Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Interhttps://cryptome.org/wipo-imp99-3.htm
electronic devices, computers, satellites and global networks such as the Internet. ____________________ 1 The authors have participated actively in the legislative and technology
Kermit Security Referencehttps://www.kermitproject.org/security.html
mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,
Stories I Will Not Writehttps://www.lord-enki.net/stories.html
of high-speed optical computers; lets them loose in a public fountain. A group of ten people is sent on a one way trip to colonize Mars. There is an accident on the way, and they
SoftRAM95: "False and Misleading"http://ftp.st.ryukoku.ac.jp/pub/published/oreilly/windows/win95.update/softram.html
to double Windows 95 computers' RAM. What they got was a snazzy looking software package that didn't increase RAM one bit." Bernstein added, "consumers shopping for high tech prod
Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org frhttps://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html
we should design our computers this way. But here we run into the same problem we do that results in me not being able to trust my computer: every program runs *as me*. Solitaire,
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox
Find more...