wiby  
Settings



qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

DistroWatch.com: Put the fun back into computing. Use Linux, BSD.

https://distrowatch.com/

Pi single-board computers. The new version, besides bringing the usual range of bug fixes and improvements, also disables the passwordless sudo: " Today we are releasing version 6
News and feature lists of Linux and BSD distributions.

C++ Applications

https://www.stroustrup.com/applications.html

both Mac OS and Windows computers. Mentor Graphics : Since the 1980s Mentor Graphics has built most of its applications using C++, including: Calibre: software for IC physical ver

Loper OS » "Pest" v. 0xFB.

http://www.loper-os.org/?p=4003

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional, you best start believing in cyberpunk dystopias, you are in one.

Fake privacy / security initiatives

http://digdeeper.love/articles/fake_initiatives.xhtml

will be stored on their computers, its purpose, as well as the need to get consent from users before storing anything. There were also guidelines for the duration of the cookie's

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

The Dock

http://koshka.love/links.html

designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0

4K Associates : Standards Strategy Consultants

https://XeNT.com/4K-Associates/Press.html

on close to 10000 computers throughout the Internet. The challenge, called ECC2K-108, was set by Canadian cryptographic company Certicom in 1997 to encourage researchers to test t

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2004/

left for home. Unpacked computers onto new table - can actually sit in front of any 1 of 3 concurrently - brilliant. Lunch, played with H. on the BBC cbeebies page; caught Miguel


Find more...