[author : Jonathan Erickson] #Edito
[author : Jack Woehr]
Computer scientist Ron Rivest takes time out to chat with Jack Woehr about computer security, digital certificates, cryptography, and a variety of other subjects.
[author : Bob Quinn]
Multicasting lets you deliver content from a single sender to multiple receivers. Bob uses the multicast-enabled WinSock API to present TimeCast, a one-to-many application that multicasts the time of day to multiple clients.
[author : Camillo Sürs]
The SSH protocol provides secure Internet connections that are authenticated and encrypted using military-grade encryption. Camillo examines how the transport layer protocol enables secure remote connections.
[author : Andrew Meckler]
The base Java libraries partially support inter-applet communication. However, if there are multiple HTML pages displayed in the browser at one time, the applets in different contexts cannot communicate with one another. Andrew presents a way around this problem.
[author : Joan Daemen, Lars R. Knudsen, Vincent Rijmen]
Square is a new fast block cipher that encrypts data in blocks of 128 bits, using a 128-bit key. Square's structure has been carefully chosen to allow very efficient implementations on a wide range of processors.
[author : Sven B. Schreiber]
Microsoft's NetWare clients for Windows 95 and NT are a well-integrated part of the operating system. However, their APIs are rudimentary, making it difficult for NetWare client software developers to write nontrivial applications. Luckily, both operating systems offer a useful-albeit undocumented-NCP interface, allowing client/server communication through the backdoor. Sven explores those undocumented interfaces.EMBEDDED SYSTEMS
[author : Dhananjay V. Gadre and Larry A. Stein]
The Enhanced Parallel Printer Port protocol was developed to provide a high-performance parallel-port link compatible with existing parallel-port peripherals and interfaces. Our authors examine this specification, and present routines for implementing high-speed digital I/O using EPP BIOS calls.
[author : Brent Gorda and Gregory V. Wilson]
Brent and Greg describe a web-site toolkit called "Webalog" which is being used to construct on-line auctions and similar web-based applications.
[author : Gerard J. Holzmann]
Spin, developed by Bell Labs' formal methods and verification group, is a freely-available software package that supports the formal verification of distributed systems. Gerard explains how Spin works, and what types of errors it can help you find.
[author : Bennett Griffin]
Bennett uses the Langner Universal Communications API to build a multiprotocol terminal emulator that works across various media.
[author : Michael Swaine]
Macs, Flaks, and Illiacs. Michael continues to follow the goings-on at Apple.
[author : Al Stevens]
Al presents a Windows 95 program that lets you create the index to a book or other document quickly and easily. He then has a thing or to say about Visual C++ 5.0's new help system.
[author : Clif Berg]
Java servlets represent a new model for developing server-based applications. Cliff shows you how to write them.
[author : Lynn Monson]
Lynn shows how to use the ID3 and C4.5 classification algorithms with text. The result is a tool that can learn how to classify text based on a few examples.
[author : George Shepherd and Scot Wingo]
Imagine their surprise when George and Scot discovered that Visual C++ for Windows CE, a VC++ 5.0 add-in, includes its own unique version of MFC-a small-footprint system called "Mini MFC."
[author : Warren Young]
Warren examines a pair of Java programming books-Core Java, Second Edition, by Gary Cornell and Cay Horstmann, and Hacking Java, by Mark Wutka, et al.
[author : you]
[author : the DDJ staff]
[author : Eugene Eric Kim]
[author : Michael Swaine]