Participation in the information agehttps://gotze.dk/phd/it.html
Democracy aided by computers, and in particular, computer networks (e.g., the internet) is the subject of many current debates and discussions locally and globally. There are also
Reasons not to use (i.e., be used by) Facebookhttp://stallman.org/facebook.html
phone numbers for "security" but uses them for advertising. How did Mari Sherkin end up on a dating site unwillingly? Facebook opens browser windows showing other companies' sites
Stop Using Discordhttps://usemumble.neocities.org/
with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc
THE LANDES REPORThttp://www.ProtocolsForDemocracy.org/ToCongress1.htm
From vote-flipping computers to uncounted paper ballots, there was chaos at many polls across the country in the last election. In a survey just released by several voting r
Thousands of links to Webstart Contenthttp://www.webstart.com/thousands.htm
http://dir.yahoo.com/Computers_and_Internet/Standards/ . 22148 from http://www.yahoo.com/Science/Engineering/Electrical_Engineering/Telecommunications/ . 21839 from http://www.alt
GRC | Steve Gibson's WebZone:https://www.grc.com/stevegibson.htm
SQRL PDP-8 Computers TrueCrypt Repository Big Number Calculator The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! &nb
Steve Gibson's Little Corner of the Web.
Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Online BYTE Archivehttps://halfhill.com/bytelink.html
the most crash-prone computers ever built is that reliability has never been a high priority — either for the industry or for users. [Cover story: April 1998] Why Mainframes
Network Protocols and Standardshttps://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm
between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
UNATLe: United Nations AntiTerrorism Leaugehttp://www.unatle.net/NuclearWar.html
And Not Omniscient Computers Giving Us Infinite Hit Points Relative To You And IQ Regulated{Based On Computer Quantity} Hit Points Relative To Other Cute Little Lerypoooss Only Ra
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!
T E X T F I L E Shttp://textfiles.com/politics/
A Trip Report on the Computers, Freedom and Privacy Report by R. T. Mercuri (April 1, 1991) cfp2-sum 40674 Computers, Freedom, and Privacy-2: A Report by Steve Cisler (1992) cgw.t
Find more...