wiby  
Settings



Ted Felix - Kids Computer Programming Books

http://tedfelix.com/books/

time in the history of computers. The personal computer became a reality. Many kids had easy access to computers. There was no Internet. The computers that you could buy came only

202511 - apenwarr

https://apenwarr.ca/log/

do they make all the computers connect? We can't even get the world to agree on 60 Hz vs 50 Hz, 120V vs 240V, or which kind of physical power plug to use. Communications equipment

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

Digital Freedom across the World

https://eylenburg.github.io/countries.htm

all smartphones and computers sold in Russia must come with pre-installed Russian software, which most likely facilitates government access to these devices anyway. In practice, R
{REPLACE THIS}

Online BYTE Archive

https://halfhill.com/bytelink.html

the most crash-prone computers ever built is that reliability has never been a high priority — either for the industry or for users. [Cover story: April 1998] Why Mainframes

Three PC Pieces

http://linusakesson.net/music/three-pc-pieces/index.php

Chipophone Commodordion Computers Craft Craverly Heights in Dialog Dial-a-SID Dialog Elements of Chip Music Faking Fissile Material Fratres

Download MS Basic versions

http://www.ojodepez-fanzine.net/network/qbdl/history_of_visual_basic.html

the PS/2 personal computers. Newer IBM and compatible PCS stopped including ROM BASIC with the hardware. Other factors, including the rapid development of applications software an

Stranded

http://linusakesson.net/programming/ti83/stranded/index.php

Chipophone Commodordion Computers Craft Craverly Heights in Dialog Dial-a-SID Dialog Elements of Chip Music Faking Fissile Material Fratres

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Vocalise

http://linusakesson.net/music/vocalise/index.php

Chipophone Commodordion Computers Craft Craverly Heights in Dialog Dial-a-SID Dialog Elements of Chip Music Faking Fissile Material Fratres

Mataroa Collection

https://collection.mataroa.blog/

https://shkspr.mobi/ Computers and books Adam Johnson https://adamj.eu/ Django Fatbobman's Blog https://fatbobman.com/ Swift and SwiftUI Jason Calacanis https://calacanis.com

Dial-a-SID

http://linusakesson.net/hardware/dial-a-sid/index.php

Chipophone Commodordion Computers Craft Craverly Heights in Dialog Dial-a-SID Dialog Elements of Chip Music Faking Fissile Material Fratres


Find more...