wiby  
Settings



GPS Archives | Slashgeo

https://www.slashgeo.org/tag/gps.html

since I'll be away from computers (and even without electricity!) for a few weeks. From the open source / open data front: With open source software, you can get Super Sharp&

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

How to Spot a Psychopath

http://www.howtospotapsychopath.com/feed/

on sub-$10,000 computers, et cetera. 3: Zillions of cheaters ruining the game for everyone else. 4: Zillions of griefers ruining the game for everyone else. 5: Zillions of foul-mo

Stroustrup: FAQ

https://www.stroustrup.com/bs_faq.html

and the best uses of computers are outside traditional computer science. See also my C++ style and techniques FAQ . Real novices facing their first "read some data, do something t

FreeBSD 4.3 Release Notes | The FreeBSD Project

https://www.freebsd.org/releases/4.3R/notes/

the HOT1 from Virtual Computers (www.vcc.com) Support for Dave Mills experimental Loran-C receiver. Lucent Technologies WaveLAN/IEEE 802.11 PCMCIA and ISA standard speed (2Mbps) a
FreeBSD is an operating system used to power modern servers, desktops, and embedded platforms.

Hackman's Realm

http://webarchive.me/geocities/SiliconValley/2072/

things to do with computers that I was ever interested in. Thus, I don't have a whole lot left to write about. Enjoy the site, folks, and I'm still open to your feedback, so if yo

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

by people and not computers... To aid that idea SAC even instituted the "failSafe"; program. What made it automatic was the program flow of the SAGE computer.... In simple terms t

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases

Nintendo 64 Architecture | A Practical Analysis

https://classic.copetti.org/writings/consoles/nintendo-64/

for Windows-based computers as well [41] . Furthermore, there were third-party tools such as custom cartridges housing a long ribbon cable that connected to the workstation. These
An in-depth analysis that explains how this console works internally

Woolyss - Chipmusic > Discovery

https://woolyss.com/chipmusic.php

for creating music on computers. In short, it is the sound of the first demos and video games. Screenshot of 'Big Chuj' demo by Hooy-program , on ZX Spectrum Historically, the chi
Free resource for chipmusic, chiptune, 8-bit music, lo-fi music, micromusic, tracking music. Videos, online old-school retro flash games

Anthropomorphization

http://catb.org/jargon/html/anthropomorphization.html

capacity from computers. Hackers tend to take this a step further and argue that the difference between a substrate of CHON atoms and water and a substrate of silicon and metal is

B&TW Intro: Mal-ware

http://www.spywarewarrior.com/uiuc/btw/ps-intro/btw-intro1.htm

what they do with their computers. As I've said before: " Dumb users trump smart software every day of the week. " Viruses & Worms The first thing we need to do is i


Find more...