wiby  
Settings



Ayham's Online Website | A Practical Guide to GnuPG

https://ayham.xyz/posts/a-practical-guide-to-gpg/

keys to other computers and using online services like Github and Codeberg. Generating GnuPG Master-keys GnuPG uses asymmetric encryption, which means that you would use 2 keys. P

Babbage - The language of the future

https://www.tlc-systems.com/babbage.htm

the process of software development, eventually replacing outmoded languages like COBOL, FORTRAN, and even Pascal. Guess what happened? Not much. Things went on pretty much as bef

/tech/ - Technology - Page 1

https://zzzchan.xyz/tech/index.html

far broader field than computers and digital software alone, and in practice the way these latter two are used have produced far greater surveilence, insecurity, and hypercentrali
Technology & Computing

CipherSaber Home Page

https://ciphersaber.gurus.org/

come with all DOS based computers, is suitable. It can still be found on the Microsoft Windows '95 CD-ROM in the OTHER\OLDMSDOS directory, and on the Microsoft Windows '98 CD-ROM
Fight the crypto ban by learning how to write your own strong encryption program.

Please, Keep your Blog Light

https://alternativebit.fr/posts/lightweight-blog/

of information about computers, RC models, and other technical fields. By reading blogs and forums, I had access to everything a geeky kid could dream of: I learned to write websi

SmartFilter - I've Got A Little List

http://sethf.com/anticensorware/smartfilter/gotalist.php

mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study

ucanet - U Create A Net

http://ucanet.net/

ecosystem for retro computers that is separated from the modern web. ucanet is powered by an alternative-root DNS server, with a completely fresh set of domains you can register.

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

wingolog

http://wingolog.org/

america compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme spain

svilen dobrev | свилен добрев

https://www.svilendobrev.com/

- teaching myself, computers, people and organisations. And as effect - or reason? - about my way of thinking and view of life. Absent-minded reflections about life, universe and
това съм аз - програмист, методолог, архитект, хакер, фотограф, музикант, ценител, философ, напр

The Munitions Maker Graphic - rsa2d.gif

http://offshore.com.ai/arms-trafficker/rsa2d.html

Ltd P.S. I know computers with OCR software can read regular print. And yes, I am sure there are people working for the enemies of the US government who can type in 3 lines of tex

Big Brother Loves You... - El Gran Hermano Te Ama...

https://www.bibliotecapleyades.net/sociopolitica/sociopol_bigbrother.htm

and Mind Reading Computers    -  Edward Snowden Quotes About U.S. Government Spying that Should Send a Chill Up Your Spine Español  -  El Chip Inteligente


Find more...