wiby  
Settings



#youbroketheinternet So We Got Tracked Anyway

https://youbroketheinternet.org/trackedanyway

to shutdown their computers completely each day, or otherwise maintain a habit of restarting their browser each day anew. Even Tor users that have been surfing the web using any b

SAGE

https://ed-thelen.org/sage-1.html

interconnected set of computers through which everyone could quickly access data and programs from any site. In spirit, the concept was very much like the Internet of today. Lickl

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

Pipedot

https://pipedot.org/

a pile of brand-new computers to six Office Depot locations around Portland, Ore. Technicians at four shops claimed the PCs showed "symptoms of malware," and offered to sell repai

Old Cavebear Blog

https://www.cavebear.com/old_cbblog/

was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin

Sacha Chua

https://sachachua.com/blog/feed/

on more people's computers. I think that the stuff that I've been building around learning languages and doing voice input into Emacs probably… There are a lot of these thi

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

generates 350 Linux computers for schools (March 19, 2008) Fioretti, Marco A look at free software in Ecuador (December 3, 2008) Fleming, Matt The bootstrap process on EFI systems

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

https://www.ietf.org/rfc/rfc2130.txt

https://www.ietf.org/rfc/rfc2130.txt

transmission to other computers. Transfer Encoding Syntax - The mapping from a coded character set which has been encoded in a Character Encoding Scheme to an encoding which may b

Links

https://majestictux.neocities.org/posts/links

88x31 GIF Collection Security HaveIBeenPwned : check if your email has been compromised in a data breach. VirusTotal : scan files for viruses. Self-Hosting LandChad : self hosting

David A. Wheeler's Blog

https://dwheeler.com/blog/2011/

I don’t use computers to have the newest fad interface, I use them to get things done (and for the pleasure of using them). I will accept changes, but they should be obvious


Find more...