wiby  
Settings



Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

On Hacking - Richard Stallman

http://stallman.org/articles/on-hacking.html

from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o

How to start with CP/M

http://www.retrotechnology.com/dri/howto_cpm.html

CP/M-68K on 68000 based computers.) 8080/8085/Z80 computers of the 1970's and 80's can be found; check this part of my document about old and new CP/M computers. A popular option

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

ICIWorld Seminars for the World

http://www.iciworld.com/seminars.shtml

Technology, and Computers and Software.  It will benefit you, your clients , and your prospects. Stay on the cutting edge!  Seminar Arrangements ICIWorld will have avail

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Linux Room

http://shittyweb.org/linux-room.xhtml

different things. Computers are machines for us to play around with and use how we see fit yet the only thing the big tech companies want to do it lock everything up and it disgus

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/how_it_works.html

spam bots or hacked computers. This allows admins to be alerted early and take action to shut down spam at the source. We feel that the best way to block spam is to eliminate the
Junk Email Filter - Front End Spam

So-called modern web developers are the culprits

https://unixdigest.com/articles/so-called-modern-web-developers-are-the-culprits.html

demands on users computers, you're responsible . The impact your product is having on the environment, you're responsible . The impact your project is having on people with disabi


Find more...