Index of Creative Computing articleshttps://www.atarimagazines.com/creative/index/
Supercalc to teach algorithms in mathematics. Programs that understand languages; how they do it - syntax-directed methods. Logo type; graphing functions with Logo. Coconuts of Di
ETOANhttp://www.etoan.com/
containing NSA approved algorithms. Used to protect systems requiring the most stringent protection mechanisms. Type 1 products contain classified NSA algorithms. Type 2 U.
Wilson Mines Co. linkshttp://WilsonMinesCo.com/links.html
coprocessors), algorithms, simulators, OSs, programming languages, programmers' info assemblers for individual computer brands (Acorn/BBC, AIM-65, Apple II & III, Atari, Co
Becoming physically immune to brute-force attacks - Seirdyhttps://seirdy.one/posts/2021/01/12/password-strength/
algorithms, so I won’t; this is just a pure and simple brute-force attack given precomputed password entropy, assuming that the cryptography is bulletproof. Obviously, I’m not tak
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
Vita :: James Lyle Petersonhttp://www.jklp.org/profession/vita/vita.html
1, I have developed algorithms for generalizing these classes of memory management algorithms, first to the weighted buddy system and then to more general buddy systems. The gener
My bookmarks - Seirdyhttps://seirdy.one/bookmarks/
of tuning optimization algorithms in the opposite direction to create deliberately harmful results, with the prime example being using medical tools to create bioweapons. Scary ye
Links from around the web, curated and annotated by Seirdy.
Find more...