poindexter, WHO?http://tilde.club/~poindexter/
data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from
Web Surfinghttp://web.cs.wpi.edu/~jshutt/surfing.html
Interacting with Computers , 2016) (26-Apr-19; 07-Jan-21) The Craft of Text Editing --or-- Emacs for the Modern World (Craig A. Finseth, 1999) (24-Jul-19; 11-Jan-21) Evil Mode: Or
https://www.ietf.org/rfc/rfc3023.txthttps://www.ietf.org/rfc/rfc3023.txt
computing resources of computers, if they are performed many times. References [ASCII] "US-ASCII. Coded Character Set -- 7-Bit American Standard Code for Information Interchange",
Arcade@Home(tm) - MAME, N64 & PSX Emulators - Final Burn v0.008 Releasedhttps://www.arcadeathome.com/
arcade controls to computers and consoles Ouya passes Kickstarter goal on first day at $950K and rising Bleeding Edge MAME / MESS source downloads (GIT) MAME & MESS Political Road
MAME, N64 & PSX Emulators - Final Burn v0.008 Released
PNG (Portable Network Graphics) Home Sitehttp://www.libpng.org/pub/png/
(raster) images on computers. Unofficially its acronym stands for ]" "PNG's Not GIF." PNG was designed to be the successor to the once-popular GIF format, which became decidedly l
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txthttps://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt
speeds, about NSA supercomputers. There's just no reason for people to worry about "weak IDEA keys" when so many more pressing matters exist. (Let the experts worry.) Little of th
Debian -- About Debianhttps://www.debian.org/intro/about
on thousands of computers as easily as installing a single application. All of it free . It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools
Asterisk™: The Definitive Guidehttp://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html
of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged
security-snake-oilhttp://linuxmafia.com/faq/Essays/security-snake-oil.html
millions of infected computers connecting to them, and counting the increasing number of Mac machines. Can you say "this was a religious debate?" Well, I can, which is why the res
Find more...