wiby  
Settings



[stw]

http://webarchive.me/geocities/SiliconValley/Circuit/1924/

twenty five Apple II computers. I learned basic and logo and I played loderunner a lot. A few years later, my mom came home from her new job and told me that she made a deal wth h
The best underground hackintosh software around.

The Edinburgh Multi Access System

http://www.bobeager.uk/emas/

Humour Projects Hacks Computers I have used Messages from the Future Famous People Software A University On The Move Installing a jitsi server Installing a framadate server The Ed

Building software for yourself with Linus Lee (Changelog Interviews #455)

https://changelog.com/podcast/455

is so small, and the computers these days are just so fast that you can kind of store things in normal files. All of Monocle’s search data lives inside a big 50-megabyte JSON. It’
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L

YOU are the Dead Internet.

https://lukesmith.neocities.org/vids/dead_net

unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co

Wrongthink/posts/robots-will-not-serve-you/

https://wrongthink.link/posts/robots-will-not-serve-you/

So just as with computers today, if you want a robot that is going to respect you, you’re going to have to DIY . There are some excellent books on personal robot hacking suc

Dan Connolly's Index of Events

https://www.w3.org/People/Connolly/events/

Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto

Fourmilog: None Dare Call It Reason

https://www.fourmilab.ch/fourmilog/

Before electronic computers had actually been built, Alan Turing mathematically proved a fundamental and profound property of them which has been exploited in innumerable ways as

Davis Remmel's Home Page

https://www.davisr.me/

without controlling the computers that control us. I've supported Bernie Sanders and Howie Hawkins ; please vote with me to elect people like them and put honest representatives i

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2008/

be a few large powerful computers with lots of terminals is a perennial, and goes in cycles. In the past it has foundered on the rocks of Moore's law - it turned out to be cheaper

Cool Links! – Qalle’s home page

https://qalle.neocities.org/links

Cellar – retrocomputers Dhole Moments – cryptography, furries eevee's Fuzzy Notepad – game development, furries, etc. Hackaday – hardware hacks every day h

The glider: an Appropriate Hacker Emblem

http://www.catb.org/~esr/hacker-emblem/

into other peoples' computers, those of us the emblem was invented for do not want you displaying it. Go invent your own emblem, cracker. We'll find some way to shame and reject y
Because common signifiers are useful

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c


Find more...