Tactile Keyboard FAQhttp://catb.org/~esr/faqs/tactile-keyboard-faq.html
shipped with most computers are not tactile. Until the mid-1990s they used to be; then computer manufacturers discovered that it was possible to manufacture keyboards much more ch
Download latest stable Chromium binaries (64-bit and 32-bit)https://chromium.woolyss.com/
Do you know in all computers (excepted RISC-V and Libreboot ) there is an exploit-friendly firmware that user has no access? Ex: in Intel processors , in AMD processors , in Raspb
Download latest stable Chromium binaries for Windows, Mac, Linux, BSD and Android (64-bit and 32-bit)
Apple ][ pagehttp://www.textfiles.com/history/EVILEXIDY/
play on their Apple ][ computers, this was a day both my brother and I would look forward to every week. Aside from playing games at the Arcade and Pong at home, the Apple ][ open
[stw]http://webarchive.me/geocities/SiliconValley/Circuit/1924/
twenty five Apple II computers. I learned basic and logo and I played loderunner a lot. A few years later, my mom came home from her new job and told me that she made a deal wth h
The best underground hackintosh software around.
The Edinburgh Multi Access Systemhttp://www.bobeager.uk/emas/
Humour Projects Hacks Computers I have used Messages from the Future Famous People Software A University On The Move Installing a jitsi server Installing a framadate server The Ed
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
YOU are the Dead Internet.https://lukesmith.neocities.org/vids/dead_net
unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co
Dan Connolly's Index of Eventshttps://www.w3.org/People/Connolly/events/
Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto
Fourmilog: None Dare Call It Reasonhttps://www.fourmilab.ch/fourmilog/
Before electronic computers had actually been built, Alan Turing mathematically proved a fundamental and profound property of them which has been exploited in innumerable ways as
The glider: an Appropriate Hacker Emblemhttp://www.catb.org/~esr/hacker-emblem/
into other peoples' computers, those of us the emblem was invented for do not want you displaying it. Go invent your own emblem, cracker. We'll find some way to shame and reject y
Because common signifiers are useful
The Code of the Geeks v3.1 Generatorhttp://www.joereiss.net/geek/geek.html
business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c
Machine Learning, the UBI System, and Media Incest | Joybukehttps://joybuke.neocities.org/articles/machine-learning-the-ubi-system-and-media-incest/
If people owned their computers and their systems properly, directly publishing content to a network without any overlord filtering or sorting it for them, none of these problems
If any article I write is going to be worth skipping, this will be the one. Reason why: this will about a contemporary, developing topic. Most people who talk about anything of val
Find more...