wiby  
Settings



Participation in the information age

https://gotze.dk/phd/it.html

Democracy aided by computers, and in particular, computer networks (e.g., the internet) is the subject of many current debates and discussions locally and globally. There are also

Reasons not to use (i.e., be used by) Facebook

http://stallman.org/facebook.html

phone numbers for "security" but uses them for advertising. How did Mari Sherkin end up on a dating site unwillingly? Facebook opens browser windows showing other companies' sites

Stop Using Discord

https://usemumble.neocities.org/

with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc

THE LANDES REPORT

http://www.ProtocolsForDemocracy.org/ToCongress1.htm

From vote-flipping computers to uncounted paper ballots, there was chaos at many polls across the country in the last election.  In a survey just released by several voting r

Thousands of links to Webstart Content

http://www.webstart.com/thousands.htm

http://dir.yahoo.com/Computers_and_Internet/Standards/ . 22148 from http://www.yahoo.com/Science/Engineering/Electrical_Engineering/Telecommunications/ . 21839 from http://www.alt

GRC | Steve Gibson's WebZone:  

https://www.grc.com/stevegibson.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !!   &nb
Steve Gibson's Little Corner of the Web.

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Online BYTE Archive

https://halfhill.com/bytelink.html

the most crash-prone computers ever built is that reliability has never been a high priority — either for the industry or for users. [Cover story: April 1998] Why Mainframes

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

UNATLe: United Nations AntiTerrorism Leauge

http://www.unatle.net/NuclearWar.html

And Not Omniscient Computers Giving Us Infinite Hit Points Relative To You And IQ Regulated{Based On Computer Quantity} Hit Points Relative To Other Cute Little Lerypoooss Only Ra
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!

T E X T F I L E S

http://textfiles.com/politics/

A Trip Report on the Computers, Freedom and Privacy Report by R. T. Mercuri (April 1, 1991) cfp2-sum 40674 Computers, Freedom, and Privacy-2: A Report by Steve Cisler (1992) cgw.t


Find more...