wiby  
Settings



Software Engineering Humor

http://www.cs.uni.edu/~mccormic/humor.html

dirty, ill-maintained computers, and they are unceremoniously deleted when they're not needed anymore." Granola said that the software is kept in unsanitary conditions and is

Kernel Planet

https://planet.kernel.org/

with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu

Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

PaddleWise - Who's Who A-B

http://www.paddlewise.com/whoswho/

with my dog and 2 cats, computers, walking on the beach, gardening, learning foreign languages ....... g) STRONG OPINIONS: Work interferes with the important things in life ! Outd
A listserve and site about seakayakingand other watersports with emphasis on paddling safety, navigation andseamanship, equipment and the marine environment and conservation issues

Trump Accomplishments

https://libertytao.com/trump.html

software on government computers, due to the company's ties to Russian intelligence. Imposed sanctions against five Russian entities and three individuals for enabling Russia's mi

Tech Stuff Only

http://web.archive.org/web/20190120103108/http://www.techstuffonly.com/

→ Posted in Computers , Electronics , Programming , Projects , Software | Tagged 8088 , assembly , command , command line , computer , controller , homebrew , keyboard , PS/2

ICIWorld Seminars for the World

http://www.iciworld.com/seminars.shtml

Technology, and Computers and Software.  It will benefit you, your clients , and your prospects. Stay on the cutting edge!  Seminar Arrangements ICIWorld will have avail

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

or Asia). Some seem industry-specific (e.g. crypto). Some emphasize they only want elite hunters. Some sound more like contracting shops than open programs. Some offer a grand tot
How to become a bug-bounty hunter and do penetration testing

About me ·Luciano Nooijen

https://lucianonooijen.com/about/

been interested in computers and software from an early age. After making this first website, I continued to learn more about website building, which enabled me to apply my skills

Don's Maps - Palaeolithic / Paleolithic European, Russian, Ukrainian and Australian Archaeology / Archeology

https://www.donsmaps.com/

I got much better computers and software over the years, Adobe Photoshop and Illustrator for example, and my maps became colourised and had more detail. I did a lot of maps of the
Resources for the study of Palaeolithic European, Russian, Ukrainian and Australian Archaeology

Stroustrup: FAQ

https://www.stroustrup.com/bs_faq.html

and the best uses of computers are outside traditional computer science. See also my C++ style and techniques FAQ . Real novices facing their first "read some data, do something t

Old'aVista: Directories

http://www.oldavista.com/dirs/computers_and_internet/multimedia

Example Code Home > Computers and Internet > Multimedia M ETA   D IRECTORIES Indices@   (1996) C ATEGORIES Archives   (1996) CD-ROM   (1996) Companies@ &
A search engine for OLD websites hosted in services like Geocities, Angelfire, Xoom, AOL, Tripod and so on!


Find more...