Prof. Dr. Guido Salvaneschi | Programming Grouphttps://programming-group.com/members/salvaneschi
IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.
On Hacking - Richard Stallmanhttp://stallman.org/articles/on-hacking.html
from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o
4K Associates : Standards Strategy Consultantshttps://XeNT.com/4K-Associates/Press.html
on close to 10000 computers throughout the Internet. The challenge, called ECC2K-108, was set by Canadian cryptographic company Certicom in 1997 to encourage researchers to test t
The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html
Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based
How to start with CP/Mhttp://www.retrotechnology.com/dri/howto_cpm.html
CP/M-68K on 68000 based computers.) 8080/8085/Z80 computers of the 1970's and 80's can be found; check this part of my document about old and new CP/M computers. A popular option
The unix programming environmenthttp://www.talisman.org/unix/burgess-guide.html
well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres
ICIWorld Seminars for the Worldhttp://www.iciworld.com/seminars.shtml
Technology, and Computers and Software. It will benefit you, your clients , and your prospects. Stay on the cutting edge! Seminar Arrangements ICIWorld will have avail
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
Linux Roomhttp://shittyweb.org/linux-room.xhtml
different things. Computers are machines for us to play around with and use how we see fit yet the only thing the big tech companies want to do it lock everything up and it disgus
History of the WWW Subdomainhttp://shystudios.us/blog/subdomain/history.html
registry for arpanet. Computers would download this list via FTP to get addresses for each host on the network. The hostnames were things like "BRL", "UCB", and "UCLA-CCn". Eventu
The real history of the www subdomain, and why we don't use it
Go beyond work with Linus Lee, Daniela Petruzalek, & Sebastian Spaink (Go Time #212)https://changelog.com/gotime/212
TV programming about computers - computer programs that were coming out in the mid ’80s, early ‘90s - and it’s kind of astonishing how all those programs sort of expect the user t
Our final installment from GopherCon 2021 is an awesome panel conversation led by Natalie & Angelica with guests Linus Lee, Daniela Patruzalek, and Sebastian Spank. All three o
CK10TUTOR - C-Kermit 10.0 Tutorialhttps://www.kermitproject.org/ckututor.html
of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is
Find more...