wiby  
Settings



Tactile Keyboard FAQ

http://catb.org/~esr/faqs/tactile-keyboard-faq.html

shipped with most computers are not tactile. Until the mid-1990s they used to be; then computer manufacturers discovered that it was possible to manufacture keyboards much more ch

Download latest stable Chromium binaries (64-bit and 32-bit)

https://chromium.woolyss.com/

Do you know in all computers (excepted RISC-V and Libreboot ) there is an exploit-friendly firmware that user has no access? Ex: in Intel processors , in AMD processors , in Raspb
Download latest stable Chromium binaries for Windows, Mac, Linux, BSD and Android (64-bit and 32-bit)

Apple ][ page

http://www.textfiles.com/history/EVILEXIDY/

play on their Apple ][ computers, this was a day both my brother and I would look forward to every week. Aside from playing games at the Arcade and Pong at home, the Apple ][ open

[stw]

http://webarchive.me/geocities/SiliconValley/Circuit/1924/

twenty five Apple II computers. I learned basic and logo and I played loderunner a lot. A few years later, my mom came home from her new job and told me that she made a deal wth h
The best underground hackintosh software around.

The Edinburgh Multi Access System

http://www.bobeager.uk/emas/

Humour Projects Hacks Computers I have used Messages from the Future Famous People Software A University On The Move Installing a jitsi server Installing a framadate server The Ed

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo

YOU are the Dead Internet.

https://lukesmith.neocities.org/vids/dead_net

unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co

Dan Connolly's Index of Events

https://www.w3.org/People/Connolly/events/

Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto

Fourmilog: None Dare Call It Reason

https://www.fourmilab.ch/fourmilog/

Before electronic computers had actually been built, Alan Turing mathematically proved a fundamental and profound property of them which has been exploited in innumerable ways as

The glider: an Appropriate Hacker Emblem

http://www.catb.org/~esr/hacker-emblem/

into other peoples' computers, those of us the emblem was invented for do not want you displaying it. Go invent your own emblem, cracker. We'll find some way to shame and reject y
Because common signifiers are useful

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c

Machine Learning, the UBI System, and Media Incest | Joybuke

https://joybuke.neocities.org/articles/machine-learning-the-ubi-system-and-media-incest/

If people owned their computers and their systems properly, directly publishing content to a network without any overlord filtering or sorting it for them, none of these problems
If any article I write is going to be worth skipping, this will be the one. Reason why: this will about a contemporary, developing topic. Most people who talk about anything of val


Find more...