Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
a free software which enables users inside countries and other locals with heavy Internet censorship to visit any public web sites in the world safely and freely.
Having only the services you need running will make your system faster, more stable and secure. So the first thing you need to do after installing a Linux distribution is to manually edit the list of enabled services.
the Windows version of the UNIX 'tail -f' command. Used to monitor changes to files; displaying the changed lines in realtime. Uses a plugin architecture, which allows notifications to occur when certain keywords are detected in monitored files. MAPI
A PAL -- a "Permissive Action Link" -- is the box that is supposed to prevent unauthorized use of a nuclear weapon. It's supposed to be impossible to "hot-wire" a nuclear weapon. Is it?