The Grand List of Overused Science Fiction Clicheshttp://www.geocities.ws/evilsnack/cliche.html
brains directly to computers and get dependent on them. Aliens travel a zillion miles to loot the Earth of resources which exist in far greater and much more easily exploitable qu
Links user documentationhttp://links.twibright.com/user_en.html
the program between computers. Copy the links file into a directory where you install executable files, preferably on your $PATH (the path where executable files are searched for)
DMS Bibliographyhttp://www.molecularassembler.com/Nanofactory/AnnBibDMS.htm
and molecular computers based on semiconductors such as diamond, it will probably be easier to first make systems that rely on materials that are simpler to synthesize but whose m
What Unix Gets Righthttp://www.catb.org/esr/writings/taoup/html/ch01s05.html
a heterogeneous mix of computers, vendors, and special-purpose hardware. It is the only operating system that can scale from embedded chips and handhelds, up through desktop machi
About Trinityhttps://www.trinitydesktop.org/about.php
of traditional desktop computers. Project Goals We seek to provide a traditional desktop environment which is . . . Flexible and highly customizable. Visually appealing. Equipped
YAAC - Yet Another APRS Clienthttp://www.ka2ddo.org/ka2ddo/YAAC.html
Pi single-board computers). Mac OS X (x86 and ARM versions). FreeBSD (tested on 9.0). YAAC may also theoretically work on Solaris with SPARC processors, but has not been tested on
Yet Another APRS Client, software for accessing the Automatic Packet Reporting System
Challenging projects every programmer should try - Austin Z. Henleyhttps://austinhenley.com/blog/challengingprojects.html
speed even on different computers, and explore how to implement more interesting enemies with AI. Still not enough? Add shader effects, sound, and online multiplayer! Things to le
Challenging projects every programmer should try.
Technological slaveryhttp://digdeeper.love/articles/technological_slavery.xhtml
chance that quantum computers will make all current ciphers irrelevant - https://hackaday.com/2015/09/29/quantum-computing-kills-encryption/ (archive) (MozArchive) - so private co
Junk Email Filter Spam Blocking Servicehttp://www.junkemailfilter.com/spam/home.html
server or your client computers. And if you need email hosting, we have that too! We use our advanced spam filter and virus filter servers to remove the junk email and computer vi
Junk Email Filter - Front End Spam
Michael Orlitzky { Motherfuckers need package management }https://michael.orlitzky.com/articles/motherfuckers_need_package_management.xhtml
slow.” Well, computers don't get slow—Windows gets slow. And it gets slow because you install a bunch of garbage on it and never track what that garbage is or where it
Mike Patton's pointers to computer infohttp://www.mit.edu/people/map/computers.html
Hardware interests DEC Computers Other Computers Other Hardware Software interests UNIX, ugh Languages Programs, etc. Computer communications Home Setup Home Automation Miscellane
CipherSaber Home Pagehttps://ciphersaber.gurus.org/
come with all DOS based computers, is suitable. It can still be found on the Microsoft Windows '95 CD-ROM in the OTHER\OLDMSDOS directory, and on the Microsoft Windows '98 CD-ROM
Fight the crypto ban by learning how to write your own strong encryption program.
Find more...