Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
System Shock 2 Setup Guide - Sarge's Gaming Workshophttps://sarge945.xyz/guides/ss2-mod-guide/
level 1, with security computers requiring Hack 3. Standard Weapons are far less ubiquitous. Rebalancing of O/S upgrades. Tank gives damage resistance rather than health, Pack Rat
System Shock 2 offers a stunning, but flawed, gameplay experience. This guide explores how to address many of it’s balance problems with mods, while also improving it’s
https://www.humprog.org/~stephen/https://www.humprog.org/~stephen/
believe (as I do) that computers are for augmenting the human intellect , not just for high-performance data crunching. I believe that technology cannot be pursued in isolation. &
Find more...