wiby  
Settings



poindexter, WHO?

http://tilde.club/~poindexter/

data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from

Web Surfing

http://web.cs.wpi.edu/~jshutt/surfing.html

Interacting with Computers , 2016) (26-Apr-19; 07-Jan-21) The Craft of Text Editing --or-- Emacs for the Modern World (Craig A. Finseth, 1999) (24-Jul-19; 11-Jan-21) Evil Mode: Or

https://www.ietf.org/rfc/rfc3023.txt

https://www.ietf.org/rfc/rfc3023.txt

computing resources of computers, if they are performed many times. References [ASCII] "US-ASCII. Coded Character Set -- 7-Bit American Standard Code for Information Interchange",

Arcade@Home(tm) - MAME, N64 & PSX Emulators - Final Burn v0.008 Released

https://www.arcadeathome.com/

arcade controls to computers and consoles Ouya passes Kickstarter goal on first day at $950K and rising Bleeding Edge MAME / MESS source downloads (GIT) MAME & MESS Political Road
MAME, N64 & PSX Emulators - Final Burn v0.008 Released

PNG (Portable Network Graphics) Home Site

http://www.libpng.org/pub/png/

(raster) images on computers. Unofficially its acronym stands for ]" "PNG's Not GIF." PNG was designed to be the successor to the once-popular GIF format, which became decidedly l

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

speeds, about NSA supercomputers. There's just no reason for people to worry about "weak IDEA keys" when so many more pressing matters exist. (Let the experts worry.) Little of th

Debian -- About Debian

https://www.debian.org/intro/about

on thousands of computers as easily as installing a single application. All of it free . It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

millions of infected computers connecting to them, and counting the increasing number of Mac machines. Can you say "this was a religious debate?" Well, I can, which is why the res


Find more...