releaseshttp://9front.org/releases/
the computers are out breeding us – qrstuv garamond regular italics should not be bold italics (redux) permind: fix permuted file generation from /sys/man (thanks dave) time
The Old Computer Challenge: a week on OpenBSD with a Centrino and half a gig of RAMhttp://www.k58.uk/old-computer.html
people interact with computers and other kinds of programmable electronic devices. Hint: not by command line. I've noticed that some of the other participants in this project of S
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
Slide Show Screen Saver for Windowshttps://www.fourmilab.ch/slidescr/
algorithm on computers equipped with full colour hardware, but there's another reason you might want to use it. “High colour” (15 or 16 bit) displays really don't have
Slide Show Screen Saver for Windows
Best practices for inclusive textual websites - Seirdyhttps://seirdy.one/posts/2020/11/23/website-best-practices/
students using school computers, and people with restrictive corporate policies can’t “make websites work for them”; that’s a webmaster’s responsibility. At the same time, many us
A lengthy guide to making simple, inclusive sites focused on content before form. Emphasizes brutalist design and accessibility to include under-represented users.
Draft-leach-cifs-v1-spec-02http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html
in use by personal computers and workstations running a wide variety of operating systems. Table Of Contents STATUS OF THIS MEMO...................................................
Claws Mail configuration guide (incl. PGP)http://digdeeper.love/articles/claws.xhtml
systems or client computers. For clarity's sake - Claws Mail was immune to the attack - so the situation wasn't that bad. Still, it shows you shouldn't put all your privacy eggs i
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox
Find more...