Links to various homeland securty related web sites where the
latest news and information can be obtained. Many of the sites also have
further tips regarding how to prepare for disaster situations regarding
homeland security.
Tuesday, March 08, 2005
SatCom Systems - Government and Homeland Securty:
SatCom Systems develops and provides critical communication solutions for First Responders and Incident Command Operations in Homeland Defense - available today and ready for the future.
The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.
First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »
The borders the United States shares with Mexico and Canada are the longest undefended national boundaries in the world. Major portions of these boundaries pass through isolated terrain with, relatively, few ËmannedÓ border crossings. Homeland Defense requires a coordinated response across multi-agency and jurisdictional lines to properly maintain the safety of the citizens from unfriendly incursions across this vast area. Coordinated, interoperable voice and data communications are essential elements for effective protection, and certainly any response.
First Responder and Incident Command Operations in Homeland Defense demand the ability to transmit and receive voice and data anywhere within the ËoperationalÓ area set forth by an incident. This area is dynamically determined as the response to an incident occurs, without regard for geographic or jurisdictional boundaries. The fluid dynamics of rapidly unfolding events creates an interesting set of challenges for even the most experienced organizations. Effective voice and data communications vital to the incident should not be part of these challenges. more »
Monstrous Homeland Securty - Lawyer's Boon and Citizen's DOOM!
By Harsha Sankar
From: WETHEPEOPLE_UNITED@yahoogroups.com
Dear Citizen, December 2002
It is the utmost hope for the sake of next generations that Americans now realize their freedoms have irrevocably been harmed in 2002. Due to the passage of the monstrous Homeland Security Act, the average American can expect the following.
Every credit card purchase, every magazine subscription, every medical prescription, every visited Web site, every e-mail, every academic grade, every bank deposit,and even every booked trip Will Be Recorded. All these transactions and communications will go into a vast database of the Defense Department. This once far-fetched Orweillan scenario is now reality.
The Information Awareness Office will now have the data-mining power to "snoop" on all Americans.Two hundred million dollars have been appropriated to create computer dossiers on all citizens. This Act, along with the U.S.A. Patriotic Act, has officially marked the end of Constitution's 4th Amendment. Since all matters now filter through the judiciary, the official inauguration of the police state will be a boon to the bar associations cult.Read More
From: WETHEPEOPLE_UNITED@yahoogroups.com
Dear Citizen, December 2002
It is the utmost hope for the sake of next generations that Americans now realize their freedoms have irrevocably been harmed in 2002. Due to the passage of the monstrous Homeland Security Act, the average American can expect the following.
Every credit card purchase, every magazine subscription, every medical prescription, every visited Web site, every e-mail, every academic grade, every bank deposit,and even every booked trip Will Be Recorded. All these transactions and communications will go into a vast database of the Defense Department. This once far-fetched Orweillan scenario is now reality.
The Information Awareness Office will now have the data-mining power to "snoop" on all Americans.Two hundred million dollars have been appropriated to create computer dossiers on all citizens. This Act, along with the U.S.A. Patriotic Act, has officially marked the end of Constitution's 4th Amendment. Since all matters now filter through the judiciary, the official inauguration of the police state will be a boon to the bar associations cult.Read More
Homeland Securty abandons MS for Linux
The United States Department of Homeland Security ( www.dhs.gov )
changed its servers over to Oracle on Linux last week, after running
on Windows 2000 for several months. Experts say that it is unlikely the
change is a reaction to "Slammer," the MS SQL server worm that rocked
the Internet last week. "
changed its servers over to Oracle on Linux last week, after running
on Windows 2000 for several months. Experts say that it is unlikely the
change is a reaction to "Slammer," the MS SQL server worm that rocked
the Internet last week. "
Defense tech debated
BY Frank Tiboni
Published on March 04, 2005
Congress will scrutinize the Defense Department's $30.1 billion budget request for military information technology spending for fiscal 2006 by questioning redundancy in the services' warfighting IT systems.
DOD IT officials requested $7.4 billion for command, control, communications and computer systems next year — a $1 billion increase from what they received last year. Lawmakers think troops could better communicate and access intelligence in Iraq and Afghanistan if they consolidated them.
Published on March 04, 2005
Congress will scrutinize the Defense Department's $30.1 billion budget request for military information technology spending for fiscal 2006 by questioning redundancy in the services' warfighting IT systems.
DOD IT officials requested $7.4 billion for command, control, communications and computer systems next year — a $1 billion increase from what they received last year. Lawmakers think troops could better communicate and access intelligence in Iraq and Afghanistan if they consolidated them.
On Line for Independent Inventors (24FEB2005)
This is a transcript of the on-line chat held on Thursday, February 24, 2005.
This final version is an edited version of the actual transcript. Where you see “edited answer” below, the original on-line chat answer has been modified to ensure completeness and accuracy of the answers originally provided by USPTO staff.
As in our previous chats held so far, we received hundreds more questions then we had time to answer. We selected questions for posting which we believed would be of interest to others besides the author of the question. Once we selected the question, we developed the answer, and then posted the question and the answer for viewing by the public. During the actual chat, occasionally the answer was actually posted before the public saw the question. This edited transcript always has the question before the answer. In reviewing the transcript below, if you see the time of the answer before the time of the question, we originally posted them out of sequence. More Info
This final version is an edited version of the actual transcript. Where you see “edited answer” below, the original on-line chat answer has been modified to ensure completeness and accuracy of the answers originally provided by USPTO staff.
As in our previous chats held so far, we received hundreds more questions then we had time to answer. We selected questions for posting which we believed would be of interest to others besides the author of the question. Once we selected the question, we developed the answer, and then posted the question and the answer for viewing by the public. During the actual chat, occasionally the answer was actually posted before the public saw the question. This edited transcript always has the question before the answer. In reviewing the transcript below, if you see the time of the answer before the time of the question, we originally posted them out of sequence. More Info
Trademark Applications and Registrations Retrieval (TARR)
Important Notice Concerning TARR:
TARR is intended for use by the general public. Due to limitations of equipment and bandwidth, TARR is not intended to be a source for bulk downloads of USPTO data. Bulk data may be purchased from USPTO at cost (see the USPTO Products and Services Catalog). Individuals, companies, IP addresses, or blocks of IP addresses who, in effect, deny service to the general public by generating unusually high numbers of daily TARR accesses (searches, pages, or hits), whether generated manually or in an automated fashion, may be denied access to these servers without notice. More Info
TARR is intended for use by the general public. Due to limitations of equipment and bandwidth, TARR is not intended to be a source for bulk downloads of USPTO data. Bulk data may be purchased from USPTO at cost (see the USPTO Products and Services Catalog). Individuals, companies, IP addresses, or blocks of IP addresses who, in effect, deny service to the general public by generating unusually high numbers of daily TARR accesses (searches, pages, or hits), whether generated manually or in an automated fashion, may be denied access to these servers without notice. More Info
Monday, March 07, 2005
Security In The News
[INFOCON] US-CERT Cyber Security Alert SA04-196A Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express
National Cyber Alert System
Cyber Security Alert SA04-196A
Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express
Systems Affected
* Microsoft Windows Systems
Overview
Microsoft has released a Security Bulletin Summary for July, 2004.
There are several security bulletins released in this summary.
I. Description
Microsoft's Security Bulletin Summary for July, 2004 includes
summaries of several bulletins that address vulnerabilities in various
Windows applications and components. For more technical information,
see US-CERT Technical Alert TA04-196A.
II. Impact
An attacker may be able to control your computer if these
vulnerabilities are exploited.
III. Solution
Apply a patch
Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.
Do not follow unsolicited links
Do not click on unsolicited links received in email, instant messages,
web forums, or chat rooms. While this is generally a good security
practice, following this behavior will not prevent the exploitation of
these vulnerabilities in all Read More
National Cyber Alert System
Cyber Security Alert SA04-196A
Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express
Systems Affected
* Microsoft Windows Systems
Overview
Microsoft has released a Security Bulletin Summary for July, 2004.
There are several security bulletins released in this summary.
I. Description
Microsoft's Security Bulletin Summary for July, 2004 includes
summaries of several bulletins that address vulnerabilities in various
Windows applications and components. For more technical information,
see US-CERT Technical Alert TA04-196A.
II. Impact
An attacker may be able to control your computer if these
vulnerabilities are exploited.
III. Solution
Apply a patch
Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.
Do not follow unsolicited links
Do not click on unsolicited links received in email, instant messages,
web forums, or chat rooms. While this is generally a good security
practice, following this behavior will not prevent the exploitation of
these vulnerabilities in all Read More
Sunday, February 27, 2005
Firefox foils phishing flaw
Join ITtoolbox Security Alerts
Your daily insight into Security. Privacy More Alerts
security-daily-briefing security-jobs security-whitepapers
Firefox foils phishing flaw
VNUNet.com
By Steve Ranger
Friday, February 25, 2005
Security News Home
Click here to find out more!
All Firefox users are being encouraged to download a security update for the popular open source browser.
The update includes several fixes to guard against spoofing and arbitrary code execution, and improves stability, said The Mozilla Foundation.
The Firefox security update - Firefox 1.0.1 - is available for the 25 million users who have already downloaded the free browser.
The Mozilla Foundation said that it "encourages all users to download the update", which is available here.
"Regular security updates are essential for maintaining a safe browsing experience for our users," said Chris Hofmann, director of engineering at Mozilla.
"The Mozilla Foundation has developed a community of users and developers who continuously provide feedback on Mozilla software, and as a result of that constant vigilance we are able to provide quick and effective responses to security vulnerabilities."
Mozilla said that it evaluates security issues on an ongoing basis and will issue security updates "as warranted". More information is available in the release notes here.
To see more of VNUNet go to http://www.vnunet.com
Copyright © 2004 VNU Business Online Limited (UK) [All rights reserved]
Your daily insight into Security. Privacy More Alerts
security-daily-briefing security-jobs security-whitepapers
Firefox foils phishing flaw
VNUNet.com
By Steve Ranger
Friday, February 25, 2005
Security News Home
Click here to find out more!
All Firefox users are being encouraged to download a security update for the popular open source browser.
The update includes several fixes to guard against spoofing and arbitrary code execution, and improves stability, said The Mozilla Foundation.
The Firefox security update - Firefox 1.0.1 - is available for the 25 million users who have already downloaded the free browser.
The Mozilla Foundation said that it "encourages all users to download the update", which is available here.
"Regular security updates are essential for maintaining a safe browsing experience for our users," said Chris Hofmann, director of engineering at Mozilla.
"The Mozilla Foundation has developed a community of users and developers who continuously provide feedback on Mozilla software, and as a result of that constant vigilance we are able to provide quick and effective responses to security vulnerabilities."
Mozilla said that it evaluates security issues on an ongoing basis and will issue security updates "as warranted". More information is available in the release notes here.
To see more of VNUNet go to http://www.vnunet.com
Copyright © 2004 VNU Business Online Limited (UK) [All rights reserved]
NY teen charged over IM spam attack
By John Leyden, The Register Feb 22 2005 10:42AM
Click here for Core Impact!
A New York teenager has become the first American to be arrested for sending spam messages across IM networks. Anthony Greco, 18, of Cheektowaga, New York, was charged with violations of the CAN-SPAM Act after allegedly sending 1.5m messages punting mortgage refinancing and adult pornography to MySpace.com users in October and November 2004. According to a criminal complaint, Greco created thousands of fraudulent instant messaging accounts on MySpace.com to bombard its users with junk IM messages. Greco allegedly threatened additional attacks unless MySpace.com, an online community site popular with teenagers, hired him as a consultant. He travelled to Los Angeles last week hoping to granted "exclusive" rights to send commercial e-mail to users of the MySpace.com only to be arrested by officers from the US Secret Service and the Los Angeles Police Department after he stepped off the plane.
Click here for Core Impact!
A New York teenager has become the first American to be arrested for sending spam messages across IM networks. Anthony Greco, 18, of Cheektowaga, New York, was charged with violations of the CAN-SPAM Act after allegedly sending 1.5m messages punting mortgage refinancing and adult pornography to MySpace.com users in October and November 2004. According to a criminal complaint, Greco created thousands of fraudulent instant messaging accounts on MySpace.com to bombard its users with junk IM messages. Greco allegedly threatened additional attacks unless MySpace.com, an online community site popular with teenagers, hired him as a consultant. He travelled to Los Angeles last week hoping to granted "exclusive" rights to send commercial e-mail to users of the MySpace.com only to be arrested by officers from the US Secret Service and the Los Angeles Police Department after he stepped off the plane.
Friday, February 25, 2005
Potential ID Theft Victims Eye Information
By RACHEL KONRAD
SAN FRANCISCO (AP) - Warren Lambert thought it was just another piece of junk mail until he read the letter more closely and learned that con artists may have obtained his Social Security number, name and address - just what they need to steal his identity and ruin his credit.
Lambert is one of nearly 145,000 Americans rendered vulnerable by a breach of the computer databases of ChoicePoint Inc., a leading trafficker in a growing pool of information about who we are, what we own, what we owe and even where we go.
CHOICEPOINT INC
NYS:CPS
Updated: 2005/02/24 ET
41.00 -0.22
The Georgia-based company began mailing the warning letters after acknowledging this month that thieves opened more than 50 ChoicePoint accounts by posing as legitimate businesses.
Lambert, a retired banker in San Francisco, now spends several hours a day phoning customer service agents, poring over credit card statements, ordering credit reports and checking bank accounts.
He worries that thieves will eventually do to him what sheriffs detectives in Los Angeles say they've done to more than 700 other people - reroute his mail, ring up credit card debts, buy a car or even commit a felony in his name.
read more »
SAN FRANCISCO (AP) - Warren Lambert thought it was just another piece of junk mail until he read the letter more closely and learned that con artists may have obtained his Social Security number, name and address - just what they need to steal his identity and ruin his credit.
Lambert is one of nearly 145,000 Americans rendered vulnerable by a breach of the computer databases of ChoicePoint Inc., a leading trafficker in a growing pool of information about who we are, what we own, what we owe and even where we go.
CHOICEPOINT INC
NYS:CPS
Updated: 2005/02/24 ET
41.00 -0.22
The Georgia-based company began mailing the warning letters after acknowledging this month that thieves opened more than 50 ChoicePoint accounts by posing as legitimate businesses.
Lambert, a retired banker in San Francisco, now spends several hours a day phoning customer service agents, poring over credit card statements, ordering credit reports and checking bank accounts.
He worries that thieves will eventually do to him what sheriffs detectives in Los Angeles say they've done to more than 700 other people - reroute his mail, ring up credit card debts, buy a car or even commit a felony in his name.
read more »
USS Jimmy Carter commissioned
GROTON, Connecticut (AP) -- The USS Jimmy Carter entered the Navy's fleet Saturday as the most heavily armed submarine ever built, and as the last of the Seawolf class of attack subs that the Pentagon ordered during the Cold War's final years.
The $3.2 billion Jimmy Carter was commissioned Saturday, the first submarine named after a living ex-president.
Carter, himself a submariner during his time in the Navy, was on hand for the ceremony signaling the end of an era in submarining.
"The most deeply appreciated and emotional honor I've ever had is to have this great ship bear my name," Carter said in remarks prepared for the ceremony at the Naval Submarine Base New London.
Carter was joined by his wife, Rosalynn, former Vice President Walter Mondale and his wife, Joan, and Stansfield Turner, CIA director in the Carter administration.
The 453-foot, 12,000-ton submarine has a 50-torpedo payload and eight torpedo tubes. And, according to intelligence experts, it can tap undersea cables and eavesdrop on the communications passing through them. read more »
The $3.2 billion Jimmy Carter was commissioned Saturday, the first submarine named after a living ex-president.
Carter, himself a submariner during his time in the Navy, was on hand for the ceremony signaling the end of an era in submarining.
"The most deeply appreciated and emotional honor I've ever had is to have this great ship bear my name," Carter said in remarks prepared for the ceremony at the Naval Submarine Base New London.
Carter was joined by his wife, Rosalynn, former Vice President Walter Mondale and his wife, Joan, and Stansfield Turner, CIA director in the Carter administration.
The 453-foot, 12,000-ton submarine has a 50-torpedo payload and eight torpedo tubes. And, according to intelligence experts, it can tap undersea cables and eavesdrop on the communications passing through them. read more »
Thursday, February 24, 2005
Michael Jackson
Michael Jackson has been told the trial against him will go ahead - despite his pleading with the judge to have the case thrown out.
The troubled singer was informed there was enough evidence to warrant the child abuse charges - which includes child abduction, false imprisonment and extortion.
The judge also rejected a request from Jackson's lawyers to exclude vital evidence from his Neverland ranch. more »
The troubled singer was informed there was enough evidence to warrant the child abuse charges - which includes child abduction, false imprisonment and extortion.
The judge also rejected a request from Jackson's lawyers to exclude vital evidence from his Neverland ranch. more »
Wednesday, February 23, 2005
Big Bangs

Last Friday at NASA headquarters, astronomers met to discuss the brightest explosion ever detected in our galaxy: a 0.2-second flash that packed as much punch as our sun produces in 200,000 years. The incredible flash was so bright that it knocked satellites' instruments out of whack and interfered with low-frequency radio waves on Earth.
The blast came from a rare entity called a magnetar roughly halfway across the Milky Way--50,000 light years from Earth. That may sound a long way off, but as one astrophysicist pointed out, "Astronomically speaking, this explosion happened in our backyard." If it had happened just 10,000 light years away, it might have blown away the ozone layer.
Thankfully, the nearest known magnetar is 13,000 light years from here. So what's a magnetar? Basically, it's a neutron star with a super-strong magnetic field. And what's a neutron star? It's the remnant of a different sort of stellar explosion--a supernova.
Want to learn more?
See shots of December's big blast
See what you're missing . . .
Become a lifetime member of
KnowledgeNews today!
Tuesday, February 22, 2005
Stop the World, I Want to Get Off
Earth's surface consists of a hard shell called the crust, which is broken into large chunks called plates. Plates can hold entire continents (as the North American Plate does) or entire oceans (as the Pacific Plate does). Often, they hold bits of both.
The crust is actually a hard exterior on top of a much deeper layer, the mantle. Most of the mantle is made of thick liquid rock called magma, melted by heat from an even deeper layer--the Earth's core. The plates that make up the crust basically "float" on the mantle's magma.
That means the plates and everything on them, including whole continents and oceans, are in continual motion. Their movement is slow, ranging from less than an inch a year to a top speed of about 6 inches (15 cm) a year, but it's real. Just what drives the movement isn't clear. It could be gravity. It could be convection currents within the mantle. It could be both.
Want to learn more?
See what happens when you move tectonic plates
See what you're missing . . .
Become a lifetime member of
KnowledgeNews today!
The crust is actually a hard exterior on top of a much deeper layer, the mantle. Most of the mantle is made of thick liquid rock called magma, melted by heat from an even deeper layer--the Earth's core. The plates that make up the crust basically "float" on the mantle's magma.
That means the plates and everything on them, including whole continents and oceans, are in continual motion. Their movement is slow, ranging from less than an inch a year to a top speed of about 6 inches (15 cm) a year, but it's real. Just what drives the movement isn't clear. It could be gravity. It could be convection currents within the mantle. It could be both.
Want to learn more?
See what happens when you move tectonic plates
See what you're missing . . .
Become a lifetime member of
KnowledgeNews today!
Monday, February 21, 2005
Henry Ford Puts the World on Wheels
Henry Ford was born in 1863 in Dearborn, Michigan, four weeks after the Battle of Gettysburg. As a boy, he had an instinct for gadgets and machines but little use for literature or history, which he considered "more or less bunk." He quit school at the age of 15 and soon headed for the big city. Want to learn more?
Browse a gallery of Model Ts
See what you're missing . . .
Become a lifetime member of
KnowledgeNews today!
Browse a gallery of Model Ts
See what you're missing . . .
Become a lifetime member of
KnowledgeNews today!
America’s Missing: Broadcast Emergency Response
CodeAmber.org went live on August 23rd, 2002. Since that time we have grown rapidly as you can see by the statistics in the top right hand column. The number of Web and Desktop tickers are real time counters but we update the number of tickers served on the first of each month.
Saturday, February 19, 2005
Beirut's Roots
This week, a bomb in Beirut killed former Lebanese prime minister Rafik Hariri. The popular leader resigned last October while calling on Syria to remove the 14,000 troops it keeps inside Lebanon. Now that call is coming even louder. In fact, Hariri's funeral quickly turned into an anti-Syrian rally, with more than 150,000 mourners chanting "Syria out! Syria out!"
Your paper will tell you that Syrian troops have been deployed around Beirut for decades, ever since the Lebanese civil war raged from 1975 to 1990. It probably won't mention that Beirut itself has been around since biblical times--and that its relationship with Syria has ancient roots, too.
Beirut's Roots
The first mention of a city called "Biruta" dates to the 15th century BC. Back then, the region now called Lebanon was inhabited by seafaring traders whom the Old Testament calls Canaanites.
The Greeks called these merchant mariners Phoenicians (from "phoinikies," a purple dye they sold), and adapted their alphabetic script for their own use. Unfortunately for the Phoenicians, neighbors coveted more than their letters. Beirut's wealth made it a target. At various times, the ancient city and its natural harbor were conquered by Egyptians, Assyrians, Babylonians, Greeks, and Romans.
Want to learn more?
Visit Lebanon's historic sites online
All for a one-time payment of just $34.95--
no renewals, ever!
KnowledgeNews.net * 123 South 6th Street * Marshall, Illinois 62441 * USA
Questions? Comments? Suggestions? Write to us at info@knowledgenews.net
We read every note and answer as quickly as possible.
Your paper will tell you that Syrian troops have been deployed around Beirut for decades, ever since the Lebanese civil war raged from 1975 to 1990. It probably won't mention that Beirut itself has been around since biblical times--and that its relationship with Syria has ancient roots, too.
Beirut's Roots
The first mention of a city called "Biruta" dates to the 15th century BC. Back then, the region now called Lebanon was inhabited by seafaring traders whom the Old Testament calls Canaanites.
The Greeks called these merchant mariners Phoenicians (from "phoinikies," a purple dye they sold), and adapted their alphabetic script for their own use. Unfortunately for the Phoenicians, neighbors coveted more than their letters. Beirut's wealth made it a target. At various times, the ancient city and its natural harbor were conquered by Egyptians, Assyrians, Babylonians, Greeks, and Romans.
Want to learn more?
Visit Lebanon's historic sites online
All for a one-time payment of just $34.95--
no renewals, ever!
KnowledgeNews.net * 123 South 6th Street * Marshall, Illinois 62441 * USA
Questions? Comments? Suggestions? Write to us at info@knowledgenews.net
We read every note and answer as quickly as possible.
Friday, February 18, 2005
The official support and discussion site for FeedBurner.
So you've burned your feed and you've dropped the "FeedBurner chicklet" on your web page or blog. Congratulations! When you go look at your feed stats, however, are you seeing all of your feed traffic? Maybe not. The rest of this entry contains some hints and tips to make your stats as useful and accurate as they can be. more»
O'Reilly Books
Google Hacks,
2nd Edition Google Hacks, 2nd Edition -- Featuring dozens of refreshed hacks, plus 25 completely new ones, this updated edition of Google Hacks is a collection of real-world solutions to practical Google research problems. Thanks to these industrial-strength tips, now you can easily save hours of research time mining Google. Best of all, each of the book's 100 hacks is easy to read and digest; there's no confusing terminology or extraneous information to hamper your understanding. Sample Hacks are available free online. more »
2nd Edition Google Hacks, 2nd Edition -- Featuring dozens of refreshed hacks, plus 25 completely new ones, this updated edition of Google Hacks is a collection of real-world solutions to practical Google research problems. Thanks to these industrial-strength tips, now you can easily save hours of research time mining Google. Best of all, each of the book's 100 hacks is easy to read and digest; there's no confusing terminology or extraneous information to hamper your understanding. Sample Hacks are available free online. more »
Subscribe to:
Posts (Atom)