answersLogoWhite

0

Search results

FidoNet was created in 1984.

1 answer


Email started in South Africa before the Internet.

Several locally implemented networking systems implemented varieties of email well before the world-wide interconnection of the Internet.

In South Africa, the early international email connectivity used FidoNet, essentially a bulletin board system, connecting via a dial up connection to the USA to transfer batches of mail.

The first South African IP address was granted to Rhodes University in 1988. By November 1991 the South African universities network UNINET, was connected by a 'permanent' leased line to the global Internet. They in turn connected to Mozambique, Zimbabwe, Zambia, Lesotho and Namibia.

This, the first national TCP/IP connection of the whole of South Africa to the USA, was rated at 9600 baud. Response times were poor.

Commercial Internet access for companies and individuals began in late 1993 and early 1994.

1 answer


Ingredients

  • 1 1/2 c Margarine
  • 1 1/2 c Sugar
  • 8 oz Philadelphia cream cheese
  • 2 Egg
  • 2 tb Lemon juice
  • 1 1/2 ts Lemon zest
  • 4 1/2 c Flour
  • 1 1/2 ts Baking powder
  • Apricot filling Sugar, confectioners -APRICOT FILLING- 11 oz Apricots, dried
  • 1/2 c Sugar

Combine margarine, sugar and softened cream cheese mixing until well blended. Blend in eggs, lemon juice and rind. Add combined dry ingredients to cream cheese mixture and mix well and chill. Roll into medium size ball. Place on ungreased cookie sheet. Flaten slightly, indent center, put apricot filling in center. Bake 350 degrees for 15 minutes. Cool slightly and sprinkle powdered sugar on top. Fillling: Put 1 pkg. (11 oz.) apricots in saucepan and add water just cover. Add 1/2 cup (or to taste) sugar and bring to boil. Cover and simmer 10 minutes or until apricots are soft and most of water is absorbed. Force through sieve or whirl in blender. Makes 2 cups. per Carrie Naley Fidonet HOME_COOKING echo

1 answer


Ingredients

  • 1 1/2 c Butter or margarine
  • 1 c Sugar
  • 1 Egg
  • 1 t Vanilla
  • 2 ts Lemon extract
  • 1 tb Lemon zest
  • Yellow food coloring 4 c Flour, sifted
  • 1 t Baking powder
  • ICING- 1 c Sugar, confectioners
  • 2 tb Milk
  • 1 t Lemon extract
  • Yellow food coloring -TOPPING- Poppy seeds

Thoroughly cream butter or margarine and sugar. Add egg, vanilla, lemon extract and lemon zest; beat well. Sift together flour and baking powder; add gradually to creamed mixture, mixing to a smooth dough. Force dough through cooky press, using a star or swirl shape, onto ungreased baking sheet. Bake in hot oven, 400 degrees 8 to 10 minutes. Cool. Icing: Sift the powdered sugar and add the lemon extract. Add the milk a little at a time. You want the result to be a thin frosting. Add yellow food coloring and stir until blended. You want the color of the frosting to be paler than the color of the cookies. When the cookies are completely cool, put the frosting into a small ziploc bag. Cut a small hole in one corner, and squeeze the bag to force the thin frosting out the hole. Starting in the center of each cookie, make a sprial of frosting going out toward the edges of the cookie. Sprinkle with poppy seeds, and let the icing set. per Bobbie Beers Fidonet COOKING echo

1 answer


Still have questions?
magnify glass
imp

Mushrooms growing in circles, known as fairy rings, are caused by the underground mycelium spreading outwards from a centralized point. As the mycelium uses up nutrients in the soil at the center, it produces mushrooms on the outer edge where conditions are more favorable. This results in a circular pattern of mushroom growth.

5 answers


Web 2.0 is a term coined in 1999 to describe web sites that use technology beyond the static pages of earlier web sites. The term is closely associated with Tim O'Reilly because of the O'Reilly Media Web 2.0 conference which was held in late 2004.[1][2] Although web 2.0 suggests a new version of the World Wide Web, it does not refer to an update to any technical specification, but rather to cumulative changes in the ways software developers and end-users use the Web

4 answers


The Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the U.S. Department of Defense was the world's first operational packet switching network, and the progenitor of the global Internet. During the 1950s, several communications researchers realized that there was a need to allow general communication between users of various computers and communications networks. This led to research into decentralized networks, queuing theory, and packet switching. The subsequent creation of ARPANET in the United States in turn catalyzed a wave of technical developments that made it the basis for the development of the Internet. The first TCP/IP wide area network was operational in 1984 when the United States' National Science Foundation (NSF) constructed a university network backbone that would later become the NSFNet. It was then followed by the opening of the network to commercial interests in 1995. Important separate networks that have successfully entered the Internet include Usenet, Bitnet and the various commercial and educational X.25 networks such as Compuserve and JANET. The collective network gained a public face in the 1990s. In August 1991 CERN in Switzerland publicized the new World Wide Web project, two years after Tim Berners-Lee had begun creating HTML, HTTP and the first few web pages at CERN in Switzerland. In 1993 the Mosaic web browser version 1.0 was released, and by late 1994 there was growing public interest in the previously academic/technical Internet. By 1996 the word "Internet" was common public currency, but it referred almost entirely to the World Wide Web. Meanwhile, over the course of the decade, the Internet successfully accommodated the majority of previously existing public computer networks (although some networks such as FidoNet have remained separate). This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. The IEEE has assigned the 802.1 label to the internetworking among 802 LANs, MANs and other wide area networks, now known as the Internet.

8 answers


Originally the term referred to people who used a razor blade and/or fingernail clippers to "hack" or roughly cut parts in electronics such as the traces on circuit boards, legs of diodes etc. Police scanners were "hacked" in order to add more memory, remove CPU processors , speed up scanning by "hacking" the crystal oscillator and replacing with faster ones. Thes methods are directly related to why computers now have more RAM, and are faster. Some of the old (and I do mean old) "hackers" devised a system in the 1960s to simultaneously send voice and data over a phone line using frequency phase shifting and filtering. A similar process used later by DSL.

"Hacking" and "Modding" evolved into things such as examining the programming of a thing. Beginning with noticing things such that by pressing certain keys or combinations of keys in certain secquences on a device could produce certain results. Following the era of IBM's "Big Blue" chess tournament, AT&T introduced the "unbeatable Tic Tac Toe Computer, and exhibited it. I, I mean a "hacker" back then, was able to beat the computer with a sequence of key presses in order to "cheat" the computer out of a move. On many Shortwave radios, Police Scanners, even cell phones etc, certain key presses are used in the programming, and could be used to alter that programming.

The keys on a keyboard of a device are a "Matrix" Keyboards use a matrix with the rows and columns made up of wires. Each key acts like a switch. When a key is pressed, a column wire makes contact with a row wire and completes a circuit. The keyboard controller detects this closed circuit and registers it as a key press to the software.

I'm going to try to keep this understandable to readers ...

Software can emulate or act like hardware.

Example: a hardware modem versus a DSP/Digital Signal Processor modem, where a chip is programmed to act like the hardware....

So, later, the focus turned even more from "hacking" the actual electronics and hardware to software "hacking" through PROGRAMMING.

A "black hat" hacker is often referred to as a microcomputer user who attempts to gain unauthorized access to proprietary computer systems. Although that could be a "cracker" ... a person cracking passwords etc.

Most often people who call themselves "hackers" are called "wannabes" by the old-timers, and nowadays are often adolescents using a program they didn't write, by clicking a button they didn't create, to do what don't understand, in an attempt to disrupt something they don't know how to fix.

"White Hat" hackers are the "good guys" like ... Like the old-timers who vastly improved what computers are capable of doing, and the ones currently trying to improve security by locating and preventing weaknesses.

This Answer is dedicated to the memory of Bill Cheek, author, The Scanner Modification Handbook series, and his BBS and Fidonet terminal (prior to "The Internet") Good man, Good freind to many... May he R.I.P.

9 answers