Athena's blog - Athena's Sitehttps://www.alm.website/blog/
How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard
All postshttp://unsafeperform.io/blog/tags/all/
games for 8-bit home computers, all that text is actually relatively quite a lot! In The Revenge , for example, just the various messages printed throughout the game fill 16 KB, a
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
DESCENT: Game Infohttp://insectoid.budwin.net/dos/descent/d1gminfo.html
other IPX-connected computers. Availability: The MacPlay CD-ROM is harder to find than the DOS CD-ROM or I+II collection, but not impossible; I found one on eBay at the sam
CELF Embedded Linux Conferencehttps://www.embeddedlinuxconference.com/elc_2009/sessions.html
ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni
Kicks Condorhttps://www.kickscondor.com/
the whole are on home computers, that has implications. For me, Beaker DOES pay attention to the original good part: view source. It brings view source to the modern ‘ye-app-web’
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM
Learn Multiplatform Z80 Assembly Programming... With Vampires!https://www.chibiakumas.com/z80/
64 kilobytes ... in computers 'Kilo' is 1024, because binary works in powers of 2, and 2^10 is 1024 64 kilobytes is the amount of memory a basic 8-bit system can access Z80 is 8 b
A provably strong password you can remember | Clarionhttp://www.cambridgeclarion.org/pw.html
Goliath of modern super computers. The story, with its doubling on each square, is also apt for the modern age of digital computers that work with “bits” or binary digits. If you
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
TCB13.comhttps://tcb13.com/
and utility of our computers Task Deadlines are Designed to Force Engineers to Work for Free Technical debt as a lack of understanding Your Computer Isn't Yours: Apple knows what
WOLF - a proposed new signal format for LFweak-signal workhttps://www.qsl.net/dl4yhf/wolf/wolf_info.html
propagation path remain open over the required interval. I hope that WOLF will permit a QSO to be completed in an hour, if one station receives a signal that is 10 dB weaker than
John Regehr's Home Pagehttps://users.cs.utah.edu/~regehr/
Teaching Papers Contact Computers are amazingly fun and useful, but why do they crash and hang? Why are they so terrifyingly insecure? The problem is many-faceted, but an importan
Find more...