wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Stop Using Discord

https://usemumble.neocities.org/

with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc

Recommendations — The Privacy Raccoon

https://an_g6.codeberg.page/

just other people computers. Or even worse, mega corporation's computers. Do not trust anyone with your personal data and host your "cloud" storage yourself. If you don't have the

GRC | Steve Gibson's WebZone:  

https://www.grc.com/stevegibson.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !!   &nb
Steve Gibson's Little Corner of the Web.

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

speeds, about NSA supercomputers. There's just no reason for people to worry about "weak IDEA keys" when so many more pressing matters exist. (Let the experts worry.) Little of th

Chris Koehnke's Webpage

http://chriskoehnke.com/

2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</

https://www.kermitproject.org/k95.html

and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector

NLnet; All projects

https://nlnet.nl/project/index.html

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent


Find more...