Array ( [0] => assign0.html [1] => cfwk1dq2-dgtlEvdnc.html [2] => cfwk2dq2-HDAnlsys.html [3] => cfwk3dq2-stratigraphy.html [4] => cfwk4dq1_voiptracing.html [5] => cfwk4dq2_winlogging.html [6] => cfwk5dq2_wnvslnxfrnscs.html [7] => cfwk6dq1_remtmon.html [8] => cfwk6dq2_netfrnscs.html [9] => cfwk7dq1_brkndlaw.html [10] => cfwk7dq2_irc.html [11] => china.html [12] => cnwk1dq2_pktswtchng.html [13] => cnwk2dq1_mltplbrwsrcnctns.html [14] => cnwk2dq2p2pvid.html [15] => cnwk3dq1_strmaududp.html [16] => cnwk3dq2_tcpfrndlns.html [17] => cnwk4dq1_ipsecnat.html [18] => cnwk4dq2_mltcstng.html [19] => cnwk5dq1_VLSINICs.html [20] => cnwk6dq1_QoS.html [21] => cnwk6dq2_3gvs4g.html [22] => cnwk7dq1_ncrptprfs.html [23] => cnwk7dq2_netscrty.html [24] => cnwk8dq1_trfcmontrng.html [25] => cnwk8dq2_cntlcmplxdistsys.html [26] => db.wk6.dq2.html [27] => db.wk7.dq1.html [28] => db.wk8.dq2.html [29] => dq0w1.html [30] => dq1w0.html [31] => ffvso.html [32] => fwitap.html [33] => governance.html [34] => heuristics.html [35] => httgfw.html [36] => in_defence_of_error.html [37] => intvscmp.html [38] => osa.html [39] => pi.wk1.hw.html [40] => pi.wk2.dq1.privacy.html [41] => pi.wk2.dq2.dataProt.html [42] => pi.wk3.dq2.Therac25.html [43] => pi.wk6.dq1.cracking.html [44] => pi.wk7.dq1.roi.html [45] => pi.wk7.dq2.outsourcing.html [46] => piracy.html [47] => sewk1dq1.html [48] => sewk1dq2.html [49] => sewk2dq1.authentication.html [50] => sol.html [51] => turtest.html [52] => unix.html )

Sinclair and Plato

Stratigraphy

VOIP Tracing

WinLogging

Win vs Linux Forensics

Remote Monitoring

Profiling in Network Forensics

Legal Gray Areas in Investigations

Internet Relay Crime

China

Packet Switching

Simultaneous Browser Connections

P2P Video

Streaming Audio

TCP Friendliness

IPSEC and NAT

Multicasting Applications

VLSI NICs

QoS

3G vs 4G

Encryption Proofs

Network Security

Network Traffic Monitoring

Controlling Complex Distributed Systems

CRUD

OLAP & DW

Data Warehousing

HD vs. SDD

CISC vs. RISC

Firefox vs. Opera

Firewalls in Theory and Practice

Governance

How to tunnel through the great firewall

Interpreting vs. Compiling

Open Source Alternatives

History

Privacy Laws

Data Protection

Therac 25

Piracy

Solutions

Turing Test

~I am Unix Man~

Want more? Make a


Things I know less about.
Smorgasbord of other writings.
Homeagain homeagain jiggedyjig.