wiby  
Settings



The Grand List of Overused Science Fiction Cliches

http://www.geocities.ws/evilsnack/cliche.html

brains directly to computers and get dependent on them. Aliens travel a zillion miles to loot the Earth of resources which exist in far greater and much more easily exploitable qu

Links user documentation

http://links.twibright.com/user_en.html

the program between computers. Copy the links file into a directory where you install executable files, preferably on your $PATH (the path where executable files are searched for)

The Design and Implementation of the Tor Browser [DRAFT]

https://2019.www.torproject.org/projects/torbrowser/design/

such as seizing the computers of all Tor users in an area (especially after narrowing the field by the above two pieces of information). History records and cache data are the pri

High Tech Hayekians

http://philsalin.com/hth/hth.html

interchange. Computers are my first love. The field of computer science in which I have been the most interested is artificial intelligence. When I was first introduced to compute

John Gilmore's home page

http://www.toad.com/gnu/

the First Conference on Computers, Freedom and Privacy. I remained quite active in EFF, and served on its Board of Directors for decades, until a spasm of political correctness du

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

chance that quantum computers will make all current ciphers irrelevant - https://hackaday.com/2015/09/29/quantum-computing-kills-encryption/ (archive) (MozArchive) - so private co

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/home.html

server or your client computers. And if you need email hosting, we have that too! We use our advanced spam filter and virus filter servers to remove the junk email and computer vi
Junk Email Filter - Front End Spam

(IV.) Foomatic from the Developer's View: How does it work?

https://www.openprinting.org/download/kpfeifle/LinuxKongress2002/Tutorial/IV.Foomatic-Developer/IV.tutorial-handout-foomatic-development.html

are operating the computers newbie-friendliness did not have a high priority, too. Unfortunately LPD was used for a very long time, up to even nowadays, but printers changed a lot

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they

Repetitive Strain Injury: How to prevent, identify, and manage RSI

http://web.eecs.umich.edu/~cscott/rsi.html

Voice activated software Coping with RSI Additional resources Resources for students Two must read books Online resources What is RSI? (Adapted from Repetitive Strain Injury by Dr

The Retrocomputing Museum

http://www.catb.org/retro/

Reduced Instruction Set Computers? Well, here is the concept taken to its logical extreme — an emulator for a computer with just one (1) instruction (Subtract and Branch if
A museum of archaic computer languages


Find more...