wiby  
Settings



Julia Evans

https://jvns.ca/

You can be a kernel hacker! Mar 2014 Recovering files using /proc (and spying, too!) Jan 2014 ★ 4 paths to being a kernel hacker Recurse Center 2020 Feb 2021 Day 57: Trying to set
Julia Evans

Z80Stealth Homepage

http://z80stealth.emuunlim.com/

Big thanx goes to Hacker KAY for MODplayer.  - New   : Scorpion ProfROM emulation.Support for 128K ,256K and 512K ProfROM .    new switch in cfg :  &

Windows 7 System Tutorial

https://www.windows10windows7.com/w7/

yuan? My computer back hacker has full control over using Remote Desktop Connection to try to connect to other computers and then I am forced to modify the registry to retake it T

Hackman's Realm

https://lateblt.tripod.com/

kiddie who becomes a hacker. #computers IRC Chat Log Are-creation of a chat I had on IRC... Check this out and see how I kickedsome op's butt, and got kicked for it. =) Firsts in

Kashpureff Press Page

https://kashpureff.org/press/

New York City Hackers Stig-Lennart Sorenson Smurf Visualization 01/04/05 DNS and BIND, 4th Edition Paul Abitz and Cricket Liu O'Reily Publishing 00/12/01 Mission Impossible Chip B

[microformats-discuss] Re: Educationg Others

http://microformats.org/discuss/mail/microformats-discuss/2005-October/001178.html

Weenie, and Dilettante HackerProbe-Hacker blog: http://www.opendarwin.org/~drernie/ Previous message: [microformats-discuss] Re: Educationg Others Next message: [microformats-disc

Projects using the Teensy USB development board

https://www.pjrc.com/teensy/projects.html

energy. Hack Rock City (hackerspace) Honey Bee Counter Website YouTube Video 22 pairs of infrared reflection sensors detect each bee's entry or exit. Tom Keyboard Redneckifier Pho

Eyes Above The Waves

https://robert.ocallahan.org/

Repatriate Kiwi. Hacker. Archive 2025 December Taiwan November Pouakai Circuit 2025 AI And Jesus In Late 2025: A Road Trip Report October Some Thoughts About Money From A Christia

The Ultimate MSX FAQ - Main

http://www.faq.msxnet.org/

during last 7 years. - HACKER GROG (from here on, the names are added by Manuel Bilderbeek...) The Red Devil himself, for starting this FAQ! Bastiaan Hubers , for info on some fil
Everything one would ever like to know about the MSX computers

OS and JEDGAR

http://catb.org/jargon/html/os-and-jedgar.html

Prev   Appendix A. Hacker Folklore   Next OS and JEDGAR This story says a lot about the ITS ethos. On the ITS system there was a program that allowed you to see what wasbeing prin

a register vm for guile — wingolog

http://wingolog.org/archives/2013/11/26/a-register-vm-for-guile

javascript Greetings, hacker comrades! Tonight's epistle is gnarly nargery of the best kind. See, we just landed a new virtual machine, compiler, linker, loader, assembler, and de

Epistemological Pluralism and the Revaluation of the Concrete

http://papert.org/articles/EpistemologicalPluralism.html

belonged to male hackers who took the machines and made "a world apart"), and their experiences in it only served to make matters worse. 7 Although imaginative and carefully desig


Find more...