wiby  
Settings



Index of Creative Computing articles

https://www.atarimagazines.com/creative/index/

Supercalc to teach algorithms in mathematics. Programs that understand languages; how they do it - syntax-directed methods. Logo type; graphing functions with Logo. Coconuts of Di

ETOAN

http://www.etoan.com/

containing NSA approved algorithms. Used to protect systems requiring the most stringent protection mechanisms.   Type 1 products contain classified NSA algorithms. Type 2 U.

Wilson Mines Co. links

http://WilsonMinesCo.com/links.html

coprocessors), algorithms, simulators, OSs, programming languages, programmers' info assemblers for individual computer brands   (Acorn/BBC, AIM-65, Apple II & III, Atari, Co

Becoming physically immune to brute-force attacks - Seirdy

https://seirdy.one/posts/2021/01/12/password-strength/

algorithms, so I won’t; this is just a pure and simple brute-force attack given precomputed password entropy, assuming that the cryptography is bulletproof. Obviously, I’m not tak
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.

Vita :: James Lyle Peterson

http://www.jklp.org/profession/vita/vita.html

1, I have developed algorithms for generalizing these classes of memory management algorithms, first to the weighted buddy system and then to more general buddy systems. The gener

My bookmarks - Seirdy

https://seirdy.one/bookmarks/

of tuning optimization algorithms in the opposite direction to create deliberately harmful results, with the prime example being using medical tools to create bioweapons. Scary ye
Links from around the web, curated and annotated by Seirdy.


Find more...