wiby  
Settings



Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

of an RSA file security encryption program tattooed on his arm (:wired496:) RFC 1882: The 12-Days of Technology Before Christmas Country domains registered: Ethiopia (ET), Cote d'
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

All Group Meeting

https://www.w3.org/2001/02/allgroupoverview.html

w/ XML Protocol, Encryption, XML Sig. and CC/PP XSL 20   XML Query ( agenda ) (Member only) 30 Don't want to overlap w/ XML Schema.  Would like to overlap w/ XSL. Would

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

for using end-to-end encryption French court rules that Steam’s ban on reselling used games is contrary to European law MEPs approve sweeping changes to copyright law The Legaliti
All your base are belong to us!

John Gilmore's home page

http://www.toad.com/gnu/

and dissemination of encryption (also known as cryptography, the science and art of secret writing). I originally hosted the mailing list (cypherpunks@toad.com) and provided space

Security

http://askmrwizard.com/2019/Security/Security.htm

of foundational, modern encryption How your computer's Operating System really works What the blinking lights really mean on your Router and Wifi equipment The simplest way to man

Your Personal Web Site

https://www.billdietrich.me/YourPersonalWebSite.html

And maybe I need an encryption key, too. [Eventually asked Support, they said yes need SSH, no key, they'll enable SSH on my account. Login details a bit different, but now SFTP w
How to develop and maintain your own personal web site

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/home.html

everyone to use encryption when sending email across the Internet. Additionally we do not normally store email on our servers except for the time it takes in between when we recei
Junk Email Filter - Front End Spam

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

etc. - a myriad of encryption programs, bulk ciphers, variants on PGP, etc. Some of these I've listed...others I've had to throw my hands over and just ignore. (Keeping track of z

Gossip’s Web

https://gossipsweb.net/experiments

audio , tools , encryption blackbeangrocery.com/blessings/ blessings , community , ideas , soap garden.surf drawing , guestbook , leaving , messages , to , your , friend deee-ligh
The directory of handmade webpages

GNU.Support website about GNU Operating Systems

https://gnu.support/

Free Cultural Works Encryption and Privacy Schneier on Security Window Managers StumpWM File Managers ROX Filer Midnight Commander Latest pages Building a Sovereign Local LLM on L
GNU.Support is a website dedicated to promoting the GNU Operating System and free software, emphasizing user freedoms, practical applications, and programming education while adher

CipherSaber Home Page

https://ciphersaber.gurus.org/

attack has reopened the encryption debate and once again it is necessary to explain why public access to strong encryption is in our national interest. Many have pointed out the o
Fight the crypto ban by learning how to write your own strong encryption program.

All links @ cidoku.net

http://cidoku.net/en/links/all

number and supports E2E encryption. DevGuru A reference site for old-school web design standards such as HTML 4 and CSS 2. Farside A list of instances of Invidious, Teddit, etc. U


Find more...