wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

"Exploiting Developer Infrastructure Is Ridiculously Easy (The open-source ecosystem is broken)" Cleaning or optimizing the Windows registry . Don't do it. This is a big gamble, y
Best practices and information about computer and smartphone security and privacy

2019: September - December Political Notes - Richard Stallman

http://stallman.org/archives/2019-sep-dec.html

energy, changing the infrastructure is the effective way . For instance, the construction of bicycle lanes (often separated) in Boston and Cambridge may make a big difference in h

Capitalism will die - but will it take us with it?

http://digdeeper.love/articles/capitalism.xhtml

in AI and digital infrastructure, the lack of skills remains the top barrier to unlocking the full potential of digital transformation. What collaborative effort is needed to brid

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

where an entire new infrastructure is required, it is often still 15-30 years. Optical amplifiers took around 20 years from concept to deployment. Combinatorial chemistry, which o

15 reasons not to start using PGP

https://secushare.org/PGP

to undermine the PGP infrastructure on a large scale, but it would not go unnoticed whereas a targeted attack most likely would. You can make the attack slightly more difficult by

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Bank on Open-Source Infrastructure , by Ned Lilly Finding my computer at home from the outside , by Mark Nielsen Learning Perl, part 3 , by Ben Okopnik So You Like Color !!! (The

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

down to who owns the infrastructure, and who decides the "rules" according to which it runs. That's why we can't win this "war" by installing some type of software on our computer


Find more...