wiby  
Settings



Router Security

https://routersecurity.org/

smartphones, and computers." While you are at it, why not completely disconnect the router from power (thus forcing a cold boot). That said, every coin has two sides. In Janu
Router Security Home Page

Reasons not to use (i.e., be used by) Facebook

http://stallman.org/facebook.html

phone numbers for "security" but uses them for advertising. How did Mari Sherkin end up on a dating site unwillingly? Facebook opens browser windows showing other companies' sites

Web Content Accessibility Guidelines (WCAG) 2.0

https://www.w3.org/TR/WCAG20/

Turing test to tell Computers and Humans Apart" Note 1: CAPTCHA tests often involve asking the user to type in text that is displayed in an obscured image or audio file. Note 2: A

66: The lock-breaking pencil | Lateral with Tom Scott

https://lateralcast.com/episodes/66/

they don't have many computers? Adam: Yeah, what did the software company want you to do as part of their promotion for $1,000? Something that no one would do. Vanessa: Give up yo
Adam Ragusea, Vanessa Hill and Stuart Ashen face questions about stationery stories, secret shapes and sporting sites.

Douglas W. Jones

http://homepage.divms.uiowa.edu/~dwjones/

2018 Research Areas Computers in Voting and Elections (including ACCURATE) Stepping Motors Raspberry Pi Arithmetic Tutorials Simulation and pending-event-set algorithms Compressio
Home page, Douglas W. Jones, Computer Science, University of Iowa

Linux Enterprise Computing

http://linas.org/linux/index.shtml

on large networks of computers. The venerable RCS, CVS and rdist systems can do a fraction of these tasks, but there are other tools as well, often better suited to particular tas
A survey of Linux software useful in a corporate, commercial, enterprise setting. Reviews SQL databases and related tools, project management tools, data availability a

Stuck in the 2000's Blog

https://stuckinthe2000s.neocities.org/

certain features, new security updates, support from various newer programs, etc. Unfortunately, despite my love for Vista it had many flaws and received terrible critical and con

Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Life

https://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/

t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is

Void * - The website of an old burnout

https://voidptr.org/

of fun explaining my computers to visitors and talking with others about their machines. Its great to see how many people care about keeping these machines running and not just de
The website of an old burnout

Space

https://yarchive.net/space/

[2911 bytes] Analog computers (Henry Spencer) [1476 bytes] Artificial gravity (Theodore W. Hall; Charles R Martin; Henry Spencer) [11034 bytes] ASAT (George Herbert; Henry Spencer

FreeBSD tips

https://srobb.net/freebsd.html

(Even more expensive computers seem to come with the less expensive 40 pin cable). I am fortunate enough to live in the US where broadband is now common and cheap. If you are on d


Find more...