/tech/ - Technology - Page 1https://zzzchan.xyz/tech/index.html
>>17710 When computers can write the most trivial of software themselves, people will only need to program sophisticated software. The only programmers rendered obsolete by
Technology & Computing
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
MDGx DOS Power Toyshttps://www.mdgx.com/dos.htm
IBM PC clones, portable computers/UMPCs + portable/mobile devices/terminals allows to run DOS/ FreeDOS / DR-DOS/OpenDOS /MS-DOS OS and native DOS applications + games through a vi
MDGx AXCEL216 MAX Windows DOS 11 10 8.1 8 7 R2 2012 2008 Vista 2003 2K3 2000 2K XP SP1 SP2 SP3 Second Edition SE Millennium Edition ME 98 95 95a 95B 95C OSR2 OSR1 NT4 NT 3.11 3.1 3
How to Build a Low-tech Website? | LOW←TECH MAGAZINEhttps://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/
shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2017/
Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t
CRN / Unixhttp://crn.hopto.org/unix.html
into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.
Publicationshttps://freddie.witherden.org/pages/publications/
Turbine Blade . Computers & Fluids, 2021, 104989. C. V. Frontin, G. S. Walters, F. D. Witherden, C. W. Lee, D. M. Williams, and D. L. Darmofal, Foundations of space-time finit
Magic Mirror Backup(tm)http://www.pensamos.com/mmb/
your computer to other computers within your office. In exchange, these other computers also copy their own files onto your computer. This sharing of backups has quite a few advan
Smartphonehttps://www.billdietrich.me/Smartphone.html
my Android page Home Computers Smartphone Basics Combinations [Ignores Apple.] Android phone with stock OS, run Android apps. Android phone with AOSP-compatible third-party OS ( L
Smartphone types, security, privacy, use
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Find more...