wiby  
Settings



Linux, Bitcoin: When Tech Projects Become "Too Popular..." Don't forget the goal.

https://lukesmith.neocities.org/vids/too_popular

They like having free software, but they don’t really take it to its logical conclusion. They’re happy to be, you know, there’s that expression, “don’t let perfect be the enemy of

Linux

https://www.billdietrich.me/Linux.html

to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths

25 Years of Linux — so far [LWN.net]

https://lwn.net/Articles/698042/

in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]

Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp

fpgacpu.org - FPGA CPU News

http://www.fpgacpu.org/

of an afficianado of computers ... If you're looking for tips on how to break into someone else's computer, you won't find them here." -- Preface Sunday, November 10, 2002 The old

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Apollo Archive

https://jim.rees.org/apollo-archive/

Apollo Page Retrocomputers Apollo Collection Typewritten Software - Retrotechnology Research Laboratory These sites were up at one time but were down last time I checked. Apollo D

Fourmilog: None Dare Call It Reason: September 2018 Archives

https://www.fourmilab.ch/fourmilog/archives/Monthly/2018/2018-09.html

the powerful AI-capable computers needed to run them. Millions of minds went dark, and humanity lost some of its most brilliant thinkers, but Safety. As this novel begins, the pro

Rants

http://toastytech.com/evil/rants.html

out. Remember, modern computers use YOU. I reeeeeeally need to get around to testing some new Linux distros. 2/6/19 Microsoft is really trying to get retards to switch to Office 3

Can you trust your computer?

http://www.gpascal.com/trust.htm

Most people think their computers should obey them, not obey someone else. With a plan they call "trusted computing," large media corporations (including the movie companies and r


Find more...