wiby  
Settings



MorphOS - Frequently Asked Questions

https://www.morphos-team.net/faq

Ax00 series of computers. A few parts of MorphOS were originally derived from work made for the open source AROS project. What hardware do I need to run MorphOS? MorphOS is curren

Adventure Classic Gaming - ACG - Adventure Games, Interactive Fiction Games - Reviews, Interviews, Features, Previews, Cheats, Galleries, Foru

http://www.adventureclassicgaming.com/index.php/site/about/

gaming platforms, both computers and consoles. We cover games by both independent and commercial developers. Our dedicated team of writers regularly contribute original contents t

Democratic Rationalization: Technology, Power and Freedom [Andrew Feenberg]

https://www.dogma.lu/txt/AF_democratic-rationalization.htm

especially in computers. Here we have a contemporary version of the dilemma of the bicycle discussed above. Progress of a generalized sort in speed, power, and memory goes on apac

All links @ cidoku.net

http://cidoku.net/en/links/all

friend who likes old computers and cactuses. In Spanish. LiterallyHifumi A personal site and blog about technology, birds, and singing synths. Very interesting is the World Wide W

Jim's Random Notes - May 2001

http://www.mischel.com/diary/2001/05/

was performed by 474 computers that had been previously compromised and were running a "bot" that takes commands from a central server.  The person responsible for the bots j

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

Welcome To The Tech Guide!

http://www.thetechguide.com/

home and seizure of his computers that were part of a criminal investigation into an iPhone prototype lost by an Apple employee. by Declan McCullagh and Greg Sandoval CNET News Cl
The Tech Guide includes resources for tweaking your computer, troubleshooting, and hardware and software reviews.

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

ASH (ALT.SUICIDE.HOLIDAY) FAQ part 1/4: Introduction

https://archive.ashspace.org/ashbusstop.org/intro.html

at http://dmoz.org/Computers/Internet/E-mail/Anonymous_Mailers/ Setting up for usage of an anonymous remailer is a hassle, but that is the only negative aspect. Nobody will mind y

The Secret State: MI5 (Home Office/MoD), The Security Service and MI6 (Foreign Office/MoD), GCHQ signals intelligence, The Secret Intelligenc

http://www.bilderberg.org/sis.htm

were getting on with my computers. They said they were still under investigation. I asked if they'd found anything to charge me with, and they said no. I asked if they were going

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Looking at Windows Vista | Peter Torpey

https://petertorpey.com/articles/windows_vista.html

familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A


Find more...