Apple ][ pagehttp://www.textfiles.com/history/EVILEXIDY/
play on their Apple ][ computers, this was a day both my brother and I would look forward to every week. Aside from playing games at the Arcade and Pong at home, the Apple ][ open
The Edinburgh Multi Access Systemhttp://www.bobeager.uk/emas/
Humour Projects Hacks Computers I have used Messages from the Future Famous People Software A University On The Move Installing a jitsi server Installing a framadate server The Ed
Building software for yourself with Linus Lee (Changelog Interviews #455)https://changelog.com/podcast/455
is so small, and the computers these days are just so fast that you can kind of store things in normal files. All of Monocle’s search data lives inside a big 50-megabyte JSON. It’
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
Dan Connolly's Index of Eventshttps://www.w3.org/People/Connolly/events/
Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto
Fourmilog: None Dare Call It Reasonhttps://www.fourmilab.ch/fourmilog/
Before electronic computers had actually been built, Alan Turing mathematically proved a fundamental and profound property of them which has been exploited in innumerable ways as
The Seven Mercenarieshttp://7mercs.pro/epilogues/season1/s1_epilogue2.php
Stardust : I'm good at computers too! Hunter (while the whole team is arguing) : ( Oh, for the love of Nuka-Cola! Hunter, you should NOT have taken the leader's position! ) Anyway
Tech Stuff Onlyhttp://web.archive.org/web/20190120103108/http://www.techstuffonly.com/
→ Posted in Computers , Electronics , Programming , Projects , Software | Tagged 8088 , assembly , command , command line , computer , controller , homebrew , keyboard , PS/2
Fully Automated Luxury Space Age Package Maintenance | bret.iohttps://bret.io/projects/package-automation/
on code across multiple computers and collaborating on it with other people, and Github is the central platform to coordinate and distribute that code. The old git mascot knew wha
A running log of announcements, projects and accomplishments.
Cool Links! – Qalle’s home pagehttps://qalle.neocities.org/links
Cellar – retrocomputers Dhole Moments – cryptography, furries eevee's Fuzzy Notepad – game development, furries, etc. Hackaday – hardware hacks every day h
The glider: an Appropriate Hacker Emblemhttp://www.catb.org/~esr/hacker-emblem/
into other peoples' computers, those of us the emblem was invented for do not want you displaying it. Go invent your own emblem, cracker. We'll find some way to shame and reject y
Because common signifiers are useful
The Code of the Geeks v3.1 Generatorhttp://www.joereiss.net/geek/geek.html
business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c
Find more...