. . : : z i n e : : . . ELPiS – Web 1.0 Magazine about Small Web, Indie Web & Retro Internethttp://elpis.ws/cgi-bin/cms/
on both old and new computers, as well as mobile devices. This is based on the principles of optimization and speed that I consider important not only on the web but also in real
ELPiS is a Web 1.0 magazine exploring the small web, indie web, and digital minimalism. Discover retro websites, web nostalgia, and alternative internet culture.
/tech/ - Technology - Page 1https://zzzchan.xyz/tech/index.html
into everyone's computers again (like the udev project) and this time force even BSDs to install the cancer. Replies: >>18808 Anonymous 06/05/2026, 23:02:01 No. 18800 Hide F
Technology & Computing
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
https://www.rfc-editor.org/rfc/rfc2839.txthttps://www.rfc-editor.org/rfc/rfc2839.txt
diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications
https://www.rfc-editor.org/rfc/rfc5894.txthttps://www.rfc-editor.org/rfc/rfc5894.txt
the resolvers on users' computers. IDNA allows the graceful introduction of IDNs not only by avoiding upgrades to existing infrastructure (such as DNS servers and mail transport a
Using the MM email client in the Modern Worldhttps://kermitproject.org/mm/
email even on Unix computers that no longer support mailspool delivery by using secure POP3 (Post Office Protocol) to fetch your new mail; you can send and receive mail in ISO 885
The Excuse of the Dayhttps://meyerweb.com/feeds/excuse/
gone into developing computers, operating systems, Internet protocols, pager technology—basically, almost every communications technology advance of the latter half of the 2
The web home of Eric A. Meyer, CSS guy; and his wife Kathryn, doctor of nursing.
Chris Koehnke's Webpagehttp://chriskoehnke.com/
2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band
time.txryan.com | Public NTP, NTS, and Roughtime serverhttps://time.txryan.com/
accurate time matter? Computers can't agree on much, but they need to agree on the time. Encrypted connections depend on certificates that expire. If a machine's clock is wrong, i
Public NTP server with NTS encryption and Roughtime support. Stratum 2 time synchronization at time.txryan.com. Set up in a single line.
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2001/
now bristling with computers, updated the hub to Robert's 10/100 switch. Located an atk chaining bug. Plugged onwards with the merge to libbonoboui, hmm. Bed, seeing J' at the cra
Find more...