wiby  
Settings



Router Security

https://routersecurity.org/

smartphones, and computers." While you are at it, why not completely disconnect the router from power (thus forcing a cold boot). That said, every coin has two sides. In Janu
Router Security Home Page

Windows Embedded POSReady 2009 Update-Hack for Windows XP

http://soggi.org/misc/articles/Windows-Embedded-POSReady-2009-Update-Hack-Windows-XP.htm

describes a way to get security updates for Windows XP (32 bit) which is not supported by Microsoft itself, depending on your residence these methods could be a violation of the E
How to get Security Updates for Windows XP until April 9, 2019 with the Windows Embedded POSReady 2009 Update-Hack and how to solve Error Numbers 0x80072EFF, 0x80072F05, 0x80072F8A

I Don't Need A Smart Phone

http://toastytech.com/about/smartphones.html

work requires a desktop computers and tactile touch typing. But thanks to these touch screen idiots, everyone insists on copying stupid tactile-less garbage - such as "smart" ther

https://www.rfc-editor.org/rfc/rfc7230.txt

https://www.rfc-editor.org/rfc/rfc7230.txt

from general-purpose computers to home appliances. In some cases, communication options are hard-coded in a client's configuration. However, most HTTP clients rely on the same res

How PGP works

http://users.ece.cmu.edu/~adrian/630-f04/PGP-intro.html

— even a billion computers doing a billion checks a second — it is not possible to decipher the result of strong cryptography before the end of the universe. One would

Stop Using Discord

https://usemumble.neocities.org/

with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc

The Design and Implementation of the Tor Browser [DRAFT]

https://2019.www.torproject.org/projects/torbrowser/design/

such as seizing the computers of all Tor users in an area (especially after narrowing the field by the above two pieces of information). History records and cache data are the pri

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random

NLnet; Current projects

https://nlnet.nl/project/current.html

ARM-based single board computers AtomicServer Local-First AtomicServer Local-First Headless CMS Authlib Reliable OAuth and OIDC handling in Python Automated clearing of source cod

Arcade@Home(tm) - MAME, N64 & PSX Emulators - Final Burn v0.008 Released

https://www.arcadeathome.com/

arcade controls to computers and consoles Ouya passes Kickstarter goal on first day at $950K and rising Bleeding Edge MAME / MESS source downloads (GIT) MAME & MESS Political Road
MAME, N64 & PSX Emulators - Final Burn v0.008 Released

BBC NEWS | Technology | Microsoft starts Vista hard sell

http://news.bbc.co.uk/2/hi/technology/6309651.stm

with more than 100m computers predicted to be using it worldwide within 12 months. Microsoft founder Bill Gates called the launch a "big day" that would bring a new digital workst
Microsoft launches Windows Vista, with more than 100m PCs expected to use it within 12 months.

The Power of Centralization

https://secushare.org/centralization

than that, almost all computers share the problem of "downstream abuse", so the only ultimate way to protect something from your friends is to not share it online. Top


Find more...