wiby  
Settings



Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

CuteApps.com - Quality Software, Commercial, Free Downloads: Windows Linux Java MP3 Pocket PC Palm PocketPC PalmOs, Freeware, Shareware, Demo,

http://cuteapps.com/

and Fantasy Cartoons Computers Developing tools Games Holidays Horror Miscellaneous Movies Music Nature People Places Products Religious Schools Sci-Fi Sports TV Valentines day Ve
CuteApps - Quality Freeware, Shareware, Demo, Download, Program, Software, Windows, MP3, Online, Audio, Desktop Enhancements, Games, Home and Education, Internet, Multimedia and De

John Gilmore's home page

http://www.toad.com/gnu/

the First Conference on Computers, Freedom and Privacy. I remained quite active in EFF, and served on its Board of Directors for decades, until a spasm of political correctness du

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

What is this Gemini thing anyway, and why am I excited about it? | Lobsters

https://lobste.rs/s/ivryqt/what_is_this_gemini_thing_anyway_why_am_i

feature set of computers. How can we objectively say that we've got enough functionality? Will it ever be enough? 4 gerikson 5 years ago I think that implementing a stripped down
120 comments

WA8LMF Useful Links Page

http://wa8lmf.net/links/

anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin    Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Quoth the Raven, "Welcome!"

http://linuxmafia.com/

old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System

Debian Disguised Work

http://disguised.work/

really good deals on computers if you know what to look for. Unfortunately Facebook has a large number of users who are from marginalised communities and have no other alternative


Find more...