wiby  
Settings



The internet is dead

https://bleachworld.neocities.org/writings/blog1

in our lives. Job applications, dating, socializing — it has taken over our normal activities and has become part of our lives rather than as a sanctuary from to save us from our

Dedoimedo - A Place to Learn a Lot About a Lot

https://www.dedoimedo.com/

on how to scale most applications for 2/3/4K screens. Then, I launched KeePass2 in Kubuntu 24.04, and it was all too small. To make things worse, before the upgrade, in the previo
Dedoimedo is a website dedicated to technology and software education, science, art, and (dark) humor. Its mission: to provide most detailed and accurate guides and articles you wi

The Anatomy of a Search Engine

http://infolab.stanford.edu/~backrub/google.html

search and other applications [ Marchiori 97 ] [ Spertus 97 ] [ Weiss 96 ] [ Kleinberg 98 ]. In particular, link structure [ Page 98 ] and link text provide a lot of information f

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

to services and applications which provide autonomy for end-users. Currently there are two NGI Zero programmes active. The NGI0 Entrust program supports people who are working on

Doom as an Interface for Process Management

https://www.cs.unm.edu/~dlchao/flake/doom/chi/chi.html

Vernacular Current applications often do not leverage the rich vocabulary of contemporary mass media and video games. Their user interfaces are usually austere, reflecting the lim
Doom as an Interface for Process Management

TELNET: The Mother of All (Application) Protocols

https://XeNT.com/4K-Associates/IEEE-L7-v2.html

more layer up, within applications like Emacs and operating system libraries like Curses. Still, obscurity can be accommodated: interested readers are directed to RFC 1097, "Telne

Blog - Suffix

https://www.suffix.be/blog/

data with Dropbox Use applications on different computers by synchronizing data via Dropbox. RuPy 2009 roundup Review of the 2009 Rupy conference in Poznań. Belgian iPhone & i
Personal blog for posting my ramblings, mostly about programming.

The Machine Fired Me

https://idiallo.com/blog/when-a-machine-fired-me

you access to certain applications/access points. And for the sole employee, this is why documenting everything you do in work is really important. I remember my father always tol
When computers handle big life altering decisions in a company, there needs to be an override for humans to take over. Otherwise, well, they fire employees.

Let's Decentralize

https://letsdecentralize.org/

connection for applications. Tor is "free and open-source software for enabling anonymous communication by directing Internet traffic through a free, worldwide, volunteer overlay

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

looking at real applications I'd start applying. Consulting shops are more likely to take you on IME, as you're still quasi-green, and they can likely get you ramped up pretty qui
How to become a bug-bounty hunter and do penetration testing

Tanya Pretorius' Bookmarks | Home

http://www.tanyapretorius.co.za/index.htm

hands of third party applications, so I deleted them all. I said goodbye to some fun things that I couldn't harvest. I am still reeling from them removing the How did you meet sec
Tanya is an infoholic, linguist, computerjunky, semiotician, feminist, teacher, writer, facebookian, tgifan, dog trainer, typesetter, webmaster, activist and reader.

NLnet; Current projects

https://nlnet.nl/project/current.html

dialogs throughout KDE applications KDE Plasma Gestures Advanced customisable gesture input on desktop and mobile Knowledge Graph Portal Generator Automatically generate custom we


Find more...