wiby  
Settings



The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

the file by setting the protection bits or the permission of the file using the command chmod . In addition to user identities, there are groups of users. The idea of a group is t

DVD FAQ

https://demystified.info/dvdfaq.html

What are the copy protection issues? [1.12] What about DVD-Audio or Music DVD? [1.12.1] What's the difference between DVD-Audio discs and DVD-Music discs? [1.13] Which studios sup
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.

Some publications

https://members.loria.fr/PZimmermann/papers/

frequently used for the protection of electronic commerce -- at least outside the USA -- so this factorization represents a breakthrough in research on RSA-based systems. The prev

2017: September - December Political Notes - Richard Stallman

http://stallman.org/archives/2017-sep-dec.html

. Privacy needs more protection, but data brokers, data thieves, and repressive states will not be deterred by laws about the use of personal data. (The data brokers are experts a

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

for independent message protection and SSH and SSL/TLS for communications session protection, are usually made at the political rather than the technical level. Performance Charac

NLnet; Current projects

https://nlnet.nl/project/current.html

Flashkeeper Write Protection on SOIC-8 flash chips without soldering Flatline Server Independent server for Signal protocol Flock XR: Keyboard + Mobile/Touchscreen UX Creative cod

Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

a single source) , protection from licensing litigation , flexibility , social / moral / ethical issues , and innovation . The unnecessary fears section discusses issues such as s
This paper provides quantitative data that, in many cases, open source software

VC&G | » The PC is Dead: It’s Time to Bring Back Personal Computing

http://www.vintagecomputing.com/index.php/archives/3292/the-pc-is-dead-its-time-to-make-computing-personal-again

there was software copy protection ), no tracking. No need for special tools to repair it either. In fact, Apple openly encouraged experimentation. Further, what percentage of you
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.

What's So Bad About Microsoft?

http://www.kmfms.com/whatsbad.html

card number safe, the protection was compromised and your sensitive information was left unsafe for unscrupulous people to steal. As a side note, the same bug was found in the ope

Old Cavebear Blog

https://www.cavebear.com/old_cbblog/

are benefited by the protection of trademarks and copyrights.  Then again, "everyday" internet users are also benefited numerous other kinds of protections. It strikes me tha

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

Chat Control or Child Protection debunks the arguments used by the intelligence community that "because children" we needed the Online Safety Bill which gave Ofcom the power to ma


Find more...