wiby  
Settings



I'm alone, but not lonely

http://www.cjas.org/~leng/otaku-e.htm

to hack into the copy protection of DAT recorders, even if he succeeds, the real otaku wouldn't have any music to play. It's just a game, useless. If they can out-wit the protecti

2019: September - December Political Notes - Richard Stallman

http://stallman.org/archives/2019-sep-dec.html

( Resuming fishing ) Protection of the sea bottom from bottom-trawling, off the US northwest, has brought back fish stocks so well, in under 20 years, that it has been possible to

The Digital Michelangelo Project

http://accademia.stanford.edu/mich/

viewing, and piracy protection. To address these problems, we have a pilot research project called Creating digital archives of 3D artworks , sponsored by the National Science Fou

The Word on The Streets

http://www.shoestring-graphics.com/CP2020/slang/

Defilade: n. (Mil.) 1) Protection from hostile observation and fire provided by an obstacle such as a hill, ridge, or bank. 2) A vertical distance by which a position is concealed
The Canonical Glossary of Slang for Cyberpunk 2.0.2.0.

GRC | Steve Gibson's WebZone:  

https://www.grc.com/stevegibson.htm

XPdite provides instant protection for this vulnerability with a 30k download.   GRC.COM network topology change — it was time to update things We were given the opportu
Steve Gibson's Little Corner of the Web.

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

on the promotion, protection and enjoyment of human rights on the Internet (27 Jun) A California District Court Judge grants a motion for what is thought to be the first permitted
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Online BYTE Archive

https://halfhill.com/bytelink.html

multitasking and memory protection. In contrast, both of those features and multithreading are expected to appear in Chicago, the next release of Windows 3.x. [May 1994] Apple's 6

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

has not been a complete protection and will not necessarily continue to be any protection. Recent events show that with enough resources, almost anything is possible. Maybe my eth
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

VC&G | » The PC is Dead: It’s Time to Bring Back Personal Computing

http://www.vintagecomputing.com/index.php/archives/3292/the-pc-is-dead-its-time-to-make-computing-personal-again

there was software copy protection ), no tracking. No need for special tools to repair it either. In fact, Apple openly encouraged experimentation. Further, what percentage of you
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

Risk Management's protection plan (April 21, 2004) The JPEG patent (April 28, 2004) What's in store for GCC (May 12, 2004) Fedora: looking forward (May 21, 2004) Did they read it?


Find more...