wiby  
Settings



On Hacking - Richard Stallman

http://stallman.org/articles/on-hacking.html

from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o

UFies.org - Geek News, Links, & Technology On A Daily Basis

https://www.ufies.org/

with my first cat. Computers were boxes with PS/2 connectors on the back, and cellphones aren't really a thing, much less smartphones. So the site stays up. Please feel free to ex

Machine Learning, the UBI System, and Media Incest | Joybuke

https://joybuke.neocities.org/articles/machine-learning-the-ubi-system-and-media-incest/

If people owned their computers and their systems properly, directly publishing content to a network without any overlord filtering or sorting it for them, none of these problems
If any article I write is going to be worth skipping, this will be the one. Reason why: this will about a contemporary, developing topic. Most people who talk about anything of val

IRC: #boycottnovell @ FreeNode: November 14th, 2008

http://techrights.org/o/2008/11/15/irc-log-14112008/

MinceR well, crApple "computers" are usually bought as room ornaments for gay people Nov 14 17:36 PetoKraus well nice... is there anything he could do? Nov 14 17:36 schestowitz Th
IRC Log for November 14th, 2008

The Evolution of Cybernetics - A Journal by Simon Funk

https://sifter.org/~simon/journal/

06, 2000 The State of Computers (2) Saturday, June 03, 2000 Pluses and Minuses Tuesday, May 30, 2000 Law and Disorder Saturday, May 27, 2000 You Loser! Friday, May 19, 2000 Living

Protocol ForHonest Elections

http://www.thelandesreport.com/ProtocolForHonestElections.htm

voting systems (computers, mail-in, drop box, etc.). STATE ATTORNEYS GENERAL & CANDIDATES can   sue in court to stop the use of nontransparent voting systems , as there i
Democracy demands transparency, not trust. Voting by machine, computer, early, mail, harvest, drop box and other nontransparent methods consituties 'de facto' fraud as it is impo

Wii U Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/wiiu/

yet, three independent computers: Firstly, we’ve got DRC-WUP which is a System-on-Chip (SoC) hiding yet-another ARM926EJ-S (the same one from the Wii , how many of these do they h
An in-depth analysis that explains how this console works internally

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni

Adequacy.org || Is Your Son a Computer Hacker?

https://wh0rd.ca/humor/text/Adequacy_org%20%20Is%20Your%20Son%20a%20Computer%20Hacker.htm

grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we'd bough

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2000/

how much I've spent on computers over the last few years, grief. 2000-12-09: Saturday Up early, off to Church, practice for wedding. Guy arrived, paced up and down ( very therapea


Find more...