Friday, September 30, 2005
Hack 27: Mount Your Camera to Your Car (PDF Format)
Hack 48: Fix Timecode Problems on an Existing Tape (PDF Format)
Hack 57: Fool Your Audience's Perception (PDF Format)
Hack 60: Cut to the Beat of Your Music (PDF Format)
Hack 63: Zoom in from a Satellite (PDF Format)
Hack 90: Record a Streaming Video (PDF Format)
- Sample Excerpt: Hacking Digital Video"
Thursday, September 29, 2005
Wednesday, September 28, 2005
Tuesday, September 27, 2005
Monday, September 26, 2005
Hack 6: Withhold Feedback (PDF)
Hack 15: Search for Selected Text (PDF)
Hack 32: Retract Your Bid Without Retracting Your Bid (PDF)
Hack 56: Frame Your Listings (PDF)
Hack 75: Protect Your Copyright (PDF)
Hack 87: Sell and Ship Internationally (PDF)
Hack 115: Automate Auction Revisions (PDF)"
Sunday, September 25, 2005
Hack 5: The Road Less Traveled by in MapQuest (PDF)
Hack 15: Zoom Right In on Your Neighborhood (PDF)
Hack 49: Get Your Tracklogs in Windows or Linux (PDF)
Hack 58: Don't Lose Your Tracklogs! (PDF)
Hack 97: Set Up an OpenGuide for Your Hometown (PDF)
Read an excerpt from this book on O'Reilly Network: Chapter 7: Names and Places, Chapter 16: Mapping Your Neighborhood"
Saturday, September 24, 2005
Friday, September 23, 2005
Thursday, September 22, 2005
A Free Certificate Authority
CAcert.org is an attempt to establish a free certificate authority. Currently, their goal is to get their root certificate installed into the major browsers. They have established what is called a web of trust. This is an attempt to verify identity through assurers. Assurers are other individuals or organizations who have gone through the process of verifying their identity with the CAcert web of trust.
The major Certificate Authorities
Wednesday, September 21, 2005
Tuesday, September 20, 2005
- Message-level security, in which data in a SOAP message is digitally signed or encrypted.
- Transport-level security, in which SSL is used to secure the connection between a client application and the Web Service.
- Access control security, which specifies which users, groups, and roles are allowed to access Web Services.