Douglas W. Jones's punched card indexhttp://homepage.divms.uiowa.edu/~jones/cards/history.html
Before Computers The punched card as used for data processing, originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York City Board o
A brief technical history of punched cards
2023: November - February Political Noteshttp://stallman.org/archives/2023-nov-feb.html
These cars are full of computers with nonfree software and little security. But the insecurity (like the surveillance) depends on their attempt to communicate by radio . If you de
Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Interhttps://cryptome.org/wipo-imp99-3.htm
electronic devices, computers, satellites and global networks such as the Internet. ____________________ 1 The authors have participated actively in the legislative and technology
Freeware Tools and System Utilities for Windowshttp://www.nirsoft.net/utils/
entries on your computers, and displays their logon details: User Name, Password, and Domain. You can use it to recover a lost password of your Internet connection or VPN. Dialupa
Unique collection of freeware utilities and freeware password recovery tools
The GNU MP Bignum Libraryhttps://gmplib.org/
Apple's new Arm based computers, our support has a problem. The problem is that Apple reserves CPU register x18, but GMP's mpn/arm64 assembly code uses that register. While GMP ru
The Kermit Script Library and Tutorialhttps://www.kermitproject.org/ckscripts.html
everybody who used computers to communicate with other computers used Kermit as a terminal emulator and for file transfer. C-Kermit for Unix and VMS and MS-DOS Kermit for DOS were
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s
Find more...