In a non-scientific study conducted in the summer of 2002, we researched the availability of available Accesskeys which had not already been reserved by various other software technologies which might be employed by various users. The results indicated a real problem in that most ALT __ keystroke combinations (assuming the Windows operating platform) have already been reserved by one type of application or another.
In an open wireless network, all requests to the internet made from your computer are passed as plain text over the airwaves. Most wireless users are aware of this and often avoid using POP based email, ftp/telnet programs, and the like. Since all the information being passed over the network is in plain text, anyone with a sniffer can easily capture and view the data. This includes your emails, account information, chat sessions, etc. However, this simple fact does not stop people from surfing their favorite online sites, such as informit.com, to read up on the latest news or do some innocent research.
This is a kool perspective about Nerds and Tact (or rather the lack of) by Jeff Bigler that I really liked. It explains the tact gap between what he calls "normal" people and nerds. I wouldn't have used the term "normal people" but rather "common people" to describe non-nerds because the word "normal" implies that they are normal where "common" implies that they are merely more numerous than nerds.
I have for years been interested in sleep research due to my professional involvement in memory and learning. This article attempts to produce a synthesis of what is known about sleep with a view to practical applications, esp. in people who need top-quality sleep for their learning or creative achievements.
Whether your main business is Web design or backend development, chances are you spend a fair amount of time creating forms for user input. So you already know that the default appearance of forms isn't always appropriate for the look and feel of your site.
In this article we'll look at how you can use CSS to create attractive and usable forms.
Drop shadows are cool, but adding them to elements of a web page can be a pain. You can fiddle with background images, tables, pure CSS solutions, Internet Explorer PNG limitations, or fixed single-use shadows tied to an image and a particular background.
Ajax is also a dangerous technology for web developers, its power introduces a huge amount of UI problems as well as server side state problems and server load problems. I’ve compiled a list of the many mistakes developers using Ajax often make.
TCP Wrappers can be used to GRANT or DENY access to various services on your machine to the outside network or other machines on the same network. It does this by using simple Access List Rules which are included in the two files /etc/hosts.allow and /etc/hosts.deny .
As this article has shown, menu programming with wxPerl is an extremely simple task. Wx::MenuBar and Wx::Menu's methods are very easy to use and remember. If you understood this article, you can do anything possible with menus in your wxPerl programs.
In this article, I show you how to use the scp (secure copy) command without needing to use passwords. I then show you how to use this command in two scripts. One script lets you copy a file to multiple Linux boxes on your network, and the other allows you to back up all of your Linux boxes easily.
Evolution was and still is the only scientific theory for life that can explain how we get complexity from simplicity and diversity from uniformity.
ID offers nothing comparable. It begins with complexity — a Supreme Being — and also ends there. The explanations offered by ID are not really explanations at all, scientists say. They're more like last resorts. And, scientists argue, there is a danger in pretending that ID belongs next to evolution in textbooks.