Router Securityhttps://routersecurity.org/
smartphones, and computers." While you are at it, why not completely disconnect the router from power (thus forcing a cold boot). That said, every coin has two sides. In Janu
Router Security Home Page
Reasons not to use (i.e., be used by) Facebookhttp://stallman.org/facebook.html
phone numbers for "security" but uses them for advertising. How did Mari Sherkin end up on a dating site unwillingly? Facebook opens browser windows showing other companies' sites
Web Content Accessibility Guidelines (WCAG) 2.0https://www.w3.org/TR/WCAG20/
Turing test to tell Computers and Humans Apart" Note 1: CAPTCHA tests often involve asking the user to type in text that is displayed in an obscured image or audio file. Note 2: A
66: The lock-breaking pencil | Lateral with Tom Scotthttps://lateralcast.com/episodes/66/
they don't have many computers? Adam: Yeah, what did the software company want you to do as part of their promotion for $1,000? Something that no one would do. Vanessa: Give up yo
Adam Ragusea, Vanessa Hill and Stuart Ashen face questions about stationery stories, secret shapes and sporting sites.
Douglas W. Joneshttp://homepage.divms.uiowa.edu/~dwjones/
2018 Research Areas Computers in Voting and Elections (including ACCURATE) Stepping Motors Raspberry Pi Arithmetic Tutorials Simulation and pending-event-set algorithms Compressio
Home page, Douglas W. Jones, Computer Science, University of Iowa
Linux Enterprise Computinghttp://linas.org/linux/index.shtml
on large networks of computers. The venerable RCS, CVS and rdist systems can do a fraction of these tasks, but there are other tools as well, often better suited to particular tas
A survey of Linux software useful in a corporate, commercial, enterprise setting. Reviews SQL databases and related tools, project management tools, data availability a
Stuck in the 2000's Bloghttps://stuckinthe2000s.neocities.org/
certain features, new security updates, support from various newer programs, etc. Unfortunately, despite my love for Vista it had many flaws and received terrible critical and con
Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Lifehttps://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/
t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,
CK10TUTOR - C-Kermit 10.0 Tutorialhttps://www.kermitproject.org/ckututor.html
of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is
Void * - The website of an old burnouthttps://voidptr.org/
of fun explaining my computers to visitors and talking with others about their machines. Its great to see how many people care about keeping these machines running and not just de
The website of an old burnout
Spacehttps://yarchive.net/space/
[2911 bytes] Analog computers (Henry Spencer) [1476 bytes] Artificial gravity (Theodore W. Hall; Charles R Martin; Henry Spencer) [11034 bytes] ASAT (George Herbert; Henry Spencer
FreeBSD tipshttps://srobb.net/freebsd.html
(Even more expensive computers seem to come with the less expensive 40 pin cable). I am fortunate enough to live in the US where broadband is now common and cheap. If you are on d
Find more...