Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan
Career Guide for Engineers and Computer Scientistshttp://philip.greenspun.com/careers/
meant Man to program computers, He wouldn't have given him C. Thou Shalt Remember that If God had meant Man to use computers, He wouldn't have given him UNIX and MS/DOS. Serious S
Areslunahttps://aresluna.org/
were expensive On early computers that couldn’t afford all the pixels 6 more Keyboards Shift Happens A site for my book about keyboards, filled with minigames Typewriter simulator
Marcin Wichary’s site
net.techhttp://www.kushaldave.com/nettech.htm
offers viewpoints on computers and society. Newslinx offers daily web news. Hotwired has some excellent resources regarding web tools at its Webmonkey and Packet sections. Tech Ta
ASH (ALT.SUICIDE.HOLIDAY) FAQ part 1/4: Introductionhttps://archive.ashspace.org/ashbusstop.org/intro.html
at http://dmoz.org/Computers/Internet/E-mail/Anonymous_Mailers/ Setting up for usage of an anonymous remailer is a hassle, but that is the only negative aspect. Nobody will mind y
Steven Pembertonhttps://homepages.cwi.nl/~steven/
between people and computers. Now famous because Python was strongly influenced by it. Lambert Meertens has written an article on its origins. ABC for the Raspberry Pi : There is
Looking at Windows Vista | Peter Torpeyhttps://petertorpey.com/articles/windows_vista.html
familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A
View from the Right Master Archive Indexhttp://www.amnation.com/vfr/archives.html
newspapers ] [ Do computers need to be completely redesigned? ] [ Lower Manhattan flooded; parts of Brooklyn flooded up to a half-story high, with cars under water up to their roo
Chris Koehnke's Webpagehttp://chriskoehnke.com/
2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band
TRX-Manager - What's new ?http://www.trx-manager.com/whatsnew.htm
Telnet (pse update both computers). . V 4.7.4 Monitoring: Tuning by digit possible using the mouse wheel 4m band added (log and spots filter) Remote control: Terminal shows the ba
Registered User Area
https://www.ietf.org/rfc/rfc3490.txthttps://www.ietf.org/rfc/rfc3490.txt
the resolvers on user's computers. Faltstrom, et al. Standards Track [Page 2] RFC 3490 IDNA March 2003 1.1 Problem Statement The IDNA specification solves the problem of extendi
Find more...