by Jack Woehr
Computer scientist Ron Rivest takes time out to chat with Jack Woehr about computer security, digital certificates, cryptography, and a variety of other subjects.
by Bob Quinn
Multicasting lets you deliver content from a single sender to multiple receivers. Bob uses the multicast-enabled WinSock API to present TimeCast, a one-to-many application that multicasts the time of day to multiple clients.
by Camillo Särs
The SSH protocol provides secure Internet connections that are authenticated and encrypted using military-grade encryption. Camillo examines how the transport layer protocol enables secure remote connections.
by Andrew Meckler
The base Java libraries partially support inter-applet communication. However, if there are multiple HTML pages displayed in the browser at one time, the applets in different contexts cannot communicate with one another. Andrew presents a way around this problem.
by Joan Daemen, Lars R. Knudsen, Vincent Rijmen
Square is a new fast block cipher that encrypts data in blocks of 128 bits, using a 128-bit key. Square's structure has been carefully chosen to allow very efficient implementations on a wide range of processors.
by Sven B. Schreiber
Microsoft's NetWare clients for Windows 95 and NT are a well-integrated part of the operating system. However, their APIs are rudimentary, making it difficult for NetWare client software developers to write nontrivial applications. Luckily, both operating systems offer a useful-albeit undocumented-NCP interface, allowing client/server communication through the backdoor. Sven explores those undocumented interfaces.EMBEDDED SYSTEMS
by Dhananjay V. Gadre and Larry A. Stein
The Enhanced Parallel Printer Port protocol was developed to provide a high-performance parallel-port link compatible with existing parallel-port peripherals and interfaces. Our authors examine this specification, and present routines for implementing high-speed digital I/O using EPP BIOS calls.
by Brent Gorda and Gregory V. Wilson
Brent and Greg describe a web-site toolkit called "Webalog" which is being used to construct on-line auctions and similar web-based applications.
by Gerard J. Holzmann
Spin, developed by Bell Labs' formal methods and verification group, is a freely-available software package that supports the formal verification of distributed systems. Gerard explains how Spin works, and what types of errors it can help you find.
by Bennett Griffin
Bennett uses the Langner Universal Communications API to build a multiprotocol terminal emulator that works across various media.
by Michael Swaine
Macs, Flaks, and Illiacs. Michael continues to follow the goings-on at Apple.
by Al Stevens
Al presents a Windows 95 program that lets you create the index to a book or other document quickly and easily. He then has a thing or to say about Visual C++ 5.0's new help system.
by Clif Berg
Java servlets represent a new model for developing server-based applications. Cliff shows you how to write them.
by Lynn Monson
Lynn shows how to use the ID3 and C4.5 classification algorithms with text. The result is a tool that can learn how to classify text based on a few examples.
by George Shepherd and Scot Wingo
Imagine their surprise when George and Scot discovered that Visual C++ for Windows CE, a VC++ 5.0 add-in, includes its own unique version of MFC-a small-footprint system called "Mini MFC."
by Warren Young
Warren examines a pair of Java programming books-Core Java, Second Edition, by Gary Cornell and Cay Horstmann, and Hacking Java, by Mark Wutka, et al.
by Jonathan Erickson
by you
by the DDJ staff
by Eugene Eric Kim
by Michael Swaine