wiby  
Settings



Building software for yourself with Linus Lee (Changelog Interviews #455)

https://changelog.com/podcast/455

things, how you do authentication, things like that. You can kind of duct-tape things together nicely… But duct-tape things together, as opposed to having a perfect solution, and
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L

Networking in the Mind Age - future of distributed intelligence

http://www.ethologic.com/sasha/mindage.html

schemes, message authentication algorithms, computational economies, computerized banking and other network constructs will evolve into essential parts of future global intelligen
Essay on long-term future of intelligent distributed systems. Discussed topics include post-identity intelligent architectures, transhumanist philosophy

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

messages with privacy, authentication, and convenience. Privacy means that only those intended to receive a message can read it. Authentication means that messages that appear to

Dan Connolly's Index of Events

https://www.w3.org/People/Connolly/events/

and Usability of Web Authentication . My thoughts on the event, in progress: A look at emerging Web security architectures from a Semantic Web perspective ( GRDDL and OpenId ) Mar

Markua Spec

https://markua.com/

resources which require authentication. youtube : If present, the part of a YouTube URL, such as ozO0kOnqmyA , which uniquely identifies a YouTube video. The video may be public o

Linux

https://www.billdietrich.me/Linux.html

standard facilities : Authentication (PAM, certificates, more), access control, IPC ( D-Bus , sockets, Varlink , more). Some other variations or modifications, some of them user c
Linux operating system basics, parts, myths, and truths

https://www.ietf.org/rfc/rfc2277.txt

https://www.ietf.org/rfc/rfc2277.txt

together with authentication and other preferences negotiation. 4.5. Default Language When human-readable text must be presented in a context where the sender has no knowledge of

Amicus Brief

https://archive.epic.org/crypto/export_controls/bernstein_brief.html

on cryptography forauthentication and privacy, and IMC's members desire a wideunfettered market for secure Internet mail products. The Internet Society ("ISOC") is a non-governmen

Introducing the REBOL Internet Operating System: IOS

http://www.rebol.com/ios/ios-intro.html

certificates, and authentication. Integrates quickly with legacy systems and existing databases. Administrative functions can be script operated. WIP Wiki 3.3.0 ▣ ▤ &n

Blog - Suffix

https://www.suffix.be/blog/

Second Factor Authentication for SSH Using ecdsa-sk or ed25519-sk combined with a hardware security key for multifactor SSH authentication. Building a Website with my Kids Introdu
Personal blog for posting my ramblings, mostly about programming.

DVD FAQ

https://demystified.info/dvdfaq.html

a data encryption and authentication scheme intended to prevent copying video files directly from DVD-Video discs. CSS was developed primarily by Matsushita and Toshiba. Each CSS
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.

Liveness.com - Biometric Liveness Detection Explained

https://www.liveness.com/

verification or face authentication. FaceTec's AI now performs over 3,700,000,000 3D Liveness Checks annually! FaceTec Certified 3D Liveness Vendors With security powered &
Liveness Detection is an AI computer system’s ability to determine that it is interfacing with a physically present human being and not an inanimate spoof


Find more...