Basic Information about MUDs and MUDdinghttp://www.lysator.liu.se/mud/faq/faq1.html
as many as there are computers that run them. The Tiny- and Teeny- family of MUDs are usually more 'social' in orientation; the players on those MUDs gather, chat, meet friends, m
We Need to Bring Back Webrings | Lobstershttps://lobste.rs/s/foo1n7/we_need_bring_back_webrings
like me miss is that computers and the Internet don't have the same emotional place in the minds of Gen Z. For us, it was the future. Something the previous generation didn't unde
53 comments
Infrequently Notedhttps://infrequently.org/
phones — indeed, most computers — are 24+ month old Androids. This is the result of a price segmented market: a preponderance of smartphones sold for more than $600USD (new, unloc
Alex Russell on browsers, standards, and the process of progress.
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
Twubblesome Twelvehttps://gosper.org/bill.html
Invited speaker, MIT Computers in Mathematics Conference. *1989 Color cover illustration, 1989-1990 Publications catalog of Math. Assoc. of America. *1989 Several mentions in Mart
Digital Vegan Bookhttps://digitalvegan.net/
by over-reliance on computers and misuse of digital communications tools. A metaphor of digital diet is used to explore more minimal and mindful use. Digital Vegan implores us to
Cryptography and Liberty 2000https://archive.epic.org/reports/crypto2000.html/
into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases
Computer Stupiditieshttp://rinkworks.com/stupid/
and Message Boards The Internet The World Wide Web Emergencies Paranoia Viruses Y2K Free Disks Screen Savers Smoke Tech Support Come Again? Amnesia Listen Already! The Bleeding Ob
Humorous anecdotes of users creatively misusing computers.
A Dirgehttps://www.ietf.org/rfc/rfc2731.txt
pose no direct risk to computers and networks. People can use these rules to encode metadata that is inaccurate or even deliberately misleading (creating mischief in the form of "
A tutorial and reference manual for Java.
Attrition Security Rant: Anti-Virus Companies: Tenacious Spammershttps://attrition.org/security/rant/av-spammers.html
thanks transtec Computers for their support This is where I learn that I mailed a user that doesn't exist on the remote system. They are also kind enough to actually attach a copy
The Command Line In 2004https://garote.bdmonkeys.net/commandline/
of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High
Blog - Bradley Kühn ( bkuhn )https://ebb.org/bkuhn/blog/
therefore, they are . Computers aren't . Software isn't . When we who are succumb to the capitalist chicanery and erroneously project being unto these systems, we take our first s
Find more...