wiby  
Settings



Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional. You best start believing in cyberpunk dystopias, you are in one.

The Value of Gnutella and Freenet

http://www.praxagora.com/andyo/wr/gnutella_freenet_policy.html

shut down all computers within its jurisdiction that run a Gnutella or Freenet site, and could force routing points to filter out packets from Gnutella or Freenet sites outside it

Net.Legends.FAQ (Noticeable Phenomena Of UseNet) Part 1/4

https://www.linux.it/~md/usenet/legends1.html

alt.folklore.computers, and alt.usenet.kooks ... Have Fun! Disclaimer(s): *Since* these are in fact net.*legends*, not much of a real attempt to verify that these people actually

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why

Cocaine Inc

https://www.cocaine.wiki/cokecrime/

feet high, and 15 to 20 computers networked with servers and a small mainframe. The same kind of state-of-the-art setup existed in communications centers at Urrego's ranch in Mede

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2

Windows XP

https://www.lehigh.edu/~skr5/winxpseminar.html

is an Operating System? Computers use an application called an Operating System to coordinate the operations of your computer. The diagram below illustrates that the Operating Sys

Kicks Condor

https://www.kickscondor.com/

the whole are on home computers, that has implications. For me, Beaker DOES pay attention to the original good part: view source. It brings view source to the modern ‘ye-app-web’
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM

The Gopher Manifesto

http://27.org/gopher-manifesto/

news:alt.folklore.computers (knowledgebase) news:soc.culture.internet (history) news:soc.culture.usenet (talk) news:alt.internet.provider (demand support at isp level) news:soc.cu

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

"I Contribute to the Windows Kernel. We Are Slower Than Other Operating Systems. Here Is Why."

http://blog.zorinaq.com/i-contribute-to-the-windows-kernel-we-are-slower-than-other-oper/

about by technology and computers will benefit the business exclusively, with none of their benefits being shared with the employee. If productivity doubles, profit doubles, workl
I was explaining on Hacker News why Windows fell behind Linux in terms of operating system kernel performance and innovation. And out of nowhere an anonymous...

Participation in the information age

https://gotze.dk/phd/it.html

Democracy aided by computers, and in particular, computer networks (e.g., the internet) is the subject of many current debates and discussions locally and globally. There are also


Find more...