wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan

Career Guide for Engineers and Computer Scientists

http://philip.greenspun.com/careers/

meant Man to program computers, He wouldn't have given him C. Thou Shalt Remember that If God had meant Man to use computers, He wouldn't have given him UNIX and MS/DOS. Serious S

Aresluna

https://aresluna.org/

were expensive On early computers that couldn’t afford all the pixels 6 more Keyboards Shift Happens A site for my book about keyboards, filled with minigames Typewriter simulator
Marcin Wichary’s site

net.tech

http://www.kushaldave.com/nettech.htm

offers viewpoints on computers and society. Newslinx offers daily web news. Hotwired has some excellent resources regarding web tools at its Webmonkey and Packet sections. Tech Ta

ASH (ALT.SUICIDE.HOLIDAY) FAQ part 1/4: Introduction

https://archive.ashspace.org/ashbusstop.org/intro.html

at http://dmoz.org/Computers/Internet/E-mail/Anonymous_Mailers/ Setting up for usage of an anonymous remailer is a hassle, but that is the only negative aspect. Nobody will mind y

Steven Pemberton

https://homepages.cwi.nl/~steven/

between people and computers. Now famous because Python was strongly influenced by it. Lambert Meertens has written an article on its origins. ABC for the Raspberry Pi : There is

Looking at Windows Vista | Peter Torpey

https://petertorpey.com/articles/windows_vista.html

familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A

View from the Right Master Archive Index

http://www.amnation.com/vfr/archives.html

newspapers ] [ Do computers need to be completely redesigned? ] [ Lower Manhattan flooded; parts of Brooklyn flooded up to a half-story high, with cars under water up to their roo

Chris Koehnke's Webpage

http://chriskoehnke.com/

2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band

TRX-Manager - What's new ?

http://www.trx-manager.com/whatsnew.htm

Telnet (pse update both computers). . V 4.7.4 Monitoring: Tuning by digit possible using the mouse wheel 4m band added (log and spots filter) Remote control: Terminal shows the ba
Registered User Area

https://www.ietf.org/rfc/rfc3490.txt

https://www.ietf.org/rfc/rfc3490.txt

the resolvers on user's computers. Faltstrom, et al. Standards Track [Page 2] RFC 3490 IDNA March 2003 1.1 Problem Statement The IDNA specification solves the problem of extendi


Find more...