Can you tell a router from a switch, do you know the MAC of your Mac, and what is the difference between IEEE 802.11b and g?
Month: April 2015
Just as drug cheats always seem several steps ahead of those trying to stop doping in sport, so computer security is always playing catch-up to hackers. And now they can hack into vending machines.
Why hoard or recycle your old Macs when you could do something useful – but not dangerous – with them?
From a brave king, to the pungent taste of mustard, with a wail on the side – all in the one word.
The importance of relative size, and height in the picture plane, in imparting depth and space in painting.
Few computer products thrive for over 30 years: the Mac (31 years young), Unix in its many guises (46), and TeX (37) each spring to mind.
Most of our financial and personal transactions should be protected by secure Internet connections. A year on, how has the Heartbleed bug changed this?
Like the moth which flies miles to contact an irresistible lantern, only to die in its flame, the C languages continue to draw programmers to their nemesis.
With more and more of our documents cloudbound, failure of an Internet connection can spell disaster. Do you give up and chat, read a book, or what?
When I mention that I used to write for MacUser, most people used to find it curious, even […]
