Linux, Bitcoin: When Tech Projects Become "Too Popular..." Don't forget the goal.https://lukesmith.neocities.org/vids/too_popular
free and open-source hardware. I want open schematics for everything. I want everything. I don’t want to have to worry about, you know, the firmware on the motherboard or your pro
Adaptec RAID cards are junkhttp://www.nickh.org/warstories/adaptec.html
and changing cards in computers. Of course, hasn't been an issue for me...well, ever. I like hardware. It's something of a pain, though, as we basically have to rebuild the box fr
Linuxhttps://www.billdietrich.me/Linux.html
to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
The unix programming environmenthttp://www.talisman.org/unix/burgess-guide.html
well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres
The Early History Of Smalltalkhttps://worrydream.com/EarlyHistoryOfSmalltalk/
interactive time-shared computers, graphics screens and pointing devices. Advanced computer languages were invented to simulate complex systems such as oil refineries and semi-int
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
Some publicationshttps://members.loria.fr/PZimmermann/papers/
classical (nonquantum) computers, including, in particular, our most recent computational records for integer factoring and prime-field discrete logarithms. 2021: Three Cousins of
Junk Email Filter Spam Blocking Servicehttp://www.junkemailfilter.com/spam/terms_and_conditions.html
very few people had computers. It was a UNIX standard an ran on computers that people accessed from serial terminals. SMTP sent messages directly from the senders computer to the
Junk Email Filter - Front End Spam
IBM SAGEhttps://ed-thelen.org/comp-hist/vs-ibm-sage.html
by people and not computers... To aid that idea SAC even instituted the "failSafe"; program. What made it automatic was the program flow of the SAGE computer.... In simple terms t
Apollo Archivehttps://jim.rees.org/apollo-archive/
Apollo Page Retrocomputers Apollo Collection Typewritten Software - Retrotechnology Research Laboratory These sites were up at one time but were down last time I checked. Apollo D
Electricmonk.nl webloghttps://www.electricmonk.nl/log/
to replace it, since computers are throwaway devices now. They’ll fail or become obsolete way before the battery ever dies. However, if the battery dies, your computer will
Ferry Boender's blog
Find more...