2003 29.06 2005

Vol.29 n°6 (#361) june 2004

text on archive.org (DVD)

(ddj_2004_06.jpg)

Editorial

[author : Jonathan Erickson] #Edito

TABLE OF CONTENTS

FEATURES

Remotely Controlling Windows Applications

[author : Ruben Patel]

When your application is running a mile or so under water, it makes sense to control it remotely.

Probing Network Characteristics

[author : Michael Larson]

This framework lets you monitor, record, and act on packet performance.

HTTP-Based Anonymous Communication Channels

[author : Marc Waldman and Stefan Köpsell]

Need a general-purpose request-reply anonymous communication channel? Here's how to build one.

The OpenCable Application Platform

[author : Linden deCarmo]

The OpenCable Application Platform provides Java-based APIs and uses open networking for set-top boxes and HDTV.

The Secure Shell Game

[author : Glen Matthews]

Glen examines the SSH protocol and shows how it can be implemented.

WLAN Security & Wi-Fi Protected Access

[author : Derek Cheung]

Wi-Fi Protected Access is designed to address known WLAN security issues in the original 802.11 specification.

Building a Lightweight JMS Provider

[author : Eric J. Bruno]

Here's a Java Message Service provider that is lightweight both in size and overhead—but not in features.

Security & Palm OS 5.x

[author : Michael Yam]

Michael presents techniques for using masked records and encrypting/decrypting data on the Palm OS 5.x platform.

SALT: The Speech Application Markup Language

[author : Robert Hartman]

Speech Application Language Tags let you integrate speech technologies into a range of user-oriented computing devices.

GPS Programming & .NET

[author : Johan Franson]

The Global Positioning System is a worldwide navigation system. Johan shows how to use it for .NET applications.

Identity and Equality in .NET

[author : Matthew Wilson]

C#'s as operator tests an object instance against a type, and returns a reference to the given type.

Tech Tips

[author : edited by George Frazier]

Boris Eligulashvili shows how to programmatically invoke the Microsoft Speech API.

String-Based Attacks Demystified

[author : Herbert H. Thompson and James A. Whittaker]

Far too often, programmers trust string input without checking it for validity. That's foolish.

A Heisenberg Compensator for Measuring Software Performance

[author : Gary Carleton and Charles Spirakis]

Measuring software performance without affecting the performance of the system being measured.

EMBEDDED SYSTEMS

Code Generation & High-Integrity Embedded Systems

[author : Tom Erkkinen]

Production-code generation provides a framework for adding software details to the behavioral algorithm model.

COLUMNS

Programming Paradigms

[author : Michael Swaine]

Embedded Space

[author : Ed Nisley]

Chaos Manor

[author : Jerry Pournelle]

Programmer's Bookshelf

[author : Gregory V. Wilson]

FORUM

Letters

[author : you]

The New Adventures Of Verity Stob

[author : Verity Stob]

News & Views

[author : Shannon Cochran]

Of Interest

[author : Shannon Cochran]

Swaine's Flames

[author : Michael Swaine]