wiby  
Settings



Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

A to Z of C - Beta | Online book on C/DOS programming

http://guideme.itgo.com/atozofc/

The Real World With Computers 41. Writing BIOS Flashing the BIOS — How-to 42. Programming CMOS RAM 43. Device Driver Programming Device driver Device driver writing kit (wit
A to Z of C is the non-profit project to bring cheapest and best book for C

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni

Learn Multiplatform Z80 Assembly Programming... With Vampires!

https://www.chibiakumas.com/z80/

64 kilobytes ... in computers 'Kilo' is 1024, because binary works in powers of 2, and 2^10 is 1024 64 kilobytes is the amount of memory a basic 8-bit system can access Z80 is 8 b

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

The Macbook Air is the New Thinkpad

https://jacobwsmith.xyz/stories/11_inch_macbook_air.html

also one of the first computers to come with RAM that was soldered onto the motherboard so if the RAM fails it can’t be replaced. But have you ever actually had your RAM fail? I h

Don's Maps - Palaeolithic / Paleolithic European, Russian, Ukrainian and Australian Archaeology / Archeology

https://www.donsmaps.com/

I got much better computers and software over the years, Adobe Photoshop and Illustrator for example, and my maps became colourised and had more detail. I did a lot of maps of the
Resources for the study of Palaeolithic European, Russian, Ukrainian and Australian Archaeology

WOLF - a proposed new signal format for LFweak-signal work

https://www.qsl.net/dl4yhf/wolf/wolf_info.html

propagation path remain open over the required interval. I hope that WOLF will permit a QSO to be completed in an hour, if one station receives a signal that is 10 dB weaker than

John Regehr's Home Page

https://users.cs.utah.edu/~regehr/

Teaching Papers Contact Computers are amazingly fun and useful, but why do they crash and hang? Why are they so terrifyingly insecure? The problem is many-faceted, but an importan

NAPS2 - Scan documents to PDF and more

https://www.naps2.com/

connected to other computers on your local network. Turn any scanner into a wireless scanner usable from your laptop or phone. Read more. Tools for power users and businesses Opti
NAPS2 is free scanner software made easy. Scan to PDF, edit your documents, and use advanced features like OCR. Available on Windows, Mac, and Linux.


Find more...