wiby  
Settings



Discontinued Software

https://almy.us/softwaredeath.html

Software I've used computers for over 50 years so I've seen my share of computer programs, and computers, come and go. But it's always disconcerting when long used programs go awa
Discontinued Software

Kernel Planet

https://planet.kernel.org/

with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu

It looks like a product but is secretly a subscription

https://calpaterson.com/printers.html

example occurs in business-to-business deals. If one party to the deal is stronger than the other they will often make the weaker party apply their capital rather than invest thei
The mental minefield of capex and opex

My Sailboat 'Magnolia'

https://www.billdietrich.me/Magnolia.html

and other public computers in the USA. Yes, theoretically it is possible that an ISP or internet cafe could capture your info. Probably most likely threat is that a computer in an
My sailboat 'Magnolia', a 1973 Gulfstar 44 motor-sailer pilothouse ketch in the Caribbean

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2

NetHack 3.6.0: Guidebook for NetHack 3.6

http://www.nethack.org/v360/Guidebook.html

Are you sure this is the page you want? This is not the current version. Go to the NetHack Home Page. This Guidebook is also available in pdf and ASCII formats. Table of Contents

Documentary: The LoserUsers

http://rmitz.org/bbsloser.html

"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/terms_and_conditions.html

very few people had computers. It was a UNIX standard an ran on computers that people accessed from serial terminals. SMTP sent messages directly from the senders computer to the
Junk Email Filter - Front End Spam

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

by people and not computers... To aid that idea SAC even instituted the "failSafe"; program. What made it automatic was the program flow of the SAGE computer.... In simple terms t

((lambda (x) (create x)) '(knowledge))

https://lambdacreate.com/posts/26

using only their oldest computers. For most this meant something with a gig of ram (which was then software limited down to 1/2gb), and some sort of 2000's CPU on old 5400rpm hdds

Liveness.com - Biometric Liveness Detection Explained

https://www.liveness.com/

Turing test to tell Computers and Humans Apart", is a simple challenge-response test used in computing to determine whether the user is human or a spam bot. In an article on
Liveness Detection is an AI computer system’s ability to determine that it is interfacing with a physically present human being and not an inanimate spoof


Find more...