wiby  
Settings



Quoth the Raven, "Welcome!"

http://linuxmafia.com/

old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System

Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Inter

https://cryptome.org/wipo-imp99-3.htm

electronic devices, computers, satellites and global networks such as the Internet. ____________________ 1 The authors have participated actively in the legislative and technology

Kermit Security Reference

https://www.kermitproject.org/security.html

mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,

Resume -- Chip Morningstar

http://www.fudco.com/chip/resume.html

devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/lang/games/logichess.html

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s


Find more...