‘Every August Until a Cure’ is the new campaign for Motor Neurone Disease Association of South Australia (MND SA) promoted throughout the...
The server access log records all requests processed by the server. The location and content of the access log are controlled by the CustomLog directive....
Something I have been interested in for a long time. The more we use RF for data and voice, this technique becomes more effective. Here are a few links...
Top 5 iPhone Application Development Security Issues Posted: May 4, 2010 – 8:24 am | Author: jeremy.allen | Filed under: Uncategorized Since Apple released...
I’ve recently analysed a range of Honeypot data relating to about 3 months of malicious attempts against a number of Internet exposed ports and services...
Just sitting at the pot drinking some wine…
Great start to Womad 2012 The Finn family.
Kerry and I have put our hands up again to go for the 12km stroll – City to Bay. On Our Way. Half Way. Finished. Now Kerry and I are recovering…...
Kerry and I survived another day with 698 other passionate Shiraz drinkers and 150 winemakers at the 2011 Great Edinburgh Shiraz Challenge. As usual, we...
These are the main 3G APN’s (Access Point Name) used in Australia. ISP APN ...