Quoth the Raven, "Welcome!"http://linuxmafia.com/
old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System
Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Interhttps://cryptome.org/wipo-imp99-3.htm
electronic devices, computers, satellites and global networks such as the Internet. ____________________ 1 The authors have participated actively in the legislative and technology
Kermit Security Referencehttps://www.kermitproject.org/security.html
mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,
Resume -- Chip Morningstarhttp://www.fudco.com/chip/resume.html
devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/lang/games/logichess.html
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s
Find more...