wiby  
Settings



qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

Things that make me mad

https://www.increasinglyadequate.com/mad.html

on those old vTech toy computers that cost 50 bucks in 1995 at Toys R Us. Even a DOS user was 100 times the power use you are. (In 2020 this one no longer rings true. But only bec
Basically, just a list of things that make me mad.

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

for smartphones, computers, and servers alike. For more details see : https://nlnet.nl/project/WillowSync Layer 8 Data and AI AI Horde — Collaborative infrastructure for running g

C++ Applications

https://www.stroustrup.com/applications.html

both Mac OS and Windows computers. Mentor Graphics : Since the 1980s Mentor Graphics has built most of its applications using C++, including: Calibre: software for IC physical ver

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2008/

be a few large powerful computers with lots of terminals is a perennial, and goes in cycles. In the past it has foundered on the rocks of Moore's law - it turned out to be cheaper

Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional, you best start believing in cyberpunk dystopias, you are in one.

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

The Dock

http://koshka.love/links.html

designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0

4K Associates : Standards Strategy Consultants

https://XeNT.com/4K-Associates/Press.html

on close to 10000 computers throughout the Internet. The challenge, called ECC2K-108, was set by Canadian cryptographic company Certicom in 1997 to encourage researchers to test t

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2004/

left for home. Unpacked computers onto new table - can actually sit in front of any 1 of 3 concurrently - brilliant. Lunch, played with H. on the BBC cbeebies page; caught Miguel

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy


Find more...