wiby  
Settings



SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

http://www.catb.org/jargon/oldversions/jarg262.txt

http://www.catb.org/jargon/oldversions/jarg262.txt

else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,

A Critique of Technocentrism in Thinking About the School of the Future

http://papert.org/articles/ACritiqueofTechnocentrism.html

of the presence of computers and other new technologies. In some departments of life, the computer presence is already visible. Coming here from my home, I passed through an airpo

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

How I use dwm - ratfactor

http://ratfactor.com/dwm2

easily deploy it to new computers. You can read more about that in: How I set up new computers with Slackware Linux Personal Linux Setup with Git Repos and Stow For my setup conta

(IV.) Foomatic from the Developer's View: How does it work?

https://www.openprinting.org/download/kpfeifle/LinuxKongress2002/Tutorial/IV.Foomatic-Developer/IV.tutorial-handout-foomatic-development.html

are operating the computers newbie-friendliness did not have a high priority, too. Unfortunately LPD was used for a very long time, up to even nowadays, but printers changed a lot

Jim's Random Notes - May 2001

http://www.mischel.com/diary/2001/05/

was performed by 474 computers that had been previously compromised and were running a "bot" that takes commands from a central server.  The person responsible for the bots j

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

Welcome To The Tech Guide!

http://www.thetechguide.com/

home and seizure of his computers that were part of a criminal investigation into an iPhone prototype lost by an Apple employee. by Declan McCullagh and Greg Sandoval CNET News Cl
The Tech Guide includes resources for tweaking your computer, troubleshooting, and hardware and software reviews.

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]


Find more...