wiby  
Settings



Trends and the Future of Computing and the Internet

http://mrp3.com/trends.net.html

of the art. But today's computers often have multiple cores and operate at speeds far in excess of 2Ghz, have gigabytes of RAM, terabytes of disk storage, and video resolution bet

Technical Writing

http://www.rbs0.com/tw.htm

the basis for digital computers and computer programming, which have revolutionized our way of working. For example, whenever an attorney does a search of a computer data base (e.
style in technical writing

bryan wann :: binary fury

https://binaryfury.wann.net/

fixing up vintage computers and software, so why not get a vintage tractor running? TL;DR: good news: tractor runs, bad news, a lot of bad things [photos: flickr – IH 484 tr
Bryan Wann, California, USA

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!

Consciousness Is Not Material.

https://lukesmith.neocities.org/vids/notmaterial_consciousness

a computer. WE designed COMPUTERS to have an interface for us. The screen of your computer is to its perception, or what it sees inside, or what you see as reasonable based on you

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

Dont's | Luke Smith

https://lukesmith.xyz/donts/

health or lifestyle or computers to do things a better, safer, purer and more productive way, I don’t really know what it says about you, but if you want to get that sorted
This page is under construction.I’ll come back to it when I have time.It’s published, but it might not be a representative sample of what I want to say.These are things

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

2019: July - October Political Notes - Richard Stallman

http://stallman.org/archives/2019-jul-oct.html

Chrome add-on on the computers of Google workers. Workers fear this will be used to surveil them and then attack their rights in one way or another. Every nonfree program warrants

List of DIY IC Tester Projects - CNK

http://www.ombertech.com/cnk/ictesters/

design for S-100 computers, but adaptable to other 8bit and 16bit computers (an old 32bit PC with ISA card sockets might manage it as well) Software not provided, instructions pro

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2001/

now bristling with computers, updated the hub to Robert's 10/100 switch. Located an atk chaining bug. Plugged onwards with the merge to libbonoboui, hmm. Bed, seeing J' at the cra


Find more...