wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/june2008.htm

what home users do with computers. (I suspect that the rest is a combination of media players, IM, photo managers, and games.) And within those apps, 20% of the features do 80%&#1

URLs: It's complicated...

https://www.netmeister.org/blog/urls.html

status with all things computers is best described as "it's complicated". We're frenemies. One of us doesn't seem to like the other. Let me show you what I mean. Everybody knows w
Let's play silly games with URLs...

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Apollo Archive

https://jim.rees.org/apollo-archive/

Apollo Page Retrocomputers Apollo Collection Typewritten Software - Retrotechnology Research Laboratory These sites were up at one time but were down last time I checked. Apollo D

poindexter, WHO?

http://tilde.club/~poindexter/

data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from

Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?

http://lolwut.info/misc/permissive-vs-copyleft-responses.html

my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay

Tanya Pretorius' Bookmarks | Home

http://www.tanyapretorius.co.za/index.htm

google of dictionaries. Computers People Cypherella Romana Machado's interests are transhumanism, extropianism and cryptography. She's a Playboy model. Extropians - Cypherella, Ge
Tanya is an infoholic, linguist, computerjunky, semiotician, feminist, teacher, writer, facebookian, tgifan, dog trainer, typesetter, webmaster, activist and reader.


Find more...