wiby  
Settings



Basic Information about MUDs and MUDding

http://www.lysator.liu.se/mud/faq/faq1.html

as many as there are computers that run them. The Tiny- and Teeny- family of MUDs are usually more 'social' in orientation; the players on those MUDs gather, chat, meet friends, m

We Need to Bring Back Webrings | Lobsters

https://lobste.rs/s/foo1n7/we_need_bring_back_webrings

like me miss is that computers and the Internet don't have the same emotional place in the minds of Gen Z. For us, it was the future. Something the previous generation didn't unde
53 comments

Infrequently Noted

https://infrequently.org/

phones — indeed, most computers — are 24+ month old Androids. This is the result of a price segmented market: a preponderance of smartphones sold for more than $600USD (new, unloc
Alex Russell on browsers, standards, and the process of progress.

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

Twubblesome Twelve

https://gosper.org/bill.html

Invited speaker, MIT Computers in Mathematics Conference. *1989 Color cover illustration, 1989-1990 Publications catalog of Math. Assoc. of America. *1989 Several mentions in Mart

Digital Vegan Book

https://digitalvegan.net/

by over-reliance on computers and misuse of digital communications tools. A metaphor of digital diet is used to explore more minimal and mindful use. Digital Vegan implores us to

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases

Computer Stupidities

http://rinkworks.com/stupid/

and Message Boards The Internet The World Wide Web Emergencies Paranoia Viruses Y2K Free Disks Screen Savers Smoke Tech Support Come Again? Amnesia Listen Already! The Bleeding Ob
Humorous anecdotes of users creatively misusing computers.

A Dirge

https://www.ietf.org/rfc/rfc2731.txt

pose no direct risk to computers and networks. People can use these rules to encode metadata that is inaccurate or even deliberately misleading (creating mischief in the form of "
A tutorial and reference manual for Java.

Attrition Security Rant: Anti-Virus Companies: Tenacious Spammers

https://attrition.org/security/rant/av-spammers.html

thanks transtec Computers for their support This is where I learn that I mailed a user that doesn't exist on the remote system. They are also kind enough to actually attach a copy

The Command Line In 2004

https://garote.bdmonkeys.net/commandline/

of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High

Blog - Bradley Kühn ( bkuhn )

https://ebb.org/bkuhn/blog/

therefore, they are . Computers aren't . Software isn't . When we who are succumb to the capitalist chicanery and erroneously project being unto these systems, we take our first s


Find more...