Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
MDGx DOS Power Toyshttps://www.mdgx.com/dos.htm
IBM PC clones, portable computers/UMPCs + portable/mobile devices/terminals allows to run DOS/ FreeDOS / DR-DOS/OpenDOS /MS-DOS OS and native DOS applications + games through a vi
MDGx AXCEL216 MAX Windows DOS 11 10 8.1 8 7 R2 2012 2008 Vista 2003 2K3 2000 2K XP SP1 SP2 SP3 Second Edition SE Millennium Edition ME 98 95 95a 95B 95C OSR2 OSR1 NT4 NT 3.11 3.1 3
selectparkshttp://ljudmila.org/~selectparks/index.php
for use on desktop computers with build the PS3 as a build target (it seems). We have no idea of what license this will come under but wow.. a big step by Sony. Read more about it
art defining games
Collected Essays, by Rudy Ruckerhttps://www.rudyrucker.com/transrealbooks/collectedessays/
A Brief History of Computers Games, Intelligence, Enlightenment Adventures in Gnarly Computation Web Mind Lifebox Immortality Selling Your Personality The Great Awakening Everythi
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/mon/nassys1.txt
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
The Early Years of Academic Computinghttps://www.cs.cornell.edu/wya/AcademicComputing/text/dtss.html
networks of personal computers that swept universities soon afterwards. From a modern viewpoint the most surprising feature was that the entire software was developed at Dartmouth
Jeff Huang · Computer Science at Brown Universityhttps://jeffhuang.com/
Graphical Help for Computers Jeff Huang and Michael Twidale UIST 2007 Curious about the backstory behind my papers ? Workshop Papers Learning Something from Nothing: Leveraging Im
Jeff Huang, Associate Professor at Brown University in Computer Science, working in Human-Computer Interaction.
DX LISTENING DIGEST AUGUST 2003 ARCHIVEhttp://www.w4uvh.net/dxldtd3h.html
such as the number of computers in the two Koreas. Many South Koreans are unaware of the program. But for decades, North Korea has considered it a propaganda tool aimed at destabi
2019: July - October Political Notes - Richard Stallmanhttp://stallman.org/archives/2019-jul-oct.html
Chrome add-on on the computers of Google workers. Workers fear this will be used to surveil them and then attack their rights in one way or another. Every nonfree program warrants
Technology Usagehttps://dukenukemis.cool/technology-usage/
activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.
Flatpak Is Not the Futurehttps://ludocode.com/blog/flatpak-is-not-the-future
root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably
Abolitionist.com : synthetic lifehttps://www.abolitionist.com/resource/synthetic-biology.html
as you like. Because computers won’t care. And, if you wanted evolution, you can include random number generators.” That would have the effect of introducing the element of chance
Find more...