystem integrity monitoring tool http://samhain.netpedia.net/ is a vast improvement over tripwire and the like. It offers a steganographic option to hide your datafiles and log files, making its presence hard to detect and meaningfully modify. It can also report to a central log server to avoid leaving obvious traces through syslog, or cleartext email.