wiby  
Settings



The Richfiles: History Page

http://richfiles.solarbotics.net/History.html

start of my interest in computers (and eventualy Graphing Calculators)!!! * I got a TRS-80 Color Computer 2 when I was 10 years old. Fixed it myself and learned TRS-BASIC (includi

Cyber-Rights.net :// Free, Secure & Private Email

https://www.cyber-rights.net/anonymizer.htm

Outlook IMAP Plugin Internet Privacy Issues: UK Regulations US Carnivore Council of Europe       Anonymizer® Anonymous Surfing™ Anonymizer® Anonymous
Free Secure and Private Web Based Email From Cyber-Rights.Net - Based on Hushmail Technology

Opus's Reviews

http://www.opusgames.com/books/books2.html

the human mind. Human computers exist in the form of Mentats - people trained from birth to function as data processors, who can sort and correlate information like a computer, bu

Reasons not to use (i.e., be used by) Facebook

http://stallman.org/facebook.html

pages. Facebook tracks Internet users that see "like" buttons, even users who never visited facebook.com and never click on those buttons. The ACLU has a way of enabling users to

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is

"THE CODE" OF CARL MUNCK, AND ANCIENT GEMATRIAN NUMBERS - PART ELEVEN

http://www.greatdreams.com/gem11.htm

we use silicon chips in computers. Could it be that ancient information is literally stored in some sort of planetary granite-limestone based "matrix" ? Note that The Miami Circle
Explanation of The Code of Carl Munck and related ancient Gematrian numbers, showing mathematically that the ancient sites around the world are very accurately positioned on a coor

The Dale R. Broadhurst Information Page

http://sidneyrigdon.com/DRB/host03.htm

of networked Macintosh computers. When internet service arrived in that remote part of the Pacific, I already had a hundred such texts prepared, with accompanying graphics -- all

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random

Voting Security

http://www.thelandesreport.com/VotingSecurity.htm

into mainframe election computers in cities across the country. The first election Gates provided the hack for was in 1979, see  http://www.sos.state.oh.us/sos/ElectionsVoter

Submit your ebook to eBooksLibrary / HyperTextCentral

http://www.ebookslibrary.com/ebook_library_000007.htm

Travel Computers and Internet EBooks:Applications and Software Computers and Internet EBooks:CAD Computer Aided Design Computers and Internet EBooks:CASE Computer Aided Software E
eBooksLibrary - ebook, ebooks, e-book, e-books, electronic book, electronic books library, catalog, store and archive. Free download links, purchase price and link, reviews, top 20

Ken Silverman's Official Home Page

http://advsys.net/ken/default.htm

:) Ken's primary computers: 12/??/1983: TI-99/4A ????? 1984: Kaypro II (CP/M 2.2) Late? 1985: HP 9836C Series 200 (98611A Opt.655 BASIC System + 98612A Opt.650 Extended BASIC 2.1)

GitHub Arctic Vault, Code and Memory | Lobsters

https://lobste.rs/s/sxsqrt/github_arctic_vault_code_memory

people actually used computers in our time. If someone accidentally added their command history files, that's even better. About Tags Filter Moderation Log
6 comments


Find more...