wiby  
Settings



security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

millions of infected computers connecting to them, and counting the increasing number of Mac machines. Can you say "this was a religious debate?" Well, I can, which is why the res

Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software

Henk in Canada

https://home.hccnet.nl/r.helderman/enhenk.htm

verkopen ze laptop computers. Het resultaat, een Acer Travelmate 732TXV besteld. Gaaf ding met alles erop en eraan. In Calgary is natuurlijk van alles te beleven en te zien maar v

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

My impressions

http://galexander.org/laptops/mac/impressions.html

In the PC world, the computers feel shallow because I understand a little bit of almost every layer. I am familiar with the hardware from a user perspective and also (somewhat) an

A provably strong password you can remember

http://www.cambridgeclarion.org/pw.html

Goliath of modern super computers. The story, with its doubling on each square, is also apt for the modern age of digital computers that work with “bits” or binary digits. If you

How to Block Forced Updates

https://backlit.neocities.org/how-to-block-forced-updates

all attacks on domestic computers - including forced updates - are triggered from within the computer itself, and rely on outbound network calls, not inbound . Nearly. All. If you

Email Privacy - PGP Made Easy: How to Keep Your Emails Private

http://www.cyberwolfman.com/emailprv.htm

are doing on company computers, to see everything that they see on the monitor, as well as using keystroke recorders (AKA key loggers or key catchers), so you may want to be caref
Tells you an extremely easy way to keep your emails private for free.

Modern Job Searching

http://toastytech.com/about/jobsearch.html

sold Altair personal computers. Not so much of that here today. It is all in China or India now. -Job Listings- 10 FIND JOB LISTING 20 SEND RESUME 30 GOTO 10 Most job listings are

NLnet; Interview With Simon Descarpentries from Meta-Press.es

https://nlnet.nl/news/2023/20231012-meta-press.html

one side and plenty of computers on the other. And that is how the internet works. No central point that we all have to cross. The more people use Meta-Press the better it will wo

Intro: Why this Web Site

http://www.spywarewarrior.com/uiuc/intro.htm

safely using desktop computers both at home and in the workplace. We will learn and write about such things as banner ads, cookies, web bugs, data encryption, 'spyware,' viruses a

Blog Posts

https://www.jefftk.com/p/

of Running People on Computers May 14, 2013 Keeping Choices Donation Neutral May 11, 2013 Milk Mixing Machine May 10, 2013 The Economics of Producing Your Own CD May 09, 2013 Vege


Find more...