wiby  
Settings



Eavesdropping and Electronic Surveillance Detection - Advanced Electronic Security Company

https://www.bugsweeps.com/info/eavesdropping_detection.html

no open review of the algorithms. These devices are also very expensive, costing around $US 2,000 each. There is also the possibility that the devices are deliberately not secure.
Eavesdropping Detection, TSCM bug sweeps telephone, computer data lines, and bug sweep offices to free them of electronic eavesdropping and wiretaps

mc-computing main page

http://mc-computing.com/

saturation water vapor algorithms (models) to help understand the relationships between Relative Humidity, Dew Point, Temperature, Pressure, and the Water Vapor Mixing Ratio. GHCN
mc-computing.com - main page, Last Modified 09-18-17

Breaking a Visual CAPTCHA

https://www2.cs.sfu.ca/~mori/research/gimpy/

uses general purpose algorithms that have been designed for generic object recognition. The same basic ideas have been applied to finding people in images, matching handwritten di

Why | Quit Social Media

https://quitsocialmedia.club/why/

positive emotions . Algorithms which compose our feeds are tailored to maximize engagement and interaction, they do not actually care about how users feel. Our emotions are govern
The heart of the matter: all of the reasons why we should quit Social Media

Quantum Computing for High School Students

https://www.scottaaronson.com/writings/highschool.html

than classical algorithms? Ten times? 100 times?" But the point is that, as you go to larger and larger numbers, Shor's algorithm does better and better compared to any known clas

Finite State Machines in Forth - Noble

http://galileo.phys.virginia.edu/classes/551.jvn.fall01/fsm.html

1986); R. Sedgewick, Algorithms (Addison Wesley Publishing Company, Reading, MA, 1983). [2] J.V. Noble, "Avoid Decisions", Computers in Physics 5, 4 (1991) p 386. [3] J. Basile, J

What is a string? -- definition by The Linux Information Project (LINFO)

https://www.linfo.org/string.html

There are numerous algorithms (i.e., sets of precise, unambiguous rules designed to solve specific problems or perform specific tasks) for processing strings, including for search

Elite Disassembly

https://6502disassembly.com/a2-elite/

explaining the math and algorithms used. Elite Harmless project for the C64. Disassembled sources with some enhancements, ready to build. Elite - The New Kind project for Windows.
Disassembly of Elite for the Apple II

Interview with PGP author Phil Zimmermann

https://www.animatedsoftware.com/hightech/philspgp.htm

none of the encryption algorithms that were available to me as a school kid were going to pose any problems for any major governments. Host: The secret decoder ring and... PZ: ...
Russell D. Hoffman interviews Phil Zimmerman, Author, PGP

wass good

https://yudo.cc/

taking and testing out algorithms? It's basically the perfect machine (Not to mention that I find 1980s laptop design to be quite attractive. HUBBA HUBBA~). Alas, it's still from
i am become blogger, rambler of thoughts

https://www.ietf.org/rfc/rfc2130.txt

https://www.ietf.org/rfc/rfc2130.txt

section covers various algorithms to convert a source text S, encoded in the coded character set CCS(S), to a target text T, encoded in the coded character set CCS(T). Rep(X) is t

C. M. Kosemen - Illustration

http://www.cmkosemen.com/illustration.html

by Jakub Bobrowicz's algorithms. Proteodactylus , an early pterosaur relative. Equops, a long-necked iguanodont with a horse-like face. Ugrodon , an omnivorous archosaur of uncert


Find more...