wiby  
Settings



Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I

qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

ICANN readies to auction off the English language

https://www.templetons.com/brad/dns/sell-english.html

a trademark for "Apple Computers" and another for "Apple Records" but none for just "Apple" or "Apple Orchards." Ownership rights are granted in the specific industries but never

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

UFies.org - Geek News, Links, & Technology On A Daily Basis

https://www.ufies.org/

with my first cat. Computers were boxes with PS/2 connectors on the back, and cellphones aren't really a thing, much less smartphones. So the site stays up. Please feel free to ex

The HTML Hobbyist

https://www.htmlhobbyist.com/

line, we could then use computers to help us analyze it, make sense of what we are doing, where we individually fit in, and how we can better work together. Tim Berners-Lee, FAQs
Learning HTML to build your website, fanzine, or personal site.

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

Linux Security Hardening and Other Tweaks

https://vez.mrsk.me/linux-hardening

As the clocks on most computers have a tendency to drift over time, it's a good idea to run some kind of NTP client. There are a variety of options available. The base Arch instal
A collection of kernel and userland settings one can change to improve the security and usability of a Linux system. Targeted at Arch, but should work for other distros too.

Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?

http://lolwut.info/misc/permissive-vs-copyleft-responses.html

my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay


Find more...