wiby  
Settings



How To Become A Hacker

http://www.catb.org/%7Eesr/faqs/hacker-howto.html

first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix

KRNIC찾아주셔서 감사합니다.

https://www.zakon.org/robert/internet/timeline/HIT-korean.html

network of time-sharing computers"에 관한 연구를 지원. ㆍ MIT 링컨 연구소내 설치한 TX-2와 캘리포니아 산타모니카 소재 시스템 개발 공사(System Development Corporation)내에 설치한 AN/FSQ-32가 전용 1200bps 전화선을 통하여 직접 연결(패킷

Computer Demos - The Story So Far

https://mlab.taik.fi/~eye/demos/

work in the organizers' computers. The biggest demo parties are: Assembly (held in Finland on July-August) The Party (held in Denmark few days before New Year) The Gathering (held
An overall introduction to computer demos,demo scene and related issues with lots of links to further information

Peter Neumann's Home Page

https://www.csl.sri.com/users/neumann/

of the ACM Committee on Computers and Public Policy (CCPP), which I chaired since 1985 -- until it was disbanded in 2018 as part of a complete reorganization of ACM committees. (T

LISP Information and Resources

http://www.lispmachine.net/

were general-purpose computers designed (usually through hardware support) to efficiently run Lisp as their main software language. In a sense, they were the first commercial sing

EFF "Net Culture & Cyber-Anthropology" Archive

https://w2.eff.org/Net_culture/

as comprising "computers, telecommunications, software and data in a more abstract form," with the core being the Net, and see the works of such cyberpunk authors as Wil

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo

Loper OS » "Pest" v. 0xFB.

http://www.loper-os.org/?p=4003

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

The Craft of Text Editing

https://www.finseth.com/craft/

predated most personal computers and workstations. There had even been a chapter in an early draft that attempted to prove that it was not possible to implement an Emacs-type text

W. Richard Stevens' Home Page

http://www.kohala.com/start/

about how I got into computers and Unix. Here is a chronological list of the various computer systems and programming languages that I have used. Авиатор игра - онлайн казино, жет

Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day


Find more...