Re: Table of Contents

2001-07-11 Thread Punky Tse
> > > > P.S. What hacker I mean is: The one who read the source code and make > > change to it so that the whole system get benefit from it. So you are > > hacker. (but me not yet). The guy who break the system is > > cracker, or black > > hacker to be specific. > ??? A cracker is a criminal

RE: Table of Contents

2001-07-11 Thread Martin van den Bemt
> > P.S. What hacker I mean is: The one who read the source code and make > change to it so that the whole system get benefit from it. So you are > hacker. (but me not yet). The guy who break the system is > cracker, or black > hacker to be specific. ??? A cracker is a criminal hacker. not some

Re: Table of Contents

2001-07-10 Thread Punky Tse
> >2) How about moving Developing Interceptors, Valves and Connectors, and > >Using Tomcat Utility Classes to a seperate Developer Guide? > >They are only > >useful for real hackers. > > Don't forget what make Apache HTTP server so successfull. > The number of modules built for Apache 1.2/1.3 AP

RE: Table of Contents

2001-07-10 Thread GOMEZ Henri
>2) How about moving Developing Interceptors, Valves and Connectors, and >Using Tomcat Utility Classes to a seperate Developer Guide? >They are only >useful for real hackers. Don't forget what make Apache HTTP server so successfull. The number of modules built for Apache 1.2/1.3 APIs. If we do

Re: Table of Contents

2001-07-09 Thread Alex Chaffee
Punky Tse wrote: > Alex, > > Please see my comment below: > > 1) The details of the TOC looks better than my version. Thanks :) > 2) How about moving Developing Interceptors, Valves and Connectors, and > Using Tomcat Utility Classes to a seperate Developer Guide? They are only > useful for

Re: Table of Contents

2001-07-09 Thread Punky Tse
Alex, Please see my comment below: 1) The details of the TOC looks better than my version. 2) How about moving Developing Interceptors, Valves and Connectors, and Using Tomcat Utility Classes to a seperate Developer Guide? They are only useful for real hackers. 3) How about putting all the in