wiby  
Settings



bryan wann :: binary fury

https://binaryfury.wann.net/

fixing up vintage computers and software, so why not get a vintage tractor running? TL;DR: good news: tractor runs, bad news, a lot of bad things [photos: flickr – IH 484 tr
Bryan Wann, California, USA

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!

MorphOS - Frequently Asked Questions

https://www.morphos-team.net/faq

Ax00 series of computers. A few parts of MorphOS were originally derived from work made for the open source AROS project. What hardware do I need to run MorphOS? MorphOS is curren

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

wingolog

http://wingolog.org/

america bdw compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme s

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

2019: July - October Political Notes - Richard Stallman

http://stallman.org/archives/2019-jul-oct.html

Chrome add-on on the computers of Google workers. Workers fear this will be used to surveil them and then attack their rights in one way or another. Every nonfree program warrants

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Quote Anthology

https://quotes.pouyakary.org/

to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people

SoylentNews: SoylentNews is people

https://soylentnews.org/

insistence that computers must speak to people is not dead. But it is diminishing, generation by generation, as the field grows further from its roots. You have the opportunity to


Find more...