Vigay.com : Main Homepagehttp://www.vigay.com/
privacy and secure encryption methods. If you would like help with these matters, please feel free to contact me or view the security pages . Irrespective of whether you're a chil
All the news in one place
Things that make me madhttps://www.increasinglyadequate.com/mad.html
last. People who say encryption doesn't matter because somebody could torture you for the key. That's a bizarre justification for their own laziness. It's akin to telling people n
Basically, just a list of things that make me mad.
OlderGeeks.com Computer Software Downloadshttps://oldergeeks.com/
editor and strong encryption. UPDATED 10/20 Core Temp v1.19.5- Portable program to monitor processor temps and other vital info. UPDATED 10/18 Gaia Sky
Software Download with no malware or ads.
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
the MS-Windows password encryption work? Section B: Telephony U 01. What is a Red Box? 02. How do I build a Red Box? 03. Where can I get a 6.5536Mhz crystal? 04. Which payphones w
Web CD DVD - Frequently asked questions / FAQ - HyperPublish create CD catalogue Webhttp://www.visualvision.com/create_catalogs_cdroms_web_sites/cd_dvd_builder_software-00002f.htm
with a strong 128 bit encryption). You can also disable print or clipboard copy. The interface is very similar to HP, and you can read HP files. I have an old 200MHz
This page is about games> <
Amicus Briefhttps://archive.epic.org/crypto/export_controls/bernstein_brief.html
technical expertise in encryption that helps toilluminate the practical aspects of the issues currently before theCourt. The American Civil Liberties Union ("ACLU") is a nationwid
Keith Lynch's timeline of net related terms and conceptshttps://keithlynch.net/timeline.html
(Zimmerman's RSA-based encryption software) 91 6 WAIS (a data retrieval tool) 91 9 Digex (an ISP) 91 10 Robert McElwaine (flamboyant and controversial poster) 91 10 TIN (a newsrea
Let's Decentralizehttps://letsdecentralize.org/
(by using end-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary p
Lazarus Programming Tutorials Table of Contentshttp://sheepdogguides.com/lut/
with. Arrays (plus Encryption- for fun) In simple terms, "arrays" are a super powerful sort of variable. This essay tries to help you get started with these remarkably useful thin
Open access tutorials to help you create applications with the free, open source Lazarus which is a rapid application development (RAD) environment similar to Delphi. This site in
The Code of the Geeks v3.1 Generatorhttp://www.joereiss.net/geek/geek.html
of information. Encryption just bogs that down. ( ) > PGP--- If you support encryption on the Internet, you must be a drug dealer or terrorist or something like that. ( ) >
Apollo Archivehttps://jim.rees.org/apollo-archive/
contained some encryption routines. Since it's illegal to import these to the US, I've removed them from the file. US law also prohibits me from telling you where to get the origi
The Kermit 95 2.0 GUIhttps://www.kermitproject.org/k95gui.html
of authentication and encryption methods used, if any. Cursor coordinates in 1-based column,row (X,Y) notation. Terminal screen dimensions, rows × columns. Pull corner for c
Find more...