Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their
http://www.catb.org/jargon/oldversions/jarg262.txthttp://www.catb.org/jargon/oldversions/jarg262.txt
else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,
6502.org: Development Tools: Assemblers and Disassemblershttp://www.6502.org/tools/asm/
designed for Atari computers and emulators. 6502/Microlab Assembler - David Jordan has written this very simple assembler for use with the EPE Microlab trainer board. This page co
Assemblers, Disassemblers, and Optimizers for 6502 code.
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan
Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)http://w1.fi/wpa_supplicant/
for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA A
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)
Old, but Interesting Programshttp://invisible-island.net/personal/oldprogs.html
But I could see that computers could do more than compute. I tried writing a program to generate anagrams. That did not go well. Larry Tessler (a less-known Tesler ). advised me t
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.
https://www.humprog.org/~stephen/https://www.humprog.org/~stephen/
believe (as I do) that computers are for augmenting the human intellect , not just for high-performance data crunching. I believe that technology cannot be pursued in isolation. &
RISC OS Open: About ushttps://www.riscosopen.org/content/about
worked for Acorn Computers. The ROOL team is able to help partners and customers to quickly integrate, optimise and deploy efficient RISC OS based solutions in order to take advan
Order Without the State: Theory, Evidence, and the Possible Future Ofhttp://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm
fool people or their computers, but one cannot get a bullet through a T-1 line. It is in that sense a world of entirely voluntary interaction. In order to use force against an onl
Techno's Psion Series 3c Pagehttp://users.digitalindigo.net/techno/psion.html
of the early 'pocket computers'. While not quite as easy on which to type as a much larger laptop (or Psion's more recent and larger Series 5), the Series 3c keyboard is more than
XML Linking Language (XLink) Version 1.1https://www.w3.org/TR/xlink/
for consumption by computers. 2.2 Arcs, Traversal, and Behavior [ Definition : Using or following a link for any purpose is called traversal .] Even though some kinds of link can
Tools and utilities for Windowshttp://www.ltr-data.se/opencode.html
administration of computers and networks? Migrate old source code to modern development systems? Have some kind of hard-to-solve problem with computers, networks, drivers, applica
Tools for Windows
Find more...