wiby  
Settings



Linux, Bitcoin: When Tech Projects Become "Too Popular..." Don't forget the goal.

https://lukesmith.neocities.org/vids/too_popular

free and open-source hardware. I want open schematics for everything. I want everything. I don’t want to have to worry about, you know, the firmware on the motherboard or your pro

Adaptec RAID cards are junk

http://www.nickh.org/warstories/adaptec.html

and changing cards in computers. Of course, hasn't been an issue for me...well, ever. I like hardware. It's something of a pain, though, as we basically have to rebuild the box fr

Linux

https://www.billdietrich.me/Linux.html

to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

The Early History Of Smalltalk

https://worrydream.com/EarlyHistoryOfSmalltalk/

interactive time-shared computers, graphics screens and pointing devices. Advanced computer languages were invented to simulate complex systems such as oil refineries and semi-int

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Some publications

https://members.loria.fr/PZimmermann/papers/

classical (nonquantum) computers, including, in particular, our most recent computational records for integer factoring and prime-field discrete logarithms. 2021: Three Cousins of

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/terms_and_conditions.html

very few people had computers. It was a UNIX standard an ran on computers that people accessed from serial terminals. SMTP sent messages directly from the senders computer to the
Junk Email Filter - Front End Spam

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

by people and not computers... To aid that idea SAC even instituted the "failSafe"; program. What made it automatic was the program flow of the SAGE computer.... In simple terms t

Apollo Archive

https://jim.rees.org/apollo-archive/

Apollo Page Retrocomputers Apollo Collection Typewritten Software - Retrotechnology Research Laboratory These sites were up at one time but were down last time I checked. Apollo D

Electricmonk.nl weblog

https://www.electricmonk.nl/log/

to replace it, since computers are throwaway devices now. They’ll fail or become obsolete way before the battery ever dies. However, if the battery dies, your computer will
Ferry Boender's blog


Find more...