wiby  
Settings



releases

http://9front.org/releases/

the computers are out breeding us – qrstuv garamond regular italics should not be bold italics (redux) permind: fix permuted file generation from /sys/man (thanks dave) time

The Old Computer Challenge: a week on OpenBSD with a Centrino and half a gig of RAM

http://www.k58.uk/old-computer.html

people interact with computers and other kinds of programmable electronic devices. Hint: not by command line. I've noticed that some of the other participants in this project of S

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

Slide Show Screen Saver for Windows

https://www.fourmilab.ch/slidescr/

algorithm on computers equipped with full colour hardware, but there's another reason you might want to use it. “High colour” (15 or 16 bit) displays really don't have
Slide Show Screen Saver for Windows

Best practices for inclusive textual websites - Seirdy

https://seirdy.one/posts/2020/11/23/website-best-practices/

students using school computers, and people with restrictive corporate policies can’t “make websites work for them”; that’s a webmaster’s responsibility. At the same time, many us
A lengthy guide to making simple, inclusive sites focused on content before form. Emphasizes brutalist design and accessibility to include under-represented users.

Draft-leach-cifs-v1-spec-02

http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html

in use by personal computers and workstations running a wide variety of operating systems. Table Of Contents STATUS OF THIS MEMO...................................................

Claws Mail configuration guide (incl. PGP)

http://digdeeper.love/articles/claws.xhtml

systems or client computers. For clarity's sake - Claws Mail was immune to the attack - so the situation wasn't that bad. Still, it shows you shouldn't put all your privacy eggs i

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox


Find more...