wiby  
Settings



/tech/ - Technology - Page 1

https://zzzchan.xyz/tech/index.html

>>17710 When computers can write the most trivial of software themselves, people will only need to program sophisticated software. The only programmers rendered obsolete by
Technology & Computing

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

MDGx DOS Power Toys

https://www.mdgx.com/dos.htm

IBM PC clones, portable computers/UMPCs + portable/mobile devices/terminals allows to run DOS/ FreeDOS / DR-DOS/OpenDOS /MS-DOS OS and native DOS applications + games through a vi
MDGx AXCEL216 MAX Windows DOS 11 10 8.1 8 7 R2 2012 2008 Vista 2003 2K3 2000 2K XP SP1 SP2 SP3 Second Edition SE Millennium Edition ME 98 95 95a 95B 95C OSR2 OSR1 NT4 NT 3.11 3.1 3

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2017/

Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Publications

https://freddie.witherden.org/pages/publications/

Turbine Blade . Computers & Fluids, 2021, 104989. C. V. Frontin, G. S. Walters, F. D. Witherden, C. W. Lee, D. M. Williams, and D. L. Darmofal, Foundations of space-time finit

Magic Mirror Backup(tm)

http://www.pensamos.com/mmb/

your computer to other computers within your office. In exchange, these other computers also copy their own files onto your computer. This sharing of backups has quite a few advan

Smartphone

https://www.billdietrich.me/Smartphone.html

my Android page Home Computers Smartphone Basics Combinations [Ignores Apple.] Android phone with stock OS, run Android apps. Android phone with AOSP-compatible third-party OS ( L
Smartphone types, security, privacy, use

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell


Find more...