wiby  
Settings



Marcs Interests

https://www.skyhunter.com/marc.html

break into enough computers, and we finally decide to just fix the problem. PictureBook of Secure Cooperation No one really wants security for their computers. If you want securit

Kali Yuga | Book Review: "Industrial Society and its Future" by Theodore Kaczynski

https://kaliyugametal.neocities.org/0050-kaczynski

He also states that computers are used to collect and process vast quantities of information about individuals, something that is much more true now than it was back when this ess
An in-depth analysis and review of Theodore Kaczynski's magnum opus.

Index of /unifont

http://czyborra.com/unifont/

and burdened British computers with silly German letters. What do you mean by distributed effort? Unicode is obviously too big and tiring for one or two persons to design a whole

Exploring the Internet!

https://www.ou.edu/research/electron/internet/

(- they invented it) Computers and Internet Programming Languages: Perl - Yahoo's index Programming: Perl Scripts - yet another Yahoo index Free hit counter and statistics from Ne

Performance Comparison of Java/.NET Runtimes (Oct 2004)

http://www.shudo.net/jit/perf/

13.10.3077 for 80x86 Computers Pentium 4 PC Intel 3.2 GHz Pentium 4 (Northwood) Single processor Hyper-Threading disabled Intel 875P chipset Linux 2.6.8 Windows XP SP2 only for .N

W3C XML Query (XQuery)

https://www.w3.org/XML/Query/

NSXML from Apple Computers includes support for XQuery 1.0 and XPath 2.0; it is part of Cocoa. Pathan from Decision Soft [open source, uses Xerces-C] PathEnq from Philip Fearon (a

The Illogic of Programming

https://shadowm00n.neocities.org/tech/illogic_of_programming

way, “programs are for computers; programming is for humans.” This sentiment was also echoed by Dennis Ritchie, the creator of the C programming language and another father of UNI

ANARCHISM.net: The New Libertarian Manifesto, by Samuel Edward Konkin III

https://www.anarchism.net/newlibertarianmanifesto.htm

and all his services, computers, suppliers and customers. This mode of operation is already around and growing in the freer segments of Western economies.     Thus

Techrights — Microsoft is Chewing Up Passwords and Secrets, Where Are the Fines and Government Regulations?

http://techrights.org/n/2024/01/30/Microsoft_is_Chewing_Up_Passwords_and_Secrets_Where_Are_the_Fin.shtml

to do, sometimes computers Microsoft Windows Used to be Identified on Over 99% of Web Requests From Benin. Now It's Around 50%. Or a lot less Microsoft 'Open' 'AI' Has Severe Fina
Microsoft writes the regulations

The Heirloom Project

https://heirloom.sourceforge.net/index.html

like to operate their computers using a traditional Unix command line interface. The Heirloom Project is not a software museum; it does not attempt to preserve utilities unmodifie
The Heirloom Project<META NAME=keywords CONTENT=Linux, Unix, tool, utility, tools, utilities,bc, cal, calendar, chmod, copy, cp, cpio, csplit, deroff, diff, ed, expr, factor, file,

T E X T F I L E S

http://textfiles.com/directory.html

Using Bulletin Boards Computers General Computer-Related Files Conspiracy They're All Out To Get You Drugs An unnecessary amount of Drug information E-Texts The Classics Meet ASCI

What is a Hacker?

http://people.eecs.berkeley.edu/~bh/hacker.html

this have to do with computers? Originally, nothing. But there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't j


Find more...