Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Handmade Electronic Music: The Art of Hardware Hacking by Nicolas Collins, 2009-04-13
  2. Hardware Hacking Projects for Geeks by Scott Fullam, 2003-11-01
  3. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas Wilhelm, 2009-08-28
  4. The Taming of Chance (Ideas in Context) by Ian Hacking, 1990-10-26
  5. Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech) by Barry Press, Marcia Press, 2005-05-06
  6. Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection by Ankit Fadia, 2007-06-12
  7. Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, et all 2007-12-17
  8. Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations by Scott Knaster, 2005-07-14
  9. Representing and Intervening: Introductory Topics in the Philosophy of Natural Science by Ian Hacking, 1983-11-25
  10. Hacking Video Game Consoles: Turn your old video game systems into awesome new portables (ExtremeTech) by Benjamin Heckendorn, 2005-02-18
  11. Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms by Wil Mccarthy, 2004-04-14
  12. Historical Ontology by Ian Hacking, 2004-09-15
  13. Hacking Google Maps and Google Earth (ExtremeTech) by Martin C. Brown, 2006-07-24
  14. The Unofficial Guide to Ethical Hacking by Ankit Fadia, 2005-09-13

61. CNN - Hacking Your Way To An IT Career - August 13, 1999
CNN
http://www.cnn.com/TECH/computing/9908/13/4hackcareers.idg/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ...
From...
Hacking your way to an IT career
August 13, 1999

Web posted at: 1:36 p.m. EDT (1736 GMT)
by Ann Harrison ALSO: Hackers, IT consultants embrace free security tool Hacking group reveals IP-security glitch ALTLANDSBERG, GERMANY (IDG) At the first annual Chaos Communication Camp, which took place outside of Berlin last weekend (see "Hackers on holiday," link below), hundreds of hackers and their machines filled the main hack tent exchanging information on the latest exploits and security tools. Most were young, skillful and in demand by corporate information technology departments. The camp, which attracted some of the most talented European and American hackers, was one of the largest hacker gatherings in Europe so far this year. The following are some of the tips he offered hackers seeking corporate jobs:
  • Write your own job description.
  • 62. HOW-TO: Hacking The IPod Firmware (changing The Graphics) - Engadget - Www.engad
    IpodWizard basically started a conversational thread about hacking the ipod. I am wondering if there might be any way by hacking the firmware to
    http://www.engadget.com/entry/1234000610023097/
    Victor Agreda, Jr. on The Unofficial Apple Weblog (TUAW) Make slideshows using AppleScript Available in: Chinese Japanese Spanish Have great gadget news? Let us know
    HOW-TO: Hacking the iPod firmware (changing the graphics)
    Posted Dec 8, 2004, 7:47 PM ET by Phillip Torrone
    Related entries: Features Portable Audio So on Monday over at Hack A Day we posted a link to an iPod hack over at iPodHacks
    Before we get started, of our first hacked firmware to give you an idea of what we changed.
    You can get that from here.
    here.

    Unzip the file, and start iPodWizard.
    Find the image you wish to replace, we wanted to replace the circle / slash icon. Once you find it, click Save Bitmap and save the file to your system.
    From there use any bitmap editor to edit the image, we used PaintShop Pro and pasted the Engadget logo over the icon then saved it. Click Load Bitmap and load in the image you just created.
    Make sure your iPod is plugged in, and iPod updater will look for what firmware you can restore to, for us, it found the iPod photo and we had the option to restore, which will then add the new firmware with our custom image.
    beat you hard.

    63. Cybiko Dev'rs - What's New?
    Lots of info on hacking and reprogramming the Cybico wireless handheld computer for teens .
    http://www.devrs.com/cybiko/
    Do you develop for other things? Devrs.com Cybiko Dev'rs http://www.devrs.com/ cybiko/ Cybiko Got info to post? Modify FAQs ... Search What's New? What's New? Downloads Apps Games DevSoft Apps Graphics Libs Data Fonts Docs Misc Links Misc
    DevCybiko.us - Posted by: Greg Smith
    DevCybiko.us is now the preeminant software development website for Cybiko computers. Fans and developers alike are welcome to come visit, browse, and post to the forums.
    StormPlayer 0.8.4 Released - Posted by: Elliot Lee
    Ssjx recently released a new version of StormPlayer, the Cybiko video player.
    Stormplayer 0.8.4
    * Menu now works as it should.
    * VideoNow support
    * Better support for the 1meg expansion card
    * Extra menu option to view only start web pages.
    * General tidying of functions.
    For more, see the Cybiko Forums . Go to the Development section, and feel free to discuss any Cybiko programs or post any ideas you may have.
    Dirt cheap batteries for Cybiko - Posted by: Kitsune
    Electronic Goldmine has F5 size NiMH batteries on sale. Well, they are a bit thicker (and narrower) than original F6 size, still they do fit in classic Cybiko if you trim the ribs on battery cover slightly. Bonus - 900 mAh instead of 750. And the price is just unbeatable.
    Stormplayer 0.8.3a

    64. Hacking ANd Cracking 3K - Swëêt Åñgël - HNC3K.COM
    Tools and tutorials, virus construction kits, cracks, hacking utilities, securitytools, and full mp3 albums.
    http://www.hnc3k.com/
    H N C 3 K . C O M
    THE SPIRIT OF HACKING AND CRACKING
    Info Download cracking programs, passwords hacking tools, cracks, virus creation software, computer viruses information, easy cracking and hacking tutorials on how to crack registration codes, password protection, serial numbers, hack irc, hotmail, aol, msn emails accounts, credit card and cell phone utilities, phreaking tools and tutorials... also a newbie tutorial on softice breakpoints, free mp3 music and song lyrics downloads... This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using, downloading, or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. News Menu February 14th, 2005 - Hacking guide:

    65. ProBoards.com - Free Remotely Hosted Message Boards
    Forum dedicated to hacking, cracking, phreaking and other issues.
    http://xploit.proboards16.com
    Home Sign Up! Advertise Support ... Contact Us Welcome to the Internet's premier forum provider, hosting over 10 million members at 1.2 million forums! You can go ahead and create your own forum for free, or if you need help with your existing forum head on over to our support forum Scheduled Downtime Server 60 Online Server 59 Online ... Perl

    66. Hacking Memes
    A discussion of memes, ideas which have become internalized in a personÕs headand consciousness through repetition. Looks at how the advertising industry
    http://www.firstmonday.org/issues/issue4_10/downes/
    Contents
    The Essence of the Meme
    Advertising

    The Corporate Pitch

    Hyper Reality
    ...
    The Anti-Meme
    The Essence of the Meme
    The concept of the meme has been working its way around the Web for a while now, instantiating itself in Wired 's regular feature, Hype List , in articles , and in general currency. As David Bennahum writes at the top of each issue of Meme , a meme is a "contagious idea that replicates like a virus, passed on from mind to mind. Memes function the same way genes and viruses do, propagating through communication networks and face-to-face contact between people." The tune you can't get out of your head, the phrase you keep using in your conversation - these are all memes, ideas which have passed from somewhere out there into your head and into your consciousness. Transference is the essence of the meme. Principia Cybernetica Web defines it as "an information pattern, held in an individual's memory, which is capable of being copied to another individual's memory." The Hacker's Dictionary defines it as "An idea considered as a replicator, esp. with the connotation that memes parasitize people into propagating them much as viruses do." The concept originates in Richard Dawkins's 1976 book The Selfish Gene.

    67. NBK - For Your Eyes Only
    Seguridad inform¡tica. hacking en teor­a y pr¡ctica.
    http://nbk.hackindex.com/
    Tu explorador no soporta frames pulsa aqui para eliminarlas - Your explores don't allow frames, click here to avoid 'em Tu explorador no soporta frames pulsa aqui para eliminarlas - Your explores don't allow frames, click here to avoid 'em

    68. Technology And Pleasure
    hacking is discussed in the context of being a method for system development.An argument is made that under certain circumstances this system may yield
    http://www.firstmonday.org/issues/issue4_2/gisle/
    "Hackers" are identified as a specific subgroup of computer workers. The history of the hacker community is told. The explicit and implicit ideologies expressed through hacking is analyzed and presented. Computer artifacts of origin both inside and outside the hacker community are compared and the embedded properties of the resulting artifacts are inferred. Hacking is discussed in the context of being a method for system development. Finally, it is argued that this system development method under certain circumstances may yield superior software artifacts.
    Contents
    Introduction
    Tinker, Taylor, Scholar, Hacker

    The Hacker Community

    The Hacker Ethic
    ...
    Conclusion
    Introduction
    "The hacker is a person outside the system who is never excluded by its rules" (Turkle, 1984). ""Hackers" are computer aficionados who break in to corporate and government computer systems using their home computer and a telephone modem" (Meyer, 1989). The popular image of the computer hacker seems to be part compulsive programmer preferring the company of computers to people, and part criminal mastermind using his or her technical prowess to perpetrate anti-social acts. But this is at best only half the story. A number of people I know who are proud to be called "hackers" are sensitive, sharing, social and honest. Part of the confusion surrounding the word "hacker" stems from the fact that it as been applied to at least three distinct communities.

    69. Kuht.it | Stage .09 - Serving The Ethical Hacking Community Since 1999
    Comunit  underground italiana con tematiche computing, ethical hacking, security, networking, coding.
    http://www.kuht.it
    Nickname: Password: Home page Registrati Qua
    IRC Chat
    Forums ... News Archivio Topics Downloads Links Sondaggi Mediawatch ... Mappa Software Visualizza Lista Per Categoria Nuovi Pacchetti Bacheca Annunci Help Ultimi Progetti GLScene Section mycode module for e-xoops Kuht 3D ScreenSaver ... Manifesto
    Sei all'inizio di kuht.it stage .09 .
    Il gruppo ed il sito nasce con l'intento di ridare il giusto significato etimologico a termini quali 'hacking', 'hacker', 'cracker' ed altre parole, ormai stravolte, utilizzate ed abusate tutt'oggi dai media e nel linguaggio corrente comune.
    Negli anni kuht.it è diventato un esponente del movimento della scena etica italiana; oltre a supportare l'uso corretto della terminologia degli 'addetti' al settore, kuht.it è anche un gruppo che si occupa di ricerca, sviluppo, sicurezza e sistemistica.
    Kuht.it è un angolo del web dove è possibile discutere di informatica, una materia troppo vasta perché un individuo la possieda completamente; qui è possibile scambiarsi esperienze e consigli, ma soprattutto è una comunità dove l'obiettivo finale è il crescere assieme ed il team mette a disposizione gli strumenti per farlo nel migliore dei modi.
    Molto spesso chi ci insegna qualcosa non è completamente neutrale, su kuht.it cerchiamo assieme di non far sorgere inutili flames; teniamo molto ai nostri utenti, alla loro privacy e alle loro idee, purchè espresse in modo consono a regolamenti morali dettati dal buon senso piuttosto che scritti.

    70. Google Maps Hacking And Bookmarklets
    Google Maps hacking and Bookmarklets. New myGmaps enables you to create, saveand host custom data files and display them with Google Maps.
    http://libgmail.sourceforge.net/googlemaps.html
    Google Maps Hacking and Bookmarklets
    New: myGmaps enables you to create, save and host custom data files and display them with Google Maps.
    Visit myGmaps.com for custom Google Maps.
    Update: New version maps.6.js . Breaks at least onMapStateChanged Update: There looks like a new version of Google Maps ( maps.4.js maps.5.js Google Maps Standalone Mode Update: The latest version of Google Maps ( maps.3.js ) requires http://libgmail.sf.net/loadxml-0.0.4.js or later. The route following bookmarklets have not yet been updated to work with the latest Google Maps version. Ah, the lure of all things Google... I've been poking around in Google Maps and had some success I thought others might be able to build on. I've put this in a couple of places but thought I'd throw it here as well:
    Part 1 : XML Handling
    Okay, I've been playing around with sending requests to Gmaps via a Python proxy and manipulating the files returned on the fly. As a result I've created a bookmarklet that loads the required XML file into the page: ( Google Maps Load XML Data Example Bookmarklet If you save this book marklet and click on it when on any (?certainly the home page) Gmaps page it should move you to a location in Vancouver, Canada.

    71. Shadow's Net
    œbersichtliche Site ¼ber hacking mit Tutorials und Downloads.
    http://de.geocities.com/shadownet_alpha/index.htm
    Shadow's Net
    Unwiderrufliche Vereinbarung
    Der Verfasser dieser Seite trägt keine Verantwortung für die Art, wie die hier zur Verfügung gestellten Informationen genutzt werden. Dateien und alles andere auf dieser Seite sind nur für den privaten Gebrauch bestimmt und sollten darum nicht runtergeladen oder gelesen werden. Wenn Sie irgendwie in Verbindung mit der Regierung, Anti-Pirate Gruppen oder anderen ähnlichen Gruppen stehen, ist der Zugang zu den Dateien und das lesen der HTML Seiten verboten. Alle Objekte dieser Seite sind privates Eigentum und somit nicht zum lesen bestimmt. Grundsätzlich ist es verboten diese Seite zu betreten. Wenn Sie diese Seite dennoch betreten, verstoßen Sie gegen den "Code 431.322.12 of the Internet Privacy Act", der 1995 von Bill Clinton verabschiedet wurde. Das heißt sie können gegen die Personen, die diese Dateien verwalten, nicht vorgehen.
    Wichtige Hinweise!
    Mit Urteil vom 12. Mai 1998 hat das Landgericht Hamburg entschieden, dass man durch die Ausbringung eines Links die Inhalte der gelinkten Seite ggf. mit zu verantworten hat. Dies kann - so das LG - nur dadurch verhindert werden, dass man sich ausdrücklich von diesen Inhalten distanziert. Wir haben auf unserer Seite Links zu anderen Seiten im Internet gelegt. Für all diese Links gilt: Wir möchten ausdrücklich betonen, dass wir keinerlei Einfluss auf die Gestaltung und die Inhalte der gelinkten Seiten haben. Deshalb distanzieren wir uns hiermit ausdrücklich von allen Inhalten aller gelinkten Seiten. Und wir machen uns deren Inhalte nicht zu Eigen. Diese Erklärung gilt für alle auf unserer Seite ausgebrachten Links und für alle Inhalte der Seiten, zu denen die Banner führen.

    72. Wired 10.09: Hacking Las Vegas
    hacking Las Vegas. THE INSIDE STORY OF THE MIT BLACKJACK TEAM S CONQUEST OF THECASINOS. By Ben Mezrich. The BackSpotter The Back-Spotter can count cards
    http://www.wired.com/wired/archive/10.09/vegas.html
    Search:
    Wired News Animation Wired Magazine HotBot (the Web)
    Pg 1 of 6
    Print
    email , or fax
    this article for free.
    Hacking Las Vegas
    THE INSIDE STORY OF THE MIT BLACKJACK TEAM'S CONQUEST OF THE CASINOS.
    By Ben Mezrich The Back-Spotter
    The Spotter
    The Gorilla

    The Gorilla doesn’t count at all: He just bets big, all the time. Typically, he adopts the pose of a drunken millionaire who has green to burn. The Spotters ensure the Gorilla’s “luck” by steering him to tables where he’s got greater than even odds of winning against the house. The Big Player
    The Big Player appears to be a type well known to the casinos: the high-rolling recreational gambler who’s content to slowly bleed his money away through hours of competent play. In reality, he’s a Spotter with a Gorilla’s bankroll. He’s not only counting cards, he’s tracking the shuffle for the high cards that rob the house of its advantage. A BP always plays a good deck, so he never has to lower his bets by much. Fifty thousand dollars strapped to each thigh. A hundred thousand dollars, in 10 bricks of hundreds, taped across my upper back. Fifty thousand more Velcroed to my chest. F. Scott Schafer

    73. Mac Hacker - Powered By XMB 1.9.1 Nexus
    Macintosh hacking forums from Mac OS X security, development to system modifications.
    http://www.machacker.org/
    Last active: Never
    Not logged in [ Login Register Search FAQ ... Mac Hacker
    You Are Not Registered Or Not Logged In If you are not registered or logged in, you may still be able to view forums and topics, but you will not have access to your member control panel or settings
    Forum: Topics: Posts: Last Post: Mac Hacked by ....... Mac NonSecurity
    Mac OS and Mac OS X Computer Security Information, Internet Security, Firewalls, and Programs. 6/9/2005 at 07:28 PM
    by Wave Mac OS X Hacks
    16/9/2005 at 07:41 PM
    by Program Announcements
    Mac hackers program announcements forum, developers and groups may announce their newly developed applications. 30/8/2005 at 07:07 AM
    by gogger Mac Programming for Programmers RealBasic
    20/3/2005 at 03:10 AM by firestar Cocoa Never Carbon 20/3/2005 at 02:34 AM by firestar Mac Developers for Hire - Post Project Need to Hire a Macintosh Programmers, post your Mac OS and Mac OS X project and requirements here. 20/3/2005 at 02:42 AM by firestar Web Programming PHP, MySQL, CFM, HTML, CGI, Perl Programming 2/9/2005 at 07:29 PM by nearmyth Mac Chit Chat Worm Hole Discussion forum for everything there is no other place to post it.

    74. Hacking The Hotel Through The TV | CNET News.com
    hacking the hotel through the TV Modern hotel TV systems let guests view theirbill, access the Net and order premium channels. But they aren t secure,
    http://news.com.com/Hacking the hotel through the TV/2100-1029_3-5812598.html
    CNET News.com
    CNET tech sites: Track thousands of Web sites in one place: Newsburst Security
    Hacking the hotel through the TV
    Published: July 31, 2005, 5:00 PM PDT By Joris Evers
    Staff Writer, CNET News.com
    TrackBack Print E-mail TalkBack LAS VEGASWhen Adam Laurie stays at hotels, he says he can hack his way around paying for premium TV channels, the minibar and phone calls. What's more, by connecting his laptop to certain modern hotel TV systems, Laurie says he can spy on other guests. He can't look into their rooms (yet), but depending on the system he can see what they are watching on their TV, look at their guest folios, change the minibar bill and follow along as they browse the Internet on the hotel television set. To tease his fellow guests, he can also check them out of their room and set early wake-up calls via the TV. Laurie can do all this because of what he calls the "inverted security model" of the systems. "The TV is controlling which content I get to see. The hotel in most cases is streaming all content without any control," Laurie said in a presentation Saturday here at the Defcon event for security professionals and enthusiasts By plugging the hotel TV cable into a USB TV tuner connected to a laptop computer, Laurie can hack his way into the back-end systems controlling the entertainment and other convenience features found in modern hotels, he said in his presentation.

    75. Bentley House Stables, Horse Livery Yard In Staffordshire
    A small full service facility located in the Staffordshire Moorlands offering specialist care and full livery, indoor and outdoor riding arenas, and crosscountry hacking. Includes photos and summary of facilities and services and directions.
    http://www.bentleyhouse.co.uk/
    Our service Biddulph Park webcam - Customer information - New school - ... Links Nikki Sladin and George on their way to rd place at Bradwall 2005 British Eventing calendar 2005 Check for vacancies Bentley House Stables is the intelligent choice for the discerning equestrian. We offer a higher standard of livery care on our peaceful stable-yard, conveniently located between Manchester and Stoke-on-Trent . See how we achieve this at our exclusive new purpose built facility through: - Our large traditional stables and new Olympic spec arena - Permanent 24 hour 7 day on-site BHS qualified staff All year turn out on safe, clean and secure paddocks - Mobile - See our webcam on your 3G/PDA/WAP To find out more click on the topics above Mobile www.bentleyhouse.co.uk/cam var sc_project=548916; var sc_partition=1;

    76. Hacking For Dollars | InfoWorld | Column | 2005-07-29 | By Bob Francis
    Last week s column on the possible ethical queasiness caused by spamming thespammers not to mention sending my friends George and Charlie on a perpetual
    http://www.infoworld.com/article/05/07/29/31OPsecadvise_1.html
    var cType = "Article"; var section = "Test Center"; var type = "Column"; var subType = "Security Adviser"; var pkeys = new Array("Security"); var skeys = new Array("Anti-spam","Vulnerability assessment","Vulnerability management"); var primaryAud = new Array("CTO"); var secondaryAud = new Array("CTO","CIO"); var companies = new Array("47933","45844"); About InfoWorld Advertise Subscribe Contact Us ... Store hbx.mlc="/test_center/security++";//MULTI-LEVEL CONTENT CATEGORY COLUMN ARCHIVES Site IT Product Guide adCall("728","90","leader"); FREE TECHNOLOGY NEWSLETTERS Wireless Report
    Government Channel Report
    Hacking for dollars
    TippingPoint is seeking and paying for tips about new vulnerabilities
    Security Adviser, By Bob Francis
    July 29, 2005 Last week's column on the possible ethical queasiness caused by spamming the spammers not to mention sending my friends George and Charlie on a perpetual snipe hunt apparently struck a chord. SPONSOR
    Fast Ethernet outdoor wireless bridge with 99.999% uptime from LightPointe.
    Sponsored by LightPointe
    adCall("336","280","imu");

    77. Core-SDI S.A.
    Security consulting and ethical hacking company in Argentina.
    http://www1.corest.com/

    78. Ian Hacking
    Ian hacking. BA, British Columbia (1956); BA, Cambridge (1958); Ph.D. (1962).Office Rm 911, 215 Huron St., 9th Fl. Ph 9784951
    http://www.chass.utoronto.ca/ihpst/html/hacking.html
    B.A., British Columbia (1956); B.A., Cambridge (1958); Ph.D. (1962) Office: Rm 911, 215 Huron St., 9th Fl. Ph: Field: Philosophy of science; philosophy of language, philosophy of mathematics; philosophical questions about psycho-pathology. Projects and Major Publications: Most recent books are The Social Construction of What (1999) and Mad Travellers (1998). Previoius books include Multiple Personality and the Politics of Memory Le Plus pur nominalisme (1993), about Nelson Goodman's "new riddle of induction". The Taming of Chance and The Emergence of Probability are contributions to the philosophy and history of probability. His Representing and Intervening emphasizes the role of experiment in the natural sciences. Earlier books include Why Does Language Matter to Philosophy? and Logic of Statistical Inference

    79. FAQ 4 Hackers
    Een FAQ (veel gestelde vragen) over alles wat met hacking te maken heeft, opgezet door de nieuwsgroep alt.hack.nl.
    http://www.faq4hackers.nl

    80. Kernel Hacking: An Introduction To Linux Kernel Programming
    A resource for people wanting to get started with linux kernel programming.Aims to centralize all relevant information on the subject.
    http://www.kernelhacking.org/
    Welcome!
    Welcome to this Linux kernel programming resource! The aim of this site is to: If you would like to keep up to date with the latest developments (site and HOWTO updates), please subscribe to the announce only mailing list Although most of the information on the site is aimed at Linux users, a fair amount should be transferable to other open source operating systems. Feedback is very welcome; send all comments/suggestions to author (remove numbers from address). Use this public key. Thankyou to UKLINUX for hosting this site.
    News
    19th April 2002 We now have an announce only mailing list . If you would like to be informed when the HOWTO is updated, please subscribe to this list. 11th April 2002 HOWTO updated; largely typos, gramatical corrections. Currently I am reviewing the structure, content and aims of the document as a whole. If you are particularly interested in the development of the document I would appreciate feedback and suggestions. Older news snipped 24th May 2001 Initial design and publication.

    Page 4     61-80 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter