wiby  
Settings



THE HISTORY OF COMPUTING

https://ei.cs.vt.edu/~history/

languages, software engineering, and structured programming. Their web site is a gemstone of videos and graphics worth visiting! Vintage Computer Festival If you know of a meeting

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

tax fraud, social engineering (con games), Nigerian prince, identity theft, propaganda, misinformation, vandalism, harassment, sextortion. Old crimes that have changed a lot: bank
Best practices and information about computer and smartphone security and privacy

Tom Heneghan Explosive Intelligence Briefings

http://www.tomheneghanbriefings.com/

propaganda and social engineering. https://www.dougmichaeltruth.com/divide-and-conquer-the-modus-operandi-of-tyrants/ CONSTITUTION PATRIOTS            ‘Brutal’ attack on pregnant
tom heneghan,NSA,Nazi Paperclip,DHS,false flag,constitution,treason,wanta,syria,protocols,bush,nazi,zionist,mossad,benghazi,terrorist,adamus group

Cryptocurrency

https://www.billdietrich.me/Cryptocurrency.html

shortcoming, so our engineering team is working on implementing this going forward."] 5/17: Tried to initiate a transfer of another $5K from my bank account to GDAX. Page gave a w
Opening a cryptocurrency account and trading real money for less real money

Ken Silverman's Official Home Page

http://advsys.net/ken/

professor of electrical engineering at Brown. My mom works at GTech, programming mark and character recognition for lottery tickets. My brother started his own small company, call

2blowhards.com: The Mencius Vision

http://www.2blowhards.com/archives/2007/04/_trial_version.html#004052

problem, but as an engineering problem. Any solution that solves the problem is acceptable. Any solution that does not solve the problem is not acceptable. For example, there is a
2blowhards.com - a weblog

Human Knowledge: Foundations and Limits

http://humanknowledge.net/Thoughts.html

cry so much? Technology Engineering How does a computer work? How fast and small can computers get? How does a plane fly? How does a satellite stay up in the sky? How does a batte

T E X T F I L E S

http://textfiles.com/politics/

17157 Chaos and Social Engineering by Mack Tanner charlott.txt 8344 The Charlotte Town Resolves (May 31, 1775) choice.txt 5232 ChoiceSpeak: The Language to Abort the Conscience ch

AlbaFind: Index

http://albafind.com/

Astronomy  , Engineering  , ...   Sports Sports  , Soccer  , Auto  , All  , ...   Health Health  , Medicine  , Diseases  , M

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

on Cryptographic Engineering - and how the RSA pseudo-random number generator was compromised by NSA in 2006 (Matthew Green, 2013), How the FBI will lose its iPhone fight with App
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

September 11th Conspiracy Theory

http://www.911conspiracytheory.net/

serious scientific or engineering institution? Why are such studies always questioned only by obscure guys who are generally not qualified to analyses the data? I don't know all t
How the government caused 911.

Ye Olde Blogroll - Because blogs are the soul of the web

https://blogroll.org/

topics like software engineering, electronics, and technology. Hermitary Resources and reflections on hermits and solitude since 2002 Friedrich Zettl Fine Arts Blog and Portfolio


Find more...