Prime Number Hide-and-Seek: How the RSA Cipher Works

Prime Number Hide-and-Seek: How the RSA Cipher Works
Variations on a Theme

From the same website as my last entry, but this one is more cool since it’s CS related and I FINALLY get ciphers :-)

Short Words to Explain Relativity

Short Words to Explain Relativity
So, have a seat. Put your feet up. This may take some time. Can I get
you some tea? Earl Grey? You got it.

And that’s about as large the words get in this nice explanation of Einstein’s Theory of Relativity. I like it…wish my secondary school physics textbooks were all written like this :-)

Migrate apps from Internet Explorer to Mozilla

Migrate apps from Internet Explorer to Mozilla
In the never-ending quest for cross-browser compatibility this article might shine some light on us padawan web developers when arranging our hand-coded stuff in such a way as for it to render excellently in both IE and Mozilla…at least until MS comes out with IE7 and then we’ll see how consistent pre-IE7 hacks will be.

Trinidad and Tobago Computer Society Podcasts

Trinidad and Tobago Computer Society Podcasts
Well, we’ve done it! A few of my fellow techies in Trinidad (along with yours truly) came together one evening and developed the first technology-oriented Podcast out of Trinidad and Tobago. It’s actually also the second podcast to be produced in the English-speaking Caribbean if I’m not mistaken. The info is good and feedback will be excellent since all things considered, we are all amateurs when it comes to broadcasting, and feedback would be excellent for us to continue to improve the quality of this podcast. Give it a listen folks, and please feel free to suggest future topics for discussion.

Ubuntu Forums – Howto: install Windows in Ubuntu Hoary for free

Ubuntu Forums – Howto: install Windows in Ubuntu Hoary for free
KQemu

This looks very promising…as soon as I get the laptop back up I’ll take a look at it more closely to see if I can emulate WinXP properly with it.

MenuetOS

MenuetOS
Cool other OS….It’s not POSIX complient but it is a nice example of what happens when you start from scratch.

Ultimate Boot CD – Overview

Ultimate Boot CD - Overview
I’ve always wanted one of these, where I’m given a “black-box” system which isn’t working to fix, and I usually want to start with the basic step of ensuring all hardware is functioning properly before looking for a software error.

NewsForge | Podcasting from Linux

NewsForge | Podcasting from Linux
This page has good info for persons like myself who prefer Linux to the other OS anyday, but are still perplexed sometimes at finding the right app for the right job. This may not be the correct set of apps for my purposes, but it is at least a start.

How to Write More Clearly, Think More Clearly, and Learn Complex Material More Easily

How to Write More Clearly, Think More Clearly, and Learn Complex Material More Easily
%u2014 R. D. G., 1975 Seems to be a very decent slideshow on the topic, must keep it around for reference.

Please, beware of phishing scams

I realise this has been going on for awhile because of the number of
emails I’m getting these days from ppl who have me in their address
book, however I haven’t seen any informative posts on it, so I guess
this is as good a time to start as any….
http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm gives info on how NOT to get hooked into a phishing scam ( sms.ac and hi5 seem to
be most popular so far in my circles).
Looking at http://www.mobiletracker.net/archives/2005/04/03/scam-spam-or-fun-sms.sc
I realise that sms.ac and hi5 apparently trick users into willingly giving access to their address books by requesting your webmail’s (mostly hotmail) username and password, starting off with a seemingly
personalised message from someone you know (this email is usually computer generated using your email address and the name of the person who’s address book is currently being stolen).
The wikipedia entry for phishing is at
http://en.wikipedia.org/wiki/Phishing for those who need to learn more and what is also good is that it has some samples of the kinds of
phishing scam emails you might receive.
A list of past reported phishing attacks is listed at http://www.antiphishing.org/phishing_archive.html so you can check or report anything suspicious that comes your way using this link.
For those already caught, your address books may have already been hacked and that information spread for the masses, but you can still at the very least change your login passwords to protect yourself,
since the phishers could in theory sell not just your addressbook but your captured username/passwords to others who might have more than address book raiding intentions.