wiby  
Settings



Basic Information about MUDs and MUDding

http://www.lysator.liu.se/mud/faq/faq1.html

as many as there are computers that run them. The Tiny- and Teeny- family of MUDs are usually more 'social' in orientation; the players on those MUDs gather, chat, meet friends, m

Infrequently Noted

https://infrequently.org/

on our most personal computers. In an era when they still claimed to be changing the world for the better, the lies told to justify an invasive, unsafe ecosystem of native apps we
Alex Russell on browsers, standards, and the process of progress.

Market Ticker Frequently Asked Questions

http://tickerforum.org/faq.html

(e.g. how many unique computers access the forum) and, if you are signed in, can be correlated with your login ID. Note that if you browse through the various areas on the system
Tickerforum Frequently Asked Questions

Privacy Tips || LurkBeforePost

http://lurkbeforepost.win/tutorials/privacy/

web is just a bunch of computers using each other to get and deliver data. When you connected to this page, you asked a DNS server what computer had the website " lurkbeforepost.w

Character Model for the World Wide Web 1.0

https://www.w3.org/TR/2001/WD-charmod-20010928/

To be of any use in computers, in computer communications and in particular on the World Wide Web, characters must be encoded . In fact, much of the information processed by compu

Stamp an Apple Logo on Anything and People Will Buy It

https://lukesmith.neocities.org/apple

or Gateway, but Apple computers are meant to be noticed. It's strange if not ironic that a lot of the momentum towards people switching to Macs was based on an an ambiguous anti-c

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

Twubblesome Twelve

https://gosper.org/bill.html

Invited speaker, MIT Computers in Mathematics Conference. *1989 Color cover illustration, 1989-1990 Publications catalog of Math. Assoc. of America. *1989 Several mentions in Mart

Digital Vegan Book

https://digitalvegan.net/

by over-reliance on computers and misuse of digital communications tools. A metaphor of digital diet is used to explore more minimal and mindful use. Digital Vegan implores us to

Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?

http://lolwut.info/misc/permissive-vs-copyleft-responses.html

my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay

Attrition Security Rant: Anti-Virus Companies: Tenacious Spammers

https://attrition.org/security/rant/av-spammers.html

thanks transtec Computers for their support This is where I learn that I mailed a user that doesn't exist on the remote system. They are also kind enough to actually attach a copy

The Command Line In 2004

https://garote.bdmonkeys.net/commandline/

of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High


Find more...