Make us homepage
Add to Favorites
FAIL (the browser should render some flash content, not this).

Main page » Black Hole

Sort by: date | rating | most visited | comments | alphabetically


Identity of England
 
 

Identity of EnglandIdentity of England

The English are now in need of a new sense of home and belonging, and a re-assessment of who they are. This is a history of who they were, with present needs in mind. It begins by considering how the English state created an English nation which from very early days refused to see itself simply as the state's creature. It considers also how that nation survived shattering revolutions in industry, urban living and global conflict while at the same time retaining a softer, more humane vision of themselves and their land.

 

no web sites in the name of the file pls

 
  More..
Using Brainpower in the Classroom: Five Steps to Accelerate Learning
 
 

Using Brainpower in the Classroom: Five Steps to Accelerate LearningUsing Brainpower in the Classroom: Five Steps to Accelerate Learning

Illustrated throughout with classroom examples from a wide range of subject areas, the book is highly practical in its focus and the ideas it contains can easily be adapted to work with all age ranges and types of school.

 

http://englishtips.org/1150850323-using-brainpower-in-the-classroom-five-steps-to.html



Dear User! Your publication has been rejected as it seems to be a duplicate of another publication that already exists on Englishtips. Please make sure you always check BEFORE submitting your publication. If you only have an alternative link for an existing publication, please add it using the special field for alternative links in that publication.
Thank you!


 
  More..
Maximum Mac OS X Security
 
 

Maximum Mac OS X SecurityMaximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Dear User, your publication has been rejected because WE DO NOT ACCEPT THIS SORT OF MATERIALS at englishtips.org. Note: if you're trying to share a movie, TV series or a cartoon with English subtitles, you can post the links in our Forum. We do not accept such materials on the main site. Thank you

 
  More..
Mac OS X Security
 
 

Mac OS X SecurityMac OS X Security

Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network


Dear User, your publication has been rejected because WE DO NOT ACCEPT THIS SORT OF MATERIALS at englishtips.org. Note: if you're trying to share a movie, TV series or a cartoon with English subtitles, you can post the links in our Forum. We do not accept such materials on the main site. Thank you

 
  More..
Mac OS X Leopard Phrasebook
 
 

Mac OS X Leopard PhrasebookMac OS X Leopard Phrasebook

Easy to carry and easy to use–lets you ditch all those bulky books for one portable pocket guide

Dear User, your publication has been rejected because WE DO NOT ACCEPT THIS SORT OF MATERIALS at englishtips.org. Note: if you're trying to share a movie, TV series or a cartoon with English subtitles, you can post the links in our Forum. We do not accept such materials on the main site. Thank you

 
  More..