wiby  
Settings



Building software for yourself with Linus Lee (Changelog Interviews #455)

https://changelog.com/podcast/455

is so small, and the computers these days are just so fast that you can kind of store things in normal files. All of Monocle’s search data lives inside a big 50-megabyte JSON. It’
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L

Hard Drivin'/Race Drivin' Schematics

http://www.jmargolin.com/schem/schems.htm

  My desktop computers are insulated in the front and on the sides. The only exposed metal that is grounded is the exposed grounded chassis in the back.   You can attach

Nintendo 64 Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/nintendo-64/

for Windows-based computers as well [41] . Furthermore, there were third-party tools such as custom cartridges housing a long ribbon cable that connected to the workstation. These
An in-depth analysis that explains how this console works internally

OlderGeeks.com Computer Software Downloads

https://oldergeeks.com/

hardware & security info.    UPDATED 01/13   xemu v0.8.131- A free and open-source application that emulates the original Xbox.   NEW 01/13   Mitten v
Software Download with no malware or ads.

Infrequently Noted

https://infrequently.org/

phones — indeed, most computers — are 24+ month old Androids. This is the result of a price segmented market: a preponderance of smartphones sold for more than $600USD (new, unloc
Alex Russell on browsers, standards, and the process of progress.

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp

fpgacpu.org - FPGA CPU News

http://www.fpgacpu.org/

of an afficianado of computers ... If you're looking for tips on how to break into someone else's computer, you won't find them here." -- Preface Sunday, November 10, 2002 The old

qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes


Find more...