Basic Information about MUDs and MUDdinghttp://www.lysator.liu.se/mud/faq/faq1.html
as many as there are computers that run them. The Tiny- and Teeny- family of MUDs are usually more 'social' in orientation; the players on those MUDs gather, chat, meet friends, m
Infrequently Notedhttps://infrequently.org/
on our most personal computers. In an era when they still claimed to be changing the world for the better, the lies told to justify an invasive, unsafe ecosystem of native apps we
Alex Russell on browsers, standards, and the process of progress.
Market Ticker Frequently Asked Questionshttp://tickerforum.org/faq.html
(e.g. how many unique computers access the forum) and, if you are signed in, can be correlated with your login ID. Note that if you browse through the various areas on the system
Tickerforum Frequently Asked Questions
Privacy Tips || LurkBeforePosthttp://lurkbeforepost.win/tutorials/privacy/
web is just a bunch of computers using each other to get and deliver data. When you connected to this page, you asked a DNS server what computer had the website " lurkbeforepost.w
Character Model for the World Wide Web 1.0https://www.w3.org/TR/2001/WD-charmod-20010928/
To be of any use in computers, in computer communications and in particular on the World Wide Web, characters must be encoded . In fact, much of the information processed by compu
Stamp an Apple Logo on Anything and People Will Buy Ithttps://lukesmith.neocities.org/apple
or Gateway, but Apple computers are meant to be noticed. It's strange if not ironic that a lot of the momentum towards people switching to Macs was based on an an ambiguous anti-c
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
Twubblesome Twelvehttps://gosper.org/bill.html
Invited speaker, MIT Computers in Mathematics Conference. *1989 Color cover illustration, 1989-1990 Publications catalog of Math. Assoc. of America. *1989 Several mentions in Mart
Digital Vegan Bookhttps://digitalvegan.net/
by over-reliance on computers and misuse of digital communications tools. A metaphor of digital diet is used to explore more minimal and mindful use. Digital Vegan implores us to
Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?http://lolwut.info/misc/permissive-vs-copyleft-responses.html
my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay
Attrition Security Rant: Anti-Virus Companies: Tenacious Spammershttps://attrition.org/security/rant/av-spammers.html
thanks transtec Computers for their support This is where I learn that I mailed a user that doesn't exist on the remote system. They are also kind enough to actually attach a copy
The Command Line In 2004https://garote.bdmonkeys.net/commandline/
of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High
Find more...