Security and Hacking Notes
Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two...
Because everyone is entitled to my opinion
Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two...
Useful Oracle DBMS Tips and Tricks CHECKING WORKSPACE ALLOCATION On DW’s NT box, click on...
Useful Unix commands To search text in files and all subdirectories find [directory] -name [files]...
A creative, quality-minded software engineer with over twenty years experience programming mainframe, pc client server, and internet web based applications…
In the early 1990's, I distributed several commercial software packages. Applications such as children's and adult level games, Internet applications…