wiby  
Settings



Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

1401 Stories

https://ibm-1401.info/Stories.html

out errors before the computers arrived. I built a lot of muscles there, horsing hundred-tray files from end to end of the building and back again, then merging corrected cards ba

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c

Cocaine Inc

https://www.cocaine.wiki/cokecrime/

Kind of like a business-to-business exchange, the site allows black-market money brokers to bid on the dirty dollars, which cartel financial chiefs want to convert to Colombian pe

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni

Kicks Condor

https://www.kickscondor.com/

the whole are on home computers, that has implications. For me, Beaker DOES pay attention to the original good part: view source. It brings view source to the modern ‘ye-app-web’
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM

Adequacy.org || Is Your Son a Computer Hacker?

https://wh0rd.ca/humor/text/Adequacy_org%20%20Is%20Your%20Son%20a%20Computer%20Hacker.htm

grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we'd bough

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Invisible LAN Home Page

http://invisiblesoft.com/invlan/index.shtml

running on other computers in the network. Your computer must be running Windows 95/98/Me, but the other computers can be running DOS, Windows 3.X, or Windows 95/98/Me. You'll fin
HomePage for Invisible Software

Acceleration Watch (Understanding Accelerating Change)

https://www.accelerationwatch.com/

entitled " Today's Computers, Intelligent Machines, and Our Future ." The final section of this essay "considers the implications of the emergence of intelligent ma


Find more...