Skip to main content

Features

Galaxies behind the Milky Way

Over a fifth of the universe is hidden from view, blocked by dust and stars in the disk of our galaxy. But over the past few years,

By Renée C. Kraan-Korteweg and Ofer Lahav

Designer Estrogens

These compounds--also called SERMs-- have evolved from mere laboratory curiosities into drugs that hold promise for preventing several major disorders in women

By V. Craig Jordan

Secrets of the Slime Hag

Loathsome though they may seem, hagfishes may also resemble the earliest animals to have a braincase--making them even older than the first animals to develop a backbone

By Frederic H. Martini

The Asymmetry between Matter and Antimatter

In 1999 new accelerators will start searching for violations in a fundamental symmetry of nature, throwing open a window to physics beyond the known

By Helen R. Quinn and Michael S. Witherell

The Artistry of Microorganisms

Colonies of bacteria or amoebas form complex patterns that blur the boundary between life and nonlife

By Eshel Ben-Jacob and Herbert Levine

Simon Newcomb: Astronomer with an Attitude

The most celebrated American astronomer of the late 19th century advocated broad social and cultural reforms based on the use of scientific method

By Albert E. Moyer

Computer Security and the Internet

How Hackers Break In. . . and how they are Caught

Port scanners, core dumps and buffer overflows are but a few of the many weapons in every sophisticated hacker's arsenal. Still, no hacker is invincible

By Carolyn P. Meinel

Firewalls

Three types of safeguards offer a formidable defense against Internet intruders

By William Cheswick

Digital Certificates

By Warwick Ford

The Java Sandbox

By James Gosling

Cryptography for the Internet

E-mail and other information sent electronically are like digital postcards--they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions

By Philip R. Zimmermann

The Case against Regulating Encryption Technology

One of the pioneers of computer security says the U.S. government should keep its hands off cryptography

By Ronald L. Rivest

Departments

  • From the Editor

    Learning from the Hackers

  • Letters

    Letters to the Editors, October 1998

  • Recommended

    Reviews and Commentaries--The Paradox of Gender

  • The Editors Recommend

  • Anti Gravity

    Whale Weight Watching

  • 50, 100 & 150 Years Ago

    50, 100 and 150 Years Ago: Red Scare, Ethereal Chemistry and Modern Barometer

  • Wonders

    Field Guide to the New Biology Lab

  • In Brief

    In Brief, October 1998

  • Profile

    Starving Tumors of Their Lifeblood

  • Mathematical Recreation

    Playing with Chocolate

  • Amateur Scientist

    Home Movies of an Invisible World

  • Science and the Citizen

    In the Heat of the Night

  • Polarized Life

  • String Instruments

  • After the Deluge

  • By the Numbers

    Where the Doctors Aren't

  • Working Knowledge

    Motion-Picture Projectors--Working Knowledge

  • Connections

    Does this Take you Back?

  • Cyber View

    Y2K: The End of the World as We Know It

  • Field Notes

    Phantom Touch

  • Technology and Business

    Bloodless Testing

  • Inner-City Violence

  • In the Audio Spotlight

  • In Focus

    Personal Pills

Purchase To Read More

Already purchased this issue? Sign In to Access
Select Format

Special Edition: Mysteries of the Mind