Search
- Did you mean
- compulsory
Search results
-
Networker: Finding the enemy
Developing the early design for IBM's first personal computer word processor while still in jail, he ... then moved into computer network hacking, according to New York Times journalist John Markoff. Many ... encryption (coding) technology, traditionally considered munitions. Today the computer programming code which ...
-
INDONESIA: Right wing attacks on pro-democracy students
gate, door and windows, then trashed the offices. Computers, telephones, a printer and a modem were ... urgently trying to raise funds to get their offices running and replace the desperately needed computer ...
-
Mobile phone radiation: What the telcos want to hide
Children, too, are frequently exposed to EMR from video games and classroom computers as well as mobile ...