Ayham's Online Website | A Practical Guide to GnuPGhttps://ayham.xyz/posts/a-practical-guide-to-gpg/
keys to other computers and using online services like Github and Codeberg. Generating GnuPG Master-keys GnuPG uses asymmetric encryption, which means that you would use 2 keys. P
Babbage - The language of the futurehttps://www.tlc-systems.com/babbage.htm
the process of software development, eventually replacing outmoded languages like COBOL, FORTRAN, and even Pascal. Guess what happened? Not much. Things went on pretty much as bef
/tech/ - Technology - Page 1https://zzzchan.xyz/tech/index.html
far broader field than computers and digital software alone, and in practice the way these latter two are used have produced far greater surveilence, insecurity, and hypercentrali
Technology & Computing
CipherSaber Home Pagehttps://ciphersaber.gurus.org/
come with all DOS based computers, is suitable. It can still be found on the Microsoft Windows '95 CD-ROM in the OTHER\OLDMSDOS directory, and on the Microsoft Windows '98 CD-ROM
Fight the crypto ban by learning how to write your own strong encryption program.
Please, Keep your Blog Lighthttps://alternativebit.fr/posts/lightweight-blog/
of information about computers, RC models, and other technical fields. By reading blogs and forums, I had access to everything a geeky kid could dream of: I learned to write websi
SmartFilter - I've Got A Little Listhttp://sethf.com/anticensorware/smartfilter/gotalist.php
mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study
ucanet - U Create A Nethttp://ucanet.net/
ecosystem for retro computers that is separated from the modern web. ucanet is powered by an alternative-root DNS server, with a completely fresh set of domains you can register.
Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
wingologhttp://wingolog.org/
america compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme spain
svilen dobrev | свилен добревhttps://www.svilendobrev.com/
- teaching myself, computers, people and organisations. And as effect - or reason? - about my way of thinking and view of life. Absent-minded reflections about life, universe and
това съм аз - програмист, методолог, архитект, хакер, фотограф, музикант, ценител, философ, напр
The Munitions Maker Graphic - rsa2d.gifhttp://offshore.com.ai/arms-trafficker/rsa2d.html
Ltd P.S. I know computers with OCR software can read regular print. And yes, I am sure there are people working for the enemies of the US government who can type in 3 lines of tex
Big Brother Loves You... - El Gran Hermano Te Ama...https://www.bibliotecapleyades.net/sociopolitica/sociopol_bigbrother.htm
and Mind Reading Computers - Edward Snowden Quotes About U.S. Government Spying that Should Send a Chill Up Your Spine Español - El Chip Inteligente
Find more...