[stw]http://webarchive.me/geocities/SiliconValley/Circuit/1924/
twenty five Apple II computers. I learned basic and logo and I played loderunner a lot. A few years later, my mom came home from her new job and told me that she made a deal wth h
The best underground hackintosh software around.
The Edinburgh Multi Access Systemhttp://www.bobeager.uk/emas/
Humour Projects Hacks Computers I have used Messages from the Future Famous People Software A University On The Move Installing a jitsi server Installing a framadate server The Ed
Building software for yourself with Linus Lee (Changelog Interviews #455)https://changelog.com/podcast/455
is so small, and the computers these days are just so fast that you can kind of store things in normal files. All of Monocle’s search data lives inside a big 50-megabyte JSON. It’
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L
YOU are the Dead Internet.https://lukesmith.neocities.org/vids/dead_net
unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co
Wrongthink/posts/robots-will-not-serve-you/https://wrongthink.link/posts/robots-will-not-serve-you/
So just as with computers today, if you want a robot that is going to respect you, you’re going to have to DIY . There are some excellent books on personal robot hacking suc
Dan Connolly's Index of Eventshttps://www.w3.org/People/Connolly/events/
Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto
Fourmilog: None Dare Call It Reasonhttps://www.fourmilab.ch/fourmilog/
Before electronic computers had actually been built, Alan Turing mathematically proved a fundamental and profound property of them which has been exploited in innumerable ways as
Davis Remmel's Home Pagehttps://www.davisr.me/
without controlling the computers that control us. I've supported Bernie Sanders and Howie Hawkins ; please vote with me to elect people like them and put honest representatives i
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2008/
be a few large powerful computers with lots of terminals is a perennial, and goes in cycles. In the past it has foundered on the rocks of Moore's law - it turned out to be cheaper
Cool Links! – Qalle’s home pagehttps://qalle.neocities.org/links
Cellar – retrocomputers Dhole Moments – cryptography, furries eevee's Fuzzy Notepad – game development, furries, etc. Hackaday – hardware hacks every day h
The glider: an Appropriate Hacker Emblemhttp://www.catb.org/~esr/hacker-emblem/
into other peoples' computers, those of us the emblem was invented for do not want you displaying it. Go invent your own emblem, cracker. We'll find some way to shame and reject y
Because common signifiers are useful
The Code of the Geeks v3.1 Generatorhttp://www.joereiss.net/geek/geek.html
business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c
Find more...