wiby  
Settings



The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2001/

now bristling with computers, updated the hub to Robert's 10/100 switch. Located an atk chaining bug. Plugged onwards with the merge to libbonoboui, hmm. Bed, seeing J' at the cra

UNATLe: United Nations AntiTerrorism Leauge

http://www.unatle.net/NuclearWar.html

And Not Omniscient Computers Giving Us Infinite Hit Points Relative To You And IQ Regulated{Based On Computer Quantity} Hit Points Relative To Other Cute Little Lerypoooss Only Ra
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!

action guided by humility

http://communism.org/community/BenSeattle/2019/Proyect-FALC-Roche.htm

connected a total of 6 computers, each located at a different university campus. The current situation (ie: where what posts we see, and who can see what we post -- are controlled

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

Pipedot

https://pipedot.org/

a pile of brand-new computers to six Office Depot locations around Portland, Ore. Technicians at four shops claimed the PCs showed "symptoms of malware," and offered to sell repai

WA8LMF Useful Links Page

http://wa8lmf.net/links/

anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin    Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Order Without the State: Theory, Evidence, and the Possible Future Of

http://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm

fool people or their computers, but one cannot get a bullet through a T-1 line. It is in that sense a world of entirely voluntary interaction. In order to use force against an onl

Orgy of the Will: A Philosophy of the Future

http://orgyofthewill.net/

require thousand-dollar computers to run, you can certainly afford five dollars per month to spend on quality reading material, and merely the daily running commentary and discuss

Blogroll

https://flamedfury.com/blogroll/

Cheapskates Guide to Computers and the Internet | Essays about the otherside of the Internet with a focus on low cost computing. Manuel Moreale | Blogs about tech, the web and dis
Personal websites and cool sites that I follow and recommend.

Why? - 10kB Gallery

https://10kb.neocities.org/about/why

times were simple. Computers were owned by the rich and the nerdy — the programs created by the select few who had the privilege and the time to spend on the magic box that we cal


Find more...