wiby  
Settings



Fight the System? or Exit the System?

https://lukesmith.neocities.org/vids/fight_or_exit

out there can use computers from 2010 just fine but are drawn into wasting money). +2 @LukeSmithxyz - 2025-05-20 13:44:12 Wait, did that actually happen? Varg wasn't who I was tal

http://www.conlang.info/wordfreq-bnc.txt

http://www.conlang.info/wordfreq-bnc.txt

[hospitals] computer [computers] property [properties] financial single bill [bills] director [directors] scheme [schemes] thank [thanks] application [applications] chance [chance

How to Spot a Psychopath

http://www.howtospotapsychopath.com/feed/

on sub-$10,000 computers, et cetera. 3: Zillions of cheaters ruining the game for everyone else. 4: Zillions of griefers ruining the game for everyone else. 5: Zillions of foul-mo

Lena @ Things Of Interest

https://qntm.org/mmacevedo

one can refer to how computers boot, and how applications start, opting to perform a large amount of completely useless calculations instead of just loading a ready to run memory
A note from the author You can now buy this story as part of my collection, Valuable Humans in Transit and Other Stories. This collection also includes a sequel story, titled &q

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2004/

left for home. Unpacked computers onto new table - can actually sit in front of any 1 of 3 concurrently - brilliant. Lunch, played with H. on the BBC cbeebies page; caught Miguel

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

chance that quantum computers will make all current ciphers irrelevant - https://hackaday.com/2015/09/29/quantum-computing-kills-encryption/ (archive) (MozArchive) - so private co

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2001/

now bristling with computers, updated the hub to Robert's 10/100 switch. Located an atk chaining bug. Plugged onwards with the merge to libbonoboui, hmm. Bed, seeing J' at the cra

I Want My FTP: Bits on Demand

https://XeNT.com/4K-Associates/IEEE-L7-FTP.html

for more and different computers for each and every project at each site. After all, when the day comes students can sit at cheap terminals and exploit the cycles and storage of a

https://www.humprog.org/~stephen/

https://www.humprog.org/~stephen/

believe (as I do) that computers are for augmenting the human intellect , not just for high-performance data crunching. I believe that technology cannot be pursued in isolation. &


Find more...