wiby  
Settings



Market Ticker Frequently Asked Questions

http://tickerforum.org/faq.html

other operational and monitoring requirements. You may , however, "resign" from the system by following the procedure given elsewhere in the FAQ. Following that procedure will irr
Tickerforum Frequently Asked Questions

Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

has nothing to do with monitoring and profiling you for ad targeting, and governments are not in the least sad that they can know the location of anyone they might dislike at any
Big Tech strives to end privacy and make massive surveillance non-optional. You best start believing in cyberpunk dystopias, you are in one.

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

based on smart-city monitoring demonstrates XC in a realistic application. ECOOP Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

Kernel Planet

https://planet.kernel.org/

about eBPF for security monitoring Provided leadership on the eBPF Technical Steering Committee ( BSC ) Co-chaired USENIX SREcon APAC 2023 Gave 6 conference keynotes It's still ea

Judicially Arbitrated Imperial E-Democracy

http://www.e-democracy.biz/E-Democracy.html

data from any form of monitoring and against unreasonable searches and seizures. This shall not be violated and no warrants shall issue but upon probable cause, supported by oath
The Constitution of the New World Order. A means for a stable fully customizable E-Democracy and the basis for it’s initial operation.

Cyborgs, transhumans and neuroelectronics

https://www.wireheading.com/brainstim/cyborgs.html

and aviators by closely monitoring them with sensors and adapting accordingly. This intriguing approach—given names like the “cognitive cockpit” and “augmented cognition” (augcog)

Kicks Condor

https://www.kickscondor.com/

used to have a way of monitoring RSS as a ‘live bookmark’ - which was REALLY WEIRD. This was removed in 2018. Kicks Condor 9 Jun 2021 • posted to /en/rss , +1 •&nbs
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

databases. Tools: monitoring/analysis tools, penetration tools, scripts. Techniques/strategies: scanning, fuzzing, common attacks. Legalities: don't try out these tools and techni
How to become a bug-bounty hunter and do penetration testing

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

and 370 at a satellite monitoring site in Australia. But, even if they were larger and faster computers, it just wasn't the same as the old Q-7. The Q-7 was the easiest computer I

The EBS Authenticator Word List

http://www.akdart.com/ebs.html

PSA's: In addition to monitoring the AP wire, radio (and TV) stations monitor other radio stations to this day, listening for EAS messages.  Under the new system, each statio
This is a rare look at an old Emergency Broadcast System (EBS) authenticator word list from the early 1970's, as well as a number ofother historical documents concerning the EBS s

Capability Comparison

https://secushare.org/comparison

automated server memory monitoring ) or installed in a way that it cannot easily be found. This, thanks to push-to-talk, even works for conferences. Long-term use of such a config

Loper OS » Bitcoin, or How to Hammer in Nails with a Microscope.

http://www.loper-os.org/?p=939

as well as by monitoring and keeping tight control of trade (in strategic commodities, arms, and just about everything else.)  So the above is more-or-less a no-brainer. As econom


Find more...