Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
"Exploiting Developer Infrastructure Is Ridiculously Easy (The open-source ecosystem is broken)" Cleaning or optimizing the Windows registry . Don't do it. This is a big gamble, y
Best practices and information about computer and smartphone security and privacy
2019: September - December Political Notes - Richard Stallmanhttp://stallman.org/archives/2019-sep-dec.html
energy, changing the infrastructure is the effective way . For instance, the construction of bicycle lanes (often separated) in Boston and Cambridge may make a big difference in h
Capitalism will die - but will it take us with it?http://digdeeper.love/articles/capitalism.xhtml
in AI and digital infrastructure, the lack of skills remains the top barrier to unlocking the full potential of digital transformation. What collaborative effort is needed to brid
https://www-users.cse.umn.edu/~odlyzko/doc/decline.txthttps://www-users.cse.umn.edu/~odlyzko/doc/decline.txt
where an entire new infrastructure is required, it is often still 15-30 years. Optical amplifiers took around 20 years from concept to deployment. Combinatorial chemistry, which o
15 reasons not to start using PGPhttps://secushare.org/PGP
to undermine the PGP infrastructure on a large scale, but it would not go unnoticed whereas a targeted attack most likely would. You can make the attack slightly more difficult by
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Bank on Open-Source Infrastructure , by Ned Lilly Finding my computer at home from the outside , by Mark Nielsen Learning Perl, part 3 , by Ben Okopnik So You Like Color !!! (The
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
down to who owns the infrastructure, and who decides the "rules" according to which it runs. That's why we can't win this "war" by installing some type of software on our computer
Find more...