wiby  
Settings



About this server

http://floppy.museum/thispc.htm

random >> The Hacker Webring << random >>

Persistent storage for a kernel's "dying breath" [LWN.net]

https://lwn.net/Articles/434821/

symbols or a kernel hacker to make sense of the kdump image. Persistent storage for a kernel's "dying breath" Posted May 19, 2011 14:37 UTC (Thu) by kayabek (guest, #403
When Linux systems crash, there are various ways to find out what went wrong, but generally th [...]

On Hacking - Richard Stallman

http://stallman.org/articles/on-hacking.html

meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat sometteokbokki (*) , when a waitress set down sixchopsticks right in front of me. It

I hate telephones

https://jameshfisher.com/2017/11/08/i-hate-telephones/

market. Discussion on Hacker News. Tagged #fave . Similar posts How Hacker News stays interesting Hacker News buried my post on conspiracy theories in my family due to overheated
I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear.

Nintendo DS News

http://nintendo-ds.dcemu.co.uk/

Sword and Shield hackers January 25th, 2021, 22:23 Posted By: wraggster The Pokémon Company announced a series of sanctions towards users who have been illegally modifying their
Nintendo DS News brings you the latest news for Nintendo DS and the latest Games and also the latest in Homebrew and Emulation news.

Ken Shirriff's blog

http://www.righto.com/

I saw an article on Hacker News —" Many hard LeetCode problems are easy constraint problems "—that described the benefits and flexibility of a system calleda constrain

Bare-Faced Messiah: Index (H)

https://www.discord.org/lippard/bfm/bfmindx4.htm

S | T | U | V | W - H - Hacker, Dr Frederick, 161 Halsey, Admiral, 117 Harpoon , 127 , 128 , 129 Harris, Edward, 235 Hartwell, Adelle and Ernie, 354 , 360 HASI see Hubbard Associa

Presentazione di XMPP - GOLEM 06/02/2024

http://choice.tiepi.it/~matteobin/scritti/presentazione-di-xmpp.html

l'applicazione agli hacker brutti e cattivi, che nell'immaginario collettivo vivono in uno scantinato in Russia, indossano guanti sditati e sono dei delinquenti spietati. Signal S
Introduzione a un sistema di messaggistica istantanea libero, decentrallizato e sicuro. Elenco dei programmi per utilizzarlo e per fornire il servizio. Confronto con alternative li

Dymaxion: Eleanor Saitta

https://dymaxion.org/me.html

Saitta is also a hacker, designer, artist, writer, and barbarian. She makes a living and a vocation of understanding how complex systems and stories operate and redesigning them t
(none)

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

"Become a Hacker" Sebastian Vargas's "Different Angles of Cybersecurity" BehiSecc / First-Bounty djadmin / awesome-bug-bounty / Getting Started (huge; don't get lost in here) Guru
How to become a bug-bounty hunter and do penetration testing

UNATLe: United Nations AntiTerrorism Leauge

http://www.unatle.net/

as mind scanning for hackers. Nanotechnology enables full body modification and all sorts of body wide genetic engineering. Software for relatively easy fully customizable develop
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!

Metamorphic Petrology; Geology 102C

https://hacker.faculty.geol.ucsb.edu/geo102C/lectures/part14.html

note: as of 09/2001, some images herein borrowed from other websites have not been credited Part 1. Overview of Metamorphism and Tectonics Part 2. Introduction to Metamorphism Par


Find more...