WahohohoI just got 2 Zend T-shirts, it was nice from Zend to send thos T-shirts.I wonder if there is anyone preparing to Zend Cert so we can study/work togethernow I’m waiting my Zend Cert guide + Andi php 5 book Same to LPI 101 I’m preparing for it and now waiting my LPIC study guide,

IT could have come from the pages of a Tom Clancy novel, but PC users tempted to view girlie pictures on their screens this Christmas should beware. They could find themselves unwittingly recruited into an international plot to crash Chechen rebel websites. A super-virus disguised as nude pictures is being used to attack internet sites… Read Article →

And the beast shall be made legion. Its numbers shall be increased a thousand thousand fold. The din of a million keyboards like unto a great storm shall cover the earth, and the followers of Mammon shall tremble. from The Book of Mozilla, 3:31 And the beast shall come forth surrounded by a roiling cloud… Read Article →

Jack, a smart businessman, talks to his son…Jack: I want you to marry a girl of my choiceSon: “I will choose my own bride”.Jack: “But the girl is Bill Gates’s daughter.”Son: “Well, in that case…”Next Jack approaches Bill Gates…Jack: “I have a husband for your daughter.”Bill Gates: “But my daughter is too young to marry.”Jack:… Read Article →

Dear Internet Explorer: It’s over. Our relationship just hasn’t been working for a while, and now, this is it. I’m leaving you for another browser. I know this isn’t a good time–you’re down with yet another virus. I do hope you feel better soon–really, I do–but I, too, have to move on with my life…. Read Article →

A Copyright is a form of protection provided to authors of “original works of authorship”, both published and unpublished. Copyright protects the form of expression rather than the subject of the expression. Federal copyright registrations are issued by the U.S. Copyright Office. They give the copyright owner exclusive rights to reproduce the copyrighted work, to… Read Article →

Special attention should be paid to gateway or firewall systems, as they usually control access to the services running on the entire network. Such gateways should be identified, its function within the network should be assessed and owners or administrators should be identified. These hosts, often referred to as bastion hosts are a prime target… Read Article →

Scroll To Top
%d bloggers like this: