SGI Technical Advice and Information...http://www.sgidepot.co.uk/sgi.html
Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati
http://www.catb.org/jargon/oldversions/jarg262.txthttp://www.catb.org/jargon/oldversions/jarg262.txt
else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,
A Critique of Technocentrism in Thinking About the School of the Futurehttp://papert.org/articles/ACritiqueofTechnocentrism.html
of the presence of computers and other new technologies. In some departments of life, the computer presence is already visible. Coming here from my home, I passed through an airpo
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
How I use dwm - ratfactorhttp://ratfactor.com/dwm2
easily deploy it to new computers. You can read more about that in: How I set up new computers with Slackware Linux Personal Linux Setup with Git Repos and Stow For my setup conta
(IV.) Foomatic from the Developer's View: How does it work?https://www.openprinting.org/download/kpfeifle/LinuxKongress2002/Tutorial/IV.Foomatic-Developer/IV.tutorial-handout-foomatic-development.html
are operating the computers newbie-friendliness did not have a high priority, too. Unfortunately LPD was used for a very long time, up to even nowadays, but printers changed a lot
Jim's Random Notes - May 2001http://www.mischel.com/diary/2001/05/
was performed by 474 computers that had been previously compromised and were running a "bot" that takes commands from a central server. The person responsible for the bots j
Jeff Duntemann's ContraPositive Diaryhttp://www.duntemann.com/november2008.htm
introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is
Welcome To The Tech Guide!http://www.thetechguide.com/
home and seizure of his computers that were part of a criminal investigation into an iPhone prototype lost by an Apple employee. by Declan McCullagh and Greg Sandoval CNET News Cl
The Tech Guide includes resources for tweaking your computer, troubleshooting, and hardware and software reviews.
How to Build a Low-tech Website? | LOW←TECH MAGAZINEhttps://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/
shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Find more...