wiby  
Settings



Floodgap - Software

http://www.floodgap.com/software/

DOS, Amiga and Atari computers. Includes linker utilities, documentation, and support for Rockwell CMOS and Western Digital '816 variants. GPL open source. HuePl: A Perl Utility f

http://www.catb.org/jargon/oldversions/jarg262.txt

http://www.catb.org/jargon/oldversions/jarg262.txt

else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,

Digital Freedom across the World

https://eylenburg.github.io/countries.htm

all smartphones and computers sold in Russia must come with pre-installed Russian software, which most likely facilitates government access to these devices anyway. In practice, R
{REPLACE THIS}

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan

Hercules

https://www.jaymoseley.com/hercules/

that runs mainframe computers is prohibitively expensive.  However, there are older versions of several of IBM's popular operating systems that are now classified as Public D
MVS 3.8j under Hercules: Tutorials and Resources

Piet Beertema's website

https://godfatherof.nl/

a wild variety of computers worldwide, speaking the same "language" to communicate: the Internet Protocol, or in short IP. And ' www ', CERN's first and in fact sort of 'prehistor

NLnet; All projects

https://nlnet.nl/project/

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2017/

Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Richard A. Bartle: Players Who Suit MUDs

https://mud.co.uk/richard/hcds.htm

months on university computers before a combination of management breakdown (brought on by player boredom) and resource hogging would force them to close down - with no other MUDs

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys/pdf/Keys

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

John Seely Brown: Publications

https://www.johnseelybrown.com/pubs.html

Have All the Computers Gone?,” MIT Technology Review , John Seely Brown, January/February 2001, pp 86-87. “Ecological Computing.” The Industry Standard , John Se


Find more...