Internet Software Patentshttp://philip.greenspun.com/business/internet-software-patents
were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I
qmail: Second most popular MTA on the Internethttp://www.usenix.org.uk/mirrors/qmail/top.html
makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f
ICANN readies to auction off the English languagehttps://www.templetons.com/brad/dns/sell-english.html
a trademark for "Apple Computers" and another for "Apple Records" but none for just "Apple" or "Apple Orchards." Ownership rights are granted in the specific industries but never
Archivehttps://jxself.org/archive.shtml
digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software
Athena's blog - Athena's Sitehttps://www.alm.website/blog/
How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard
UFies.org - Geek News, Links, & Technology On A Daily Basishttps://www.ufies.org/
with my first cat. Computers were boxes with PS/2 connectors on the back, and cellphones aren't really a thing, much less smartphones. So the site stays up. Please feel free to ex
The HTML Hobbyisthttps://www.htmlhobbyist.com/
line, we could then use computers to help us analyze it, make sense of what we are doing, where we individually fit in, and how we can better work together. Tim Berners-Lee, FAQs
Learning HTML to build your website, fanzine, or personal site.
Gang stalking - Kiwipedia, the free encyclopediahttps://gangstalkingworld.neocities.org/
weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
Linux Security Hardening and Other Tweakshttps://vez.mrsk.me/linux-hardening
As the clocks on most computers have a tendency to drift over time, it's a good idea to run some kind of NTP client. There are a variety of options available. The base Arch instal
A collection of kernel and userland settings one can change to improve the security and usability of a Linux system. Targeted at Arch, but should work for other distros too.
Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?http://lolwut.info/misc/permissive-vs-copyleft-responses.html
my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay
Find more...