(395,'CoGo','cogocogocogocogo.nospam@nospam.gmail.com','
\r\nBorn Again Christian
\r\nCNC hobbyist, worker
\r\nLove but can\'t afford aviation.\r\n
\r\nName: Izzy Leibowitz \r\nHandle: BlacKernel
\r\nI was born at a very young age and, from there, the rest is history.
\r\nIt\'s not a skill set, it\'s a compultion.
\r\nJust your average korn kob on the internet; strangely not using ksh.
\r\n\r\nPrefered Pronouns: Any (He/She/They/It/Your Majesty/Feared Ruler of the Forbidden Languages/etc)
\r\nPrefered Languages: Rust (compuled), Lua (scripting), Fish (shell scripting)
\r\nPrefered Shell: fish
\r\nPrefered OS: Slackware
\r\nPrefered DE: -XFCE- KDE (you guys were right after all)
\r\nSCP Foundation: Dr. Izzy Leibowitz
\r\n\r\nEmail: izzyleibowitz at pm dot me \r\nMastodon: at blackernel at nixnet dot social\r\n
','CC-BY-SA',0,'',1,'Black Kernel'), (397,'hakerdefo','forever.jekyll.nospam@nospam.disroot.org','Mastodon, though very rarely:
\r\n@one_of_spoons@hispagatos.space\r\n
\r\nThe Mechatronics Maniac\r\n
\r\nhttps://www.bitchute.com/channel/mechatroniac/\r\n
Librarian. Spends too much time on the internet.
','CC-BY-SA',0,'',1,'Sarah'), (406,'binrc','binrc.nospam@nospam.protonmail.com','https://0x19.org\r\nthanks for listening :)','CC-BY-SA',0,'',1,'bin R. C.'), (407,'Celeste','zceleste.nospam@nospam.protonmail.com','I once made a crocheted goose named Celeste in my free time and it has since become a sort of online avatar for me.','CC-BY-NC-SA',0,'',1,'Celeste'), (405,'Lurking Prion','LurkingPrion.nospam@nospam.gmail.com','\r\nLurking Prion (He/Him/His) is a cybersecurity enthusiast, evangelist, mentor, and professional with 20+ years experience in the Healthcare, Financial, Telecommunications, Managed Security Services Provider (MSSP), Hybrid Cloud Service Provider (CSP), and other unspecified business sectors...\r\n
\r\n\r\nBeginning as a network administrator, Lurking Prion\'s career followed security as it progressed throughout the years in roles including:\r\n
\r\nLurking Prion also has a passion for teaching. It is his mission to help build a new generation of cyber security professionals with a security mindset.\r\n
\r\n\r\nLurking Prion may occasionally refer to himself as Robert.
\r\nLurking Prion likes coffee, dark beer, and dirty martinis.
\r\nLurking Prion only refers to himself in the third person when there is a lack of coffee or an abundance of stupidity.
\r\nLurking Prion\'s eye starts to twitch when all hell is about to break loose.
\r\nLurking Prion\'s spirit animal is DeadPool.\r\n
\r\nI love programming languages and their implementations, and I especially love exploring new paradigms of writing programs. I\'m online at https://davidchristiansen.dk.\r\n
','CC-BY',0,'',1,'David Thrane Christiansen'), (419,'Ryuno-Ki','andre.jaenisch.nospam@nospam.posteo.de','Web-Developer and Consultant as a freelancer since 2023.\r\n\r\nHomepage: https://jaenis.ch/\r\nProfessional email: andre.jaenisch.wdc@posteo.net','CC-BY-SA',0,'',1,'Ryuno-Ki'), (422,'Fred Black','fredrik.nospam@nospam.svenskaa.net','','CC-BY-SA',0,'',1,'Fred Black'), (423,'Noodlez','contact.nospam@nospam.nathanielbarragan.xyz','Hello all! I\'m Noodlez, an HPR listener and now contributor. I like anything to do with Linux and Linux-adjacent (Like other Unixes), and programming, and other random things like retro gaming.','CC-BY-SA',0,'',1,'Noodlez'); /*!40000 ALTER TABLE `hosts` ENABLE KEYS */; UNLOCK TABLES; -- -- Table structure for table `licenses` -- DROP TABLE IF EXISTS `licenses`; /*!40101 SET @saved_cs_client = @@character_set_client */; /*!40101 SET character_set_client = utf8 */; CREATE TABLE `licenses` ( `id` int(5) NOT NULL AUTO_INCREMENT, `short_name` varchar(11) NOT NULL, `long_name` varchar(40) NOT NULL, `url` varchar(80) NOT NULL, PRIMARY KEY (`id`) ) ENGINE=MyISAM AUTO_INCREMENT=8 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci; /*!40101 SET character_set_client = @saved_cs_client */; -- -- Dumping data for table `licenses` -- LOCK TABLES `licenses` WRITE; /*!40000 ALTER TABLE `licenses` DISABLE KEYS */; INSERT INTO `licenses` (`id`, `short_name`, `long_name`, `url`) VALUES (1,'CC-0','Public Domain Dedication','http://creativecommons.org/publicdomain/zero/1.0/'), (2,'CC-BY','Attribution','http://creativecommons.org/licenses/by/4.0'), (3,'CC-BY-SA','Attribution-ShareAlike','http://creativecommons.org/licenses/by-sa/4.0'), (4,'CC-BY-ND','Attribution-NoDerivs','http://creativecommons.org/licenses/by-nd/4.0'), (5,'CC-BY-NC','Attribution-NonCommercial','http://creativecommons.org/licenses/by-nc/4.0'), (6,'CC-BY-NC-SA','Attribution-NonCommercial-ShareAlike','http://creativecommons.org/licenses/by-nc-sa/4.0'), (7,'CC-BY-NC-ND','Attribution-NonCommercial-NoDerivs','http://creativecommons.org/licenses/by-nc-nd/4.0'); /*!40000 ALTER TABLE `licenses` ENABLE KEYS */; UNLOCK TABLES; -- -- Table structure for table `miniseries` -- DROP TABLE IF EXISTS `miniseries`; /*!40101 SET @saved_cs_client = @@character_set_client */; /*!40101 SET character_set_client = utf8 */; CREATE TABLE `miniseries` ( `id` int(10) NOT NULL AUTO_INCREMENT, `name` varchar(100) NOT NULL, `description` text NOT NULL, `private` tinyint(1) NOT NULL DEFAULT 0, `image` text NOT NULL, `valid` int(1) NOT NULL DEFAULT 1, PRIMARY KEY (`id`) ) ENGINE=MyISAM AUTO_INCREMENT=123 DEFAULT CHARSET=utf8mb3 COLLATE=utf8mb3_unicode_ci; /*!40101 SET character_set_client = @saved_cs_client */; -- -- Dumping data for table `miniseries` -- LOCK TABLES `miniseries` WRITE; /*!40000 ALTER TABLE `miniseries` DISABLE KEYS */; INSERT INTO `miniseries` (`id`, `name`, `description`, `private`, `image`, `valid`) VALUES (4,'Databases','This series will attempt to discuss various different aspects of Database design and operation.',0,'',1), (5,'This Old Hack','fawkesfyre tales of hacking',1,'',1), (6,'The Linux Boot Process','Dann talks about the linux boot process',1,'',1), (7,'LPI Certifications','A series focusing on Linux Professional Institute Certifications (LPIC)\r\nVarious contributors lead us on a journey of discovery of the Vim (and vi) editors.\r\n
\r\n\r\nVim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\r\n
\r\n\r\nhttps://www.vim.org/about.php\r\n
',0,'',1), (28,'NewsCast','What\'s happening in the News world',1,'',1), (29,'How I got into tech','Started by monsterb, this series invites people to share with us how they found Linux. It has become traditional for first time hosts to share with us their journey to Linux. Indeed it has morphed to be way to share your journey in tech right up to your first contribution to HPR.',0,'',1), (30,'Tit Radio','Welcome to TiT Radio! The only Hacker Public Radio show with super cow powers broadcasting live on ddphackradio.org every utter Saturday night at 11pm CST. You may be asking yourself \"What in tarnation is Tit Radio?\" Well, it\'s a potluck style roundtable of geeks talking about Free Software, GNU + Linux, and anything geeky the TiTs bring to the table. Chat with the TiTs over at irc.freenode.net #linuxcranks. Thats no bull.',1,'',1), (34,'Talk Geek to me','deepgeek talks geek to his fans',1,'',1), (35,'SELF Talks 2009','South East Linux Fest talks 2009',1,'',1), (36,'Software Freedom Day Dundee 2009','Software Freedom Day Dundee 2009',1,'',1), (38,'A Little Bit of Python','\r\nInitially based on the podcast \"A Little Bit of Python\", by Michael Foord, Andrew Kuchling, Steve Holden, Dr. Brett Cannon and Jesse Noller. https://www.voidspace.org.uk/python/weblog/arch_d7_2009_12_19.shtml#e1138\r\n
\r\n\r\nNow the series is open to all.\r\n
',0,'',1), (42,'Bash Scripting','This is an open series in which Hacker Public Radio Listeners can share their Bash scripting knowledge and experience with the community. General programming topics and Bash commands are explored along with some tutorials for the complete novice.',0,'',1), (43,'HAM radio','A series about all things Amateur Radio/HAM Radio.',0,'',1), (119,'Travel','This is an open series where our hosts can document their travel experiences',0,'',1), (120,'Battling with English','Looking at the English language and highlighting some common anomalies, mistakes, mispellings, grammar problems and similar.',0,'',1), (121,'HPR New Year Show','Our community welcomes in every time zone to the New Year in this annual event.',1,'',1), (122,'Computer Strategy Games','This series is about Computer Strategy Games or Video Games as defined by https://en.wikipedia.org/wiki/Video_game
',0,'',1), (44,'Read \'n Code','The Read \'n Code podcast, the only podcast about literature and computer programming.',0,'',1), (45,'Podcasting HowTo','This series is designed to help the new host begin podcasting and to give the experienced host some tips and tricks.This is my series on Dramatic Audio Media, such as Old Time Radio (\"The Shadow\", \"Gunsmoke\", etc.), BBC Radio, and other classics -- but also, and most especially, the current renaissance of this art form, and how a person (like me, like you) can begin producing your own audio fiction or poetry or whatever for the enjoyment of countless others. This will be a learning process for me, and my mistakes might very well help you avoid any similar such in your own endeavors.
\r\n',1,'',1), (53,'HPR_AudioBookClub','HPR AudioBook Club',1,'',1), (54,'Syndicated Thursdays','A chance to showcase other Creative Commons works. We try to expose podcasts, speeches, presentations, music, etc that you may not have heard. If you have suggestions for items then send your recommendation to admin at hpr and we\'ll add it to the queue.',0,'',1), (57,'Hardware upgrades','Hosts share their experiences when upgrading their equipment.',0,'',1), (58,'spics on tech','sikilpaake & badbit team up to give us a Mexican view of the hacker world.',1,'',1), (95,'Tabletop Gaming','In this series, initiated by klaatu, analog games of various sorts are described and reviewed. See https://en.wikipedia.org/wiki/Tabletop_game for details.
\r\n',0,'',1), (96,'Penguicon','Penguicon is a Non-Profit, Open Source - Science Fiction Convention held in Southfield, Michigan.\r\n\r\nSee the website at https://www.penguicon.org/ or the Wikipedia page at https://en.wikipedia.org/wiki/Penguicon\r\n',0,'',1), (97,'FOSDEM','FOSDEM is a free event for software developers to meet, share ideas and collaborate.
\r\n\r\n\"Apt spelunking\" is a silly term I made up for the act of searching through your package manager, App Store, Code Repo, etc with vague terms, and trying out random applications therein.
\r\n\r\nA public series started by Windigo.\r\n
A series looking into the Haskell (programming language)
',0,'',1), (108,'Social Media','Looking at aspects of Social Media - platforms, histories, popularity, philosophies, etc.',0,'',1), (109,'Lord D Film Reviews','A memorial series dedicated to our late host Lord Drachenblut
\r\n\r\nFive categories, each rated 0, 1, or 2, so that the final reviews range anywhere from 0 to 10, with 0 being the worst film ever, and 10, the best.
\r\n\r\nEach category asks two yes-or-no questions. If the answer to both is no, that category gets a 0. If only one is a yes, it gets a 1. If both are a yes, it gets a 2.
\r\n\r\nGreat how-to that got me Started
\r\n \r\nYou will need to have bison and flex-old install to make iasl
\r\nTo obtain your present dsdt file drop to term and type
\r\n ‘ cat /proc/acpi/dsdt > dsdt.dat ‘
To decompile dsdt.dat and get a dsdt.dsl drop to term and type
\r\n ‘ ./iasl -d dsdt.dat ‘
To recompile dsdt.dsl and get a DSDT.aml drop to term and type
\r\n ‘./iasl -tc dsdt.dsl’
For more information on building Arch Packages, consult the Arch Build System How-to on the Arch Wiki.
\r\n\r\nThe following is a sample PKGBUILD file for building MuSE. Note, the source file was on my system, so I did not specify a url for the source and have the package build system pull the source down from the server.
\r\n\r\npkgname=MuSEGo to about:config and right click and go to new --> boolean and set the preference name to config.trim_on_minimize and set the boolean value to true.\r\n
\r\nNow go to task manager -->process tab-->and look for firefox.exe and watch the memory usage drop when you minimize. I will have the show notes on my site, www.i-trash.org if you missed anything.
\r\n\r\n',40,0,1,'CC-BY-NC-SA','',0,0,1), (132,'2006-08-08','Office 2003 Voice recognition review',566,'','\r\nDownload droops\\\' example at\r\n
\r\ninfonomicon.org/widgets\r\n',1,0,1,'CC-BY-NC-SA','',0,0,1),
(135,'2006-08-13','How to Find a Job Online',504,'','No Show notes',36,0,1,'CC-BY-NC-SA','',0,0,1),
(136,'2006-08-14','Denial of Service',545,'','Wikipedia entry on Denial of Service
\r\nhttp://en.wikipedia.org/wiki/Denial-of-service_attack \r\n
\r\nTcp Syn Floods
\r\nhttp://www.iss.net/security_center/advice/Exploits/TCP/SYN_flood/default.htm \r\n
\r\nLand Attack wikipedia
\r\n http://en.wikipedia.org/wiki/LAND ',9,0,1,'CC-BY-NC-SA','',0,0,1),
(137,'2006-08-15','Securing the Asterisk Manager',615,'','No shownotes yet, i\\\'ll have a screenshot guide ready by the weekend and edit the shownotes when it\\\'s up. It should be straightforward enough anyways though.',12,0,1,'CC-BY-NC-SA','',0,0,1),
(138,'2006-08-17','Soft Moding an Xbox',592,'','No show notes',24,0,1,'CC-BY-NC-SA','',0,0,1),
(139,'2006-08-22','Honeypots',412,'','Honeypots (part 1 of 2)\r\n
\r\n
\r\nIn computer terminology, a honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. A honeypot that masquerades as an open proxy is known as a sugarcane.
\r\n
\r\nhttp://en.wikipedia.org/wiki/Honeypot\r\n
\r\n
\r\n\r\n',38,0,1,'CC-BY-NC-SA','',0,0,1),
(140,'2006-08-23','Running 32 bit apps in 64 bit Linux',544,'','http://www.getautomatix.com \r\n
\r\nhttp://process-of-elimination.net/wiki/Ubuntu_32bit_CHROOT_for_AMD64 http://www.debian-administration.org/articles/356\r\n\r\n
\r\nhttp://www.ubuntuforums.org/showthread.php?t=191205\r\n
\r\nhttp://forums.gentoo.org/viewtopic-t-221361.html\r\n
\r\n
\r\n\r\n\r\n\r\n',11,0,1,'CC-BY-NC-SA','',0,0,1),
(141,'2006-08-24','RSI - Repetitive Stress Injury',719,'','RSI Help\r\n
\r\nWorkrave - Linux & Windows\r\n
\r\nAntiRSI - OS X App\r\n
\r\n
',7,0,1,'CC-BY-NC-SA','',0,0,1),
(142,'2006-08-27','Writely',512,'','http://www.writely.com/\r\n
\r\n
',12,0,1,'CC-BY-NC-SA','',0,0,1),
(143,'2006-08-28','CBBot',768,'','No Show notes',35,0,1,'CC-BY-NC-SA','',0,0,1),
(144,'2006-08-29','Nessus',355,'',' Example Nessus output \r\n
\r\n
\r\nCGI Examples \r\n
\r\n
\r\n http://en.wikipedia.org/wiki/Nessus_(software)\r\n
\r\n
\r\n http://www.nessus.org/ ',36,0,1,'CC-BY-NC-SA','',0,0,1),
(145,'2006-09-04','Audio engineering',331,'','No Show Notes',42,0,1,'CC-BY-NC-SA','',0,0,1),
(146,'2006-09-05','Micropower TV',937,'','http://freeradio.org/\r\n
\r\n
\r\nhttp://fcc.gov/',43,0,1,'CC-BY-NC-SA','',0,0,1),
(147,'2006-09-06','VMware Player',799,'','
\r\nhttp://www.vmware.com/products/player/\r\n
\r\n
',44,0,1,'CC-BY-NC-SA','',0,0,1),
(148,'2006-09-07','In the Payphone Lounge',238,'','featuring Jason Scott and Strom Carlson. Music:\r\n\\\"Cut\\\" by Nika Japaridze \r\n
\r\nhttp://www.archive.org/details/rest026',13,0,1,'CC-BY-NC-SA','',0,0,1),
(149,'2006-09-10','Wireless Security',724,'','No Show Notes',35,0,1,'CC-BY-NC-SA','',0,0,1),
(150,'2006-09-12','Vpn\\\'s',693,'','
\r\nShow Notes \r\n
\r\n
',19,0,1,'CC-BY-NC-SA','',0,0,1),
(151,'2006-09-13','Skiddie Baiting',477,'','
\r\nhttp://irongeek.com/i.php?page=security/skiddy-baiting ',9,0,1,'CC-BY-NC-SA','',0,0,1),
(152,'2006-09-14','Dynamic DNS',834,'','Show Notes',40,0,1,'CC-BY-NC-SA','',0,0,1),
(153,'2006-09-18','How to make your own xbox usb adpapter',268,'','No Show Notes',24,0,1,'CC-BY-NC-SA','',0,0,1),
(154,'2006-09-20','Sourcemage',316,'','
\r\n http://www.sourcemage.org/ \r\n
\r\n
',41,0,1,'CC-BY-NC-SA','',0,0,1),
(155,'2006-09-21','Cross Site Scripting',357,'','
Link to full shownotes
\r\nCgisecurity.com: Cross Site Scripting questions and answers
\r\nCross-site scripting - Wikipedia entry
\r\nSecLists.org Security Mailing List Archives
\r\nTWAT ep. 33 - SQL Injection, by Livinded
\r\nXSS (Cross Site Scripting) Cheat Sheet
\r\nSecurity Now Episodes
\r\nNoScript Plugin for Firefox\r\n
\r\n
',45,0,1,'CC-BY-NC-SA','',0,0,1),
(156,'2006-09-24','Safari Bookshelf',616,'','
\r\n http://safari.oreilly.com/ \r\n
\r\n
',7,0,1,'CC-BY-NC-SA','',0,0,1),
(157,'2006-09-25','SnortSam',963,'','
\r\n http://www.rmccurdy.com/stuff/TWAT/snort/ \r\n
\r\n
',36,0,1,'CC-BY-NC-SA','',0,0,1),
(158,'2006-09-26','NirCmd',365,'','
\r\nNirCmd info page:
\r\nhttp://www.nirsoft.net/utils/nircmd.html\r\n
\r\nNirCmd download link (zip format):
\r\nhttp://www.nirsoft.net/utils/nircmd.zip\r\n
\r\nNirCmd help/command reference online:
\r\nhttp://www.nirsoft.net/utils/nircmd2.html#using\r\n
ROCKBOX - OPEN SOURCE JUKEBOX FIRMWARE\r\nhttp://www.rockbox.org/ \r\n\r\n\r\n\r\nPresently works on\r\n * Archos: Jukebox 5000, 6000, Studio, Recorder, FM Recorder, Recorder V2 and Ondio\r\n * iriver: H100 and H300 series\r\n * iriver: H10 series\r\n * Apple: iPod 4th gen (grayscale and color), 5th gen (Video), Nano and Mini 1st/2nd gen\r\n * iAudio: X5 (including X5V and X5L)\r\n * Additional models are in development \r\n\r\nReach me at ksmurf [at] gmail [dot] com if you have any questions or comments',21,0,1,'CC-BY-NC-SA','',0,0,1), (161,'2006-10-01','Fedora Frog',690,'','
man nmap - Nmap man page
\r\nKismetwhen you log in the first time bash reads:\r\n
If you want to increase your history size put this in your .bash_profile:\r\n
export HISTSIZE=1000\r\n\r\nYou may want to also put that in your .bashrc for subsequent shells from your\r\nlogin shell, because this value will not be set until you log out and back in again. You can also \r\nissue export HISTSIZE=1000 in the shell to increase this, but value will not be set for any other or\r\nsubsequent shells started from your session.\r\n\r\n',7,0,1,'CC-BY-NC-SA','',0,0,1), (174,'2006-10-30','Halloween Remix',218,'','
This episode was recorded and mixed to wav entirely with Jokosher. I then used lame to record the mp3, as I usually like to do. The last second of audio was cut off and try as I might, could not get it to export this last second, but you did not miss anything. Give jokosher a try and support the Jokosher Community. This has the the potential to be a killer audio app for the FOSS community.
\r\nCorrection: \r\nRAID 0: Striped Set \r\nRAID 1: Mirrored Set \r\n\r\n
\r\n\r\nsysstat
\r\nRRDTool
\r\nNovell\\\'s Linux Monitoring Tool Package
\r\n
\r\n
',3,0,1,'CC-BY-NC-SA','',0,0,1),
(204,'2007-02-07','French for Geeks: How to pick up chicks',1328,'','Seal and the Montreal 2600\r\n
\r\n
',18,0,1,'CC-BY-NC-SA','',0,0,1),
(205,'2007-02-08','Grid Computing',382,'','No Show Notes\r\n\r\n
\r\n
\r\n',48,0,1,'CC-BY-NC-SA','',0,0,1),
(206,'2007-02-12','Esperanto',300,'','No Show Notes',53,0,1,'CC-BY-NC-SA','',0,0,1),
(207,'2007-02-13','You are being watched',557,'','No Show Notes\r\n
\r\n
',36,0,1,'CC-BY-NC-SA','',0,0,1),
(208,'2007-02-15','AJAX',627,'','No Show Notes\r\n
\r\n
',41,0,1,'CC-BY-NC-SA','',0,0,1),
(209,'2007-02-22','Etherboot',1383,'','No Show Notes',54,0,1,'CC-BY-NC-SA','',0,0,1),
(210,'2007-02-25','RFA Remix #1 - Hacker Manifesto',344,'','This clip orginally is from Radio freek america 40 which aired on 12/04/02\r\n\r\n
\r\n
',55,0,1,'CC-BY-NC-SA','',0,0,1),
(211,'2007-03-04','New Projects',514,'',' www.hackerevents.org \r\n
\r\n
\r\n www.eth0enigma.com \r\n
\r\n
\r\n Tampa Binrev meeting \r\n
\r\n
\r\n www.insecuretech.com \r\n
\r\n
\r\n www.wirelink.org \r\n
\r\n
\r\n\r\n',39,0,1,'CC-BY-NC-SA','',0,0,1),
(212,'2007-03-05','SNMP',641,'','No Show Notes\r\n
\r\n
',56,0,1,'CC-BY-NC-SA','',0,0,1),
(213,'2007-03-06','Natural Language Selection and AI',321,'','No Show Notes\r\n
\r\n
',57,0,1,'CC-BY-NC-SA','',0,0,1),
(214,'2007-03-07','VMWare clustering',514,'','No Show Notes',48,0,1,'CC-BY-NC-SA','',0,0,1),
(215,'2007-03-08','Free Dos',402,'','No Show Notes',42,0,1,'CC-BY-NC-SA','',0,0,1),
(216,'2007-03-12','Amazon Simple Storage Services',1024,'','
The applications of genetic algorithms include:\r\n\r\nArtificial Creativity \r\nAutomated design\r\nCode-breaking\r\nDesign of water distribution systems\r\nElectronic circuit design\r\nFile allocation for a distributed system. \r\nGame Theory Equilibrium Resolution. \r\nLearning Robot behavior\r\nMolecular Structure Optimization\r\nProtein folding \r\nTimetabling problems\r\nTraining artificial neural networks\r\nand the Traveling Salesman Problem. \r\n
Wireless Fun on a Macbook Pro - Part One
\r\n\r\n\r\ngetting kismac to work on Macbook Pro
\r\n\r\nMacPorts Official Site
\r\nMacPorts Installation Instructions
\r\nFink Project Official Site\r\n
\r\nMacPorts Official Site
\r\nMacPorts Installation Instructions
\r\nFink Project Official Site\r\n
\r\n- Some new RFID Tech\r\n- Hard Drives sold with trojan horses installed\r\n- McGrew Security checks out crackmails.net\r\n',42,0,1,'CC-BY-NC-SA','',0,0,1), (289,'2007-11-19','shmoocon meetup',270,'','
\r\n - Screenshots\r\n - Rails example\r\n - Rails resources\r\n',64,0,1,'CC-BY-NC-SA','',0,0,1), (292,'2007-11-29','From the Way back Machine',4400,'','orginal audio Defcon 7\r\n