cadence's weblog (personal blog)https://cadence.moe/blog
a grab bag of stories, computers, photos, mind, and all the other thoughts that won't let me go. rss / atom content quality If you're new here, look for the emojis to find my grea
Wii U Architecture | A Practical Analysishttps://www.copetti.org/writings/consoles/wiiu/
yet, three independent computers: Firstly, we’ve got DRC-WUP which is a System-on-Chip (SoC) hiding yet-another ARM926EJ-S (the same one from the Wii , how many of these do they h
An in-depth analysis that explains how this console works internally
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
Documentary: The LoserUsershttp://rmitz.org/bbsloser.html
"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre
The Dajen SCI -- A System Central Interface for the S-100 Bushttp://users.glitchwrks.com/~glitch/2011/11/03/dajen-sci
8085 Projects | Vintage Computers | Test Equipment | Programming | Contact .:[The Dajen SCI -- A System Central Interface for the S-100 Bus]:. Topic: Using and hacking the Dajen S
The Dajen SCI is a relatively unknown S-100 board with a ton of highly useful features! Documentation and information on repairing, using and modifying the SCI.
Cryptography and Liberty 2000https://archive.epic.org/reports/crypto2000.html/
into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases
hscoolhttp://klein.zen.ru/klein/hscool/
computer hacking art computers LAN WAN how to become hacker remote education remote hacker education remote education of hackers h.user h.luser h.wannabe h.wannabee h.newbie h.cod
poindexter, WHO?http://tilde.club/~poindexter/
data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
EmacsWiki: Moving The Ctrl Keyhttps://www.emacswiki.org/emacs/MovingTheCtrlKey
commands. When personal computers went mainstream in the 80’s, Ctrl was moved out of the way, presumably because the target users (office workers) wouldn’t need Ctrl
Find more...