#youbroketheinternet So We Got Tracked Anywayhttps://youbroketheinternet.org/trackedanyway
to shutdown their computers completely each day, or otherwise maintain a habit of restarting their browser each day anew. Even Tor users that have been surfing the web using any b
SAGEhttps://ed-thelen.org/sage-1.html
interconnected set of computers through which everyone could quickly access data and programs from any site. In spirit, the concept was very much like the Internet of today. Lickl
Asterisk™: The Definitive Guidehttp://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html
of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged
Pipedothttps://pipedot.org/
a pile of brand-new computers to six Office Depot locations around Portland, Ore. Technicians at four shops claimed the PCs showed "symptoms of malware," and offered to sell repai
Old Cavebear Bloghttps://www.cavebear.com/old_cbblog/
was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin
Sacha Chuahttps://sachachua.com/blog/feed/
on more people's computers. I think that the stuff that I've been building around learning languages and doing voice input into Emacs probably… There are a lot of these thi
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to
GuestArticles index [LWN.net]https://lwn.net/Archives/GuestIndex/
generates 350 Linux computers for schools (March 19, 2008) Fioretti, Marco A look at free software in Ecuador (December 3, 2008) Fleming, Matt The bootstrap process on EFI systems
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
https://www.ietf.org/rfc/rfc2130.txthttps://www.ietf.org/rfc/rfc2130.txt
transmission to other computers. Transfer Encoding Syntax - The mapping from a coded character set which has been encoded in a Character Encoding Scheme to an encoding which may b
Linkshttps://majestictux.neocities.org/posts/links
88x31 GIF Collection Security HaveIBeenPwned : check if your email has been compromised in a data breach. VirusTotal : scan files for viruses. Self-Hosting LandChad : self hosting
David A. Wheeler's Bloghttps://dwheeler.com/blog/2011/
I don’t use computers to have the newest fad interface, I use them to get things done (and for the pleasure of using them). I will accept changes, but they should be obvious
Find more...