Search

Did you mean
compulsory

Search results

  1. Networker: Finding the enemy

    Developing the early design for IBM's first personal computer word processor while still in jail, he ... then moved into computer network hacking, according to New York Times journalist John Markoff. Many ... encryption (coding) technology, traditionally considered munitions. Today the computer programming code which ...

  2. INDONESIA: Right wing attacks on pro-democracy students

    gate, door and windows, then trashed the offices. Computers, telephones, a printer and a modem were ... urgently trying to raise funds to get their offices running and replace the desperately needed computer ...

  3. Mobile phone radiation: What the telcos want to hide

    Children, too, are frequently exposed to EMR from video games and classroom computers as well as mobile ...