Download Full Report

Total Page:16

File Type:pdf, Size:1020Kb

Download Full Report Use of Mobile Technology for Information Collection and Dissemination A DACS Technology Assessment Report DACS Report Number 518055 Contract FA1500-10-D-0010 Prepared for the Defense Technical Information Center Prepared By Chet Hosmer, Chief Scientist Carlton Jeffcoat, Vice President, Cyber Security Division Matt Davis, Malware Analyst Wetstone/Allen Corporation of America 10400 Eaton Place Fairfax, VA 22030 Thomas McGibbon, DACS Director Quanterion Solutions Inc. 100 Seymour Road Utica, NY 13502 Distribution Statement A Approved for public release: distribution is unlimited Use of Mobile Technology for Information Collection and Dissemination REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (From - To) TBD Technical N/A 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Use of Mobile Technology for Information Collection and Dissemination FA1500-10-D-0010 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHOR(S) 5d. PROJECT NUMBER Chet Hosmer, Carlton Jeffcoat, Matt Davis, Thomas McGibbon N/A 5e. TASK NUMBER N/A 5f. WORK UNIT NUMBER N/A 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT Allen Corporation of America, Cyber Security Division, Coastal NUMBER Carolina University Foundation Center, 5341 E HWY 501, Suite E 501- 509 Conway, SC 29526 DACS DAN #518055 Quanterion Solutions, Inc., 811 Court St., Utica, NY 13502 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) Defense Technical Information Center DTIC DTIC/AI 11. SPONSOR/MONITOR’S REPORT 8725 John J. Kingman Rd., STE 0944 NUMBER(S) Ft. Belvoir, VA 22060 12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for Public Release, Distribution Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Mobile technology is increasingly being utilized as a tool for information dissemination and collection. Numerous agencies including the Department of Defense (DoD), Department of Homeland Security (DHS), Intelligence community, and law enforcement are utilizing mobile technology are utilizing mobile technology for information management. The three primary mobile devices being utilized ® ® ™ today for the purposes of information collection and dissemination are the iPad / iPhone , Android , ™ and Windows Mobile . The open architecture of these devices is conducive for rapid application development and release. Despite the advanced mobile technology that exists today, factors such as security, usage, and trends must be considered when transitioning to mobile information collection and dissemination architecture. 15. SUBJECT TERMS TBD 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES Thomas McGibbon a. REPORT b. ABSTRACT c. THIS PAGE 19b. TELEPHONE NUMBER (include area code) U U U UU 77 315-351-4203 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i Use of Mobile Technology for Information Collection and Dissemination Table of Contents 1.0 Abstract ............................................................................................................................1 2.0 Executive Summary..........................................................................................................2 3.0 Introduction ......................................................................................................................4 3.1 Mobile Technology .......................................................................................................4 3.2 Intended Audience ........................................................................................................5 3.2.1 Motivation for Mobile Information ........................................................................6 4.0 Current Uses of Mobile Devices .......................................................................................7 4.1 DoD Applications .........................................................................................................7 4.1.1 Tactical Networks ..................................................................................................9 4.1.2 Application Examples ............................................................................................9 4.2 Department of Homeland Security .............................................................................. 12 4.3 Intelligence Agencies .................................................................................................. 13 4.4 Other Government ...................................................................................................... 13 4.5 Utilities and Critical Infrastructure .............................................................................. 14 4.6 Law Enforcement ........................................................................................................ 15 4.7 Libraries...................................................................................................................... 17 5.0 Mobile Information Collection and Dissemination .......................................................... 22 5.1 Information Dissemination .......................................................................................... 22 5.1.1 Podcasts ............................................................................................................... 23 5.1.2 V CAST ............................................................................................................... 23 5.1.3 Custom Applications ............................................................................................ 24 5.1.4 Traditional Web ................................................................................................... 24 5.1.5 Wiki ..................................................................................................................... 25 5.2 Information Collection ................................................................................................ 26 5.2.1 Data Collection Application ................................................................................. 27 5.2.2 Data Transfer Method .......................................................................................... 27 5.2.3 Server Side Components ...................................................................................... 27 6.0 Mobile Technology Architectures in Use by the Government ......................................... 29 6.1 US Army Common Operating Environment Architecture ............................................ 29 6.2 DHS Homeland Security Information Network ........................................................... 30 ii Use of Mobile Technology for Information Collection and Dissemination 6.3 Navy Next Generation Enterprise Network ................................................................. 32 7.0 Current Mobile Device Technology ................................................................................ 34 7.1 iPad® and iPhone® Architecture .................................................................................. 34 7.2 Android™ Architecture ................................................................................................ 36 7.3 Windows Mobile™ Architecture .................................................................................. 38 7.4 Mobile Architecture Expandability.............................................................................. 40 7.5 Best Practices for Mobile Web Software Development ............................................... 42 8.0 Key Aspects of Mobile Information Management ........................................................... 47 8.1 Dynamic Information Dissemination ........................................................................... 47 8.2 Security Considerations............................................................................................... 49 8.2.1 Electronic Tracking .............................................................................................. 49 8.2.2 Mobile Device Cloning ........................................................................................ 49 8.2.3 Denial of Service ................................................................................................. 50 8.2.4 Mobile Malware................................................................................................... 50 8.2.5 Secure Messaging ................................................................................................ 51 8.2.6 Trusted Applications ...........................................................................................
Recommended publications
  • Worldwide Mac Numbers?
    August 2005 Volume 3 Issue 8 Worldwide Mac Numbers? LOTS of Book, Game, Hardware, Shareware and Software Reviews inside Hacking Mac OS X Tiger, Mac Annoyances and other Mac OS X Tiger books Commandos Battle Pack Geek Jewelry iKey Delicious Library, Adobe Photoshop CS 2 and VideoCue Pro And much, much more… Icon contributed by Michele Patterson Volume 3 Issue 8 August 2005 macCompanion Table of Contents Masthead ........................................................................................................................................................................... 4 Letter From the CEO ............................................................................................................................................................ 5 Mac Numbers? by Robert Pritchett ................................................................................................................................. 5 Musings From Mars by Leland Scott ................................................................................................................................ 11 Anyone Can Develop A Dashboard Widget (And They Probably Will).................................................................... 11 The Mac Night Owl by Gene Steinberg............................................................................................................................ 17 The Mac Hardware Report: 400,000 Windows Users Can't Be Wrong ..................................................................... 17 Views from the Ivory Tower by
    [Show full text]
  • Smug February/05 Newsletter
    STANFORD/PALO ALTO MACINTOSH USERS GROUP NEWSLETTER Vol. 15 No.2 • February 2005 If you are into sound don’t miss this meeting Roku’s Mike Kobb Senior Software Engineer will be showing this exciting new product. Finally, a network music player that looks as good as it sounds! Roku SoundBridge plays your PC or Mac digital music files anywhere in the house – connecting your stereo or powered speakers to your computer’s digi- tal music library. Or, listen to a variety of Internet Radio stations, without even turning on your computer. WM A , MP3, AAC,AIFF and WAV music formats are supported — and it’s network ready with wired Ethernet or Wi-Fi. A large, bright display; Apple Rendezvous® and iTunes®* support;and Windows® Media Connect, Windows Media Player 10 and Windows Media DRM 10 support make the SoundBridge the most compatible music player around. SoundBridge makes playing your favorite music files a breeze. The only difference MACWORLD HIGHLIGHT between the M2000, M1000 and M500 models is the size Spotlight on the Approaching Ti g e r and capabilities of the display Tiger, tiger, burning bright In the forests of the night, What immortal hand or eye IN THIS ISSUE Dare frame thy fearful symmetry? MacWorld Highlight.................................................1 If the mystic William Blake were aware of what influence Roku SoundBridge ..................................................1 personal computing might have in altering society by he SMUG February Meeting Schedule..................2 might have made this poem about Apple Computers lofting ambition to make information more accessible to the user. He Do you need a ride ?......................................2 of course was referring to divine logic and not to our attempts SMUG CD-Rom—Winter 2005 ......................3 to retrieve information with greater ease.
    [Show full text]
  • Hh334.Pdf (3.880Mb)
    THE APPSMITHS: COMMUNITY, IDENTITY, AFFECT AND IDEOLOGY AMONG COCOA DEVELOPERS FROM NEXT TO IPHONE A Dissertation Presented to the Faculty of the Graduate School of Cornell University In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy| by Hansen Hsu May 2015 © 2015 Hansen Hsu THE APPSMITHS: COMMUNITY, IDENTITY, AFFECT AND IDEOLOGY AMONG COCOA DEVELOPERS FROM NEXT TO IPHONE Hansen Hsu, Ph.D. Cornell University 2015 This dissertation is an ethnographic study, accomplished through semi-structured interviews and participant observation, of the cultural world of third party Apple software developers who use Apple’s Cocoa libraries to create apps. It answers the questions: what motivates Apple developers’ devotion to Cocoa technology, and why do they believe it is a superior programming environment? What does it mean to be a “good” Cocoa programmer, technically and morally, in the Cocoa community of practice, and how do people become one? I argue that in this culture, ideologies, normative values, identities, affects, and practices interact with each other and with Cocoa technology in a seamless web, which I call a “techno-cultural frame.” This frame includes the construction of a developer’s identity as a vocational craftsman, and a utopian vision of software being developed by millions of small-scale freelance developers, or “indies,” rather than corporations. This artisanal production is made possible by the productivity gains of Cocoa technology, which ironically makes indies dependent on Apple for tools. This contradiction is reconciled through quasi-religious narratives about Apple and Steve Jobs, which enrolls developers into seeing themselves as partners in a shared mission with Apple to empower users with technology.
    [Show full text]
  • A Guide to Smartphone Sensors
    National Aeronautics and Space Administration A Guide to Smartphone Sensors Experimeter’s Guide To Smartphone Sensors Dr. Sten Odenwald Version 6.0: May 2019 [1] Introduction Smartphones have now become ubiquitous instruments for communications and information retrieval, but as part of their functionality they also contain a variety of sensors to determine their orientation, location and meteorological conditions. Over the years, hundreds of ‘apps’ have been designed to access this hidden information, turning smartphones into powerful measurement platforms, and usually at no cost. Meanwhile, mathematics plays a key role in all scientific investigations because research and observation usually involve taking some form of data, and often this data is in numeric form. The task then becomes one of organizing the data, looking for patterns in it, and finding an explanation for these patterns. These explanations, called theories, make predictions for future experiments and observations, which then have to be tested to see if what was predicted is in line with what was observed. All of these steps involve working with numbers. The first part of this Guide examines a wide variety of apps that measure interesting physical parameters such as temperature, pressure, motion, light intensity and many more quantities. The objective is to assess how well these apps and sensors actually measure the indicated parameters so that formal and informal educators and citizen scientists can gauge their reliability. Common apps and smartphone platforms are compared to professional-grade measurements to determine reliability and accuracy. A collection of 45 experiments are also provided for using these apps to make a variety of interesting real-world measurements.
    [Show full text]
  • Iphone Design Award-Winning Projects 9 9 9 5 3
    CYAN YELLOW SPOT VARNISH MAGENTA BLACK PANTONE 123 C ® Companion BOOKS FOR PROFESSIONALS BY PROFESSIONALS eBook Available iPhone Design Award-Winning Projects iPhone Design Award-Winning Phone Design Award-Winning Projects profiles developers receiving the pres- The nuts, bolts and philosophy behind some itigious Apple Design Awards for iPhone app excellence. You’ll learn what makes these apps stand out, including explanations of great user interface of the iPhone’s most elegant and innovative apps design and implementation. You’ll also get a look at the code under the hood, RELATEDTITLES and how these apps were engineered to be some of the most responsive, in- tuitive, useful, and just plain fun apps running on the iPhone. In addition, each profile is paired with an interview of a leading developer recognized for excellence in iPhone app design and execution. This includes such Mac and iPhone luminaries as: • Joe Hewitt of Facebook, paired with Loren Brichter of atebits, discussing innovation in iPhone User Interface Design; • foursquare’s Dennis Crowley and Naveen Selvadurai, paired with ngmoco:)’s Bob Stevenson and Allen Ma, creating connected, interactive gaming fun; • Jonathan and Ashley Wegener of JWeg Ventures, paired with Dave Witonsky and Randall Barnhart of Intermap, fitting huge data files into efficient geo- based apps; • Wil Shipley of Delicious Monster, paired with Chris Parrish and Brad Ellis of Rogue Sheep, building complex user interface elements with OpenGL and a watchful eye on Memory Management; • Zachary West of Prowl, paired with Elias Pietilä of Qvik, magically transforming big ideas into highly-focused, compelling user experiences; and • a bonus grouping of three super-luminaries, Ge Wang of Smule, Alykhan Jetha and Brandon Walkin of Marketcircle, and leading blogger, Marco Arment of Tumblr and Instapaper, philosophize on the intangible qualities of making better apps that enfranchise iPhone users.
    [Show full text]
  • Electronics Online Challenge
    Electronics Online Challenge By TEAM 505 B - RoboBeasts Natalie Rodriguez, Suzanna Garcia, Michelle Anaya, Lequis Mena Garcia, Kimberly Tudon, Isabella Tapia Introduction Our names are Natalie and Suzanna. We are from TEAM 505 B - RoboBeasts. We decided to do this project because we think that electronics are really interesting. In this project we will be taking apart the “Samsung S4” and the “Kyocera Hydro Reach”. We will show the components, and explain what they do. Why We Chose These Devices I (Natalie) personally chose the Samsung S4 because it was my first phone. It’s also on the older side so I thought it would be really interesting to see what’s inside and what makes it work. I (Suzanna) picked the Kyocera Hydro Reach because I have seen a lot of different kinds if phones but I haven't really seen what an old waterproof phone looked like, so i wanted to see how they made them. Materials Used 1. Screwdriver 2. Flathead screwdriver 3. Samsung S4 4. Kyocera Hydro reach 5. Phone (for pictures) 6. Chromebook (for research) 7. Gloves (for protection) 8. Goggles (also for protection) 9. Notebook and pencil (for notes) How We Took The Samsung S4 Apart The device that I took apart was a samsung galaxy s4. The first thing I did was take the before picture. After that I took the screws off. After that I took the battery cover. It revealed the mainboard and some wires. Then I disconnected the two wires that were connecting the two parts of the mainboard. One of them was a 3g gsm antenna flex cable and the other one was a normal flex cable.
    [Show full text]
  • Stealing Pins Via Mobile Sensors: Actual Risk Versus User Perception
    This is a repository copy of Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. White Rose Research Online URL for this paper: https://eprints.whiterose.ac.uk/119505/ Version: Published Version Article: Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F. orcid.org/0000-0002- 5284-6847 et al. (1 more author) (2018) Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. International Journal of Information Security. 291–313. ISSN 1615-5262 https://doi.org/10.1007/s10207-017-0369-x Reuse This article is distributed under the terms of the Creative Commons Attribution (CC BY) licence. This licence allows you to distribute, remix, tweak, and build upon the work, even commercially, as long as you credit the authors for the original work. More information and the full terms of the licence here: https://creativecommons.org/licenses/ Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Int. J. Inf. Secur. DOI 10.1007/s10207-017-0369-x REGULAR CONTRIBUTION Stealing PINs via mobile sensors: actual risk versus user perception Maryam Mehrnezhad1 · Ehsan Toreini1 · Siamak F. Shahandashti1 · Feng Hao1 © The Author(s) 2017. This article is an open access publication Abstract In this paper, we present the actual risks of steal- Keywords Mobile sensors JavaScript attack Mobile · · ing user PINs by using mobile sensors versus the perceived browsers User security User privacy Machine learning · · · · risks by users.
    [Show full text]
  • The Whole Digital Library Handbook
    the whole digital library handbook edited by diane kresh CONTENTS i THE WHOLE DIGITAL LIBRARY HANDBOOK Edited by Diane Kresh for the Council on Library and Information Resources American Library Association Chicago 2007 While extensive effort has gone into ensuring the reliability of information appearing in this book, the publisher makes no warranty, express or implied, on the accuracy or reliability of the information, and does not assume and hereby disclaims any liability to any person for any loss or damage caused by errors or omissions in this publication. Composition by Priority Publishing using Adobe PageMaker 7.0 on a Windows platform. Selected artwork from ClipArt.com. Printed on 50-pound white offset, a pH-neutral stock. The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1992. Library of Congress Cataloging-in-Publication Data The whole digital library handbook / edited by Diane Kresh for the Council on Library and Information Resources. p. cm. Includes index. ISBN 0-8389-0926-4 (alk. paper) 1. Digital libraries—Handbooks, manuals, etc. I. Kresh, Diane. II. Council on Library and Information Resources. ZA4080.W48 2007 025.00285—dc22 2006027498 Copyright © 2007 by the American Library Association. All rights reserved except those which may be granted by Sections 107 and 108 of the Copyright Revision Act of 1976. Permission is granted to copy, distribute, and/or modify the Wikipedia articles excerpted on pages 2–3 and 241 under the terms of the GNU Free Documenta- tion License, Version 1.2, or any later version published by the Free Software Foundation (see www.gnu.org/copyleft/fdl.html).
    [Show full text]
  • Download to the Computer After Buying Them
    Microlearning2006-Jasmine.qxd 11.01.2007 15:01 Uhr Seite 1 Microlearning: an emerging field in science (Foreword) Tilmann Märk Leopold-Franzens-Universität Innsbruck (Austria) Vice-Rector for Research Institut für Ionenphysik und Angewandte Physik Professor I had already the pleasure and the chance to witness the starting of this conference series on microlearning last year. It is always extremely exciting to observe the emer- gence of a new field in science, in this special case a new field due to the interaction between science, technology and our modern communication society. I was impressed by the contents of the first conference and in particular by the conference proceedings, which to my great pleasure were published in our university publishing house, called iup (innsbruck university press). Thus our special thanks go to those who brought this important conference series in the field of microlearning to Innsbruck. Clearly we have to thank Prof. Peter Bruck, head of the ARC Research Studios. The ARC Research Studios are a success story in them- selves. They are enhancing the Austrian innovative and competitive ability in the area of information and communication technology. The collaboration between the Austrian Research Studios and the Leopold-Franzens-Universität Innsbruck (LFUI) has already generated innovative and competitive research results, which have had an impact on the national and international scientific community; incidentally not only in the area of information technology but also in the field of biotechnology. Secondly, let me thank Prof. Theo Hug, Associate Professor and member of the suc- cessful faculty and institute of education at the LFUI and at the same time Head of the ARC Research Studio eLearning Environments.
    [Show full text]
  • Photo IC CHAPTER 04
    Photo IC CHAPTER 04 1 Illuminance sensors 7 Applications 1-1 Photo IC diodes 7-1 Simple illuminometers 1-2 Light-to-frequency converter photo IC 7-2 High-speed digital transmission (application example of photo IC for optical link) 7-3 LED backlight LCD display color adjustment (application example of digital color sensor) 2 Transmitter/receiver photo IC for optical link 7-4 Multifunctional sensor for smartphones (application example of color/proximity sensor) 2-1 General-purpose type 7-5 Print start timing signal output for digital copiers 2-2 For MOST networks (150 Mbps) and laser printers (application example of photo IC for laser beam synchronous detection) 3 Encoder modules (displacement/rotation sensors) 4 Color sensors 4-1 Digital color sensors 4-2 I2C compatible color sensors 4-3 Color/proximity sensors 5 Light modulation photo IC (for optical switch) 6 Photo IC for laser beam synchronous detection 1 Photo IC Photo ICs are optical devices that combine a photosensitive section and a signal processing circuit into one package. These devices possess versatile functions according to their particular product applications. Photo ICs offer the following features compared to devices made up of discrete parts on a circuit board. Compact and lightweight Resistant to electromagnetic induction noise High reliability Ideal for mass production High cost performance Photo ICs can be broadly grouped into monolithic types and hybrid types by their structures. The monolithic type contains a photosensor and a signal processing circuit formed on the same chip. This type is extremely resistant to electromagnetic induction noise because there is no wiring between the photosensor and signal processing circuit.
    [Show full text]
  • About This Particular Macintosh 11.01
    Cover 11.01 / January 2005 ATPM Volume 11, Number 1 About This Particular Macintosh: About the personal computing experience™ ATPM 11.01 1 Cover Cover Art Copyright © 2005 Heather Sitarzewski. We need new cover art each month. Write to us! Editorial Staff Publisher/Editor-in-Chief Michael Tsai Managing Editor Christopher Turner Associate Editor/Reviews Paul Fatula Copy Editors Raena Armitage Johann Campbell Chris Lawson Ellyn Ritterskamp Brooke Smith Vacant Web Editor Lee Bennett Publicity Manager Vacant Webmaster Michael Tsai Beta Testers The Staff Contributing Editors Eric Blair Matthew Glidden Ted Goranson Andrew Kator Robert Paul Leitao Wes Meltzer David Ozab Sylvester Roque Mike Shields Evan Trent How To Vacant Interviews Vacant Opinion Vacant Reviews Vacant ATPM 11.01 2 Cover Artwork & Design Graphics Director Vacant Layout and Design Michael Tsai Cartoonist Matt Johnson Graphic Design Consultant Jamal Ghandour Blue Apple Icon Designs Mark Robinson Other Art RD Novo Emeritus RD Novo Robert Madill Belinda Wagner Edward Goss Tom Iovino Daniel Chvatik Grant Osborne Gregory Tetrault Contributors Lee Bennett Eric Blair Paul Fatula Ted Goranson Matt Johnson Robert Paul Leitao Gregory Maddux Wes Meltzer Ellyn Ritterskamp Sylvester Roque Michael Tsai Macintosh users like you Subscriptions Sign up for free subscriptions using the Web form . ATPM 11.01 3 Cover Where to Find ATPM Online and downloadable issues are available at http://www.atpm.com. ATPM is a product of ATPM, Inc. © 1995–2005, All Rights Reserved ISSN: 1093-2909 Production Tools Acrobat Apache AppleScript BBEdit CVL CVS DropDMG FileMaker Pro FrameMaker+SGML GraphicConverter Mesh Mailman Mojo Mail MySQL Perl Photoshop Elements Python rsync Snapz Pro X ssh StuffIt Super Get Info The Fonts Cheltenham Frutiger Isla Bella ATPM 11.01 4 Cover Marydale Minion Reprints Articles and original art cannot be reproduced without the express permission of ATPM, unless otherwise noted.
    [Show full text]
  • Der Männerblog Der Männerblog
    Der Männerblog Der Männerblog - www.maennerseiten.de/blog Inhaltsverzeichnis 30. 12. 2005 ............................................................................................................................................................................................................. 3 Raffinierte Statistiken mit Google Analytics ....................................................................................................................................................... 3 WordPress 2.0 - Trackback-Bug und Spamschutz ............................................................................................................................................ 3 29. 12. 2005 ............................................................................................................................................................................................................. 4 Hilflose Frauen? ................................................................................................................................................................................................ 4 28. 12. 2005 ............................................................................................................................................................................................................. 4 WordPress 2.0-Update ...................................................................................................................................................................................... 4 25. 12. 2005 ............................................................................................................................................................................................................
    [Show full text]