Internet Software Patentshttp://philip.greenspun.com/business/internet-software-patents
were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I
Doom as an Interface for Process Managementhttps://www.cs.unm.edu/~dlchao/flake/doom/chi/chi.html
our relationship with computers. The application relies on a computer game vernacular rather than the simulations of physical reality found in typical navigable virtual environmen
Doom as an Interface for Process Management
Fight the System? or Exit the System?https://lukesmith.neocities.org/vids/fight_or_exit
out there can use computers from 2010 just fine but are drawn into wasting money). +2 @LukeSmithxyz - 2025-05-20 13:44:12 Wait, did that actually happen? Varg wasn't who I was tal
System Administration Bits of Knowledgehttp://www.toad.com/gnu/sysadmin/
my computer despite it. Computers are very programmable and one of the joys of free software is that if you don't like what the software does, you can change it yourself. I didn't
Voyager Spacecraft and Fortran 5http://www.geonius.com/writing/other/voyager.html
the Voyager onboard computers were not programmed in Fortran. My background: I'm a retired software developer. In the 1980s, I worked on the image processing ground system for NAS
Voyagers NOT programmed in Fortran 5
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
The Dockhttp://koshka.love/links.html
designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
John Regehr's Home Pagehttps://users.cs.utah.edu/~regehr/
Teaching Papers Contact Computers are amazingly fun and useful, but why do they crash and hang? Why are they so terrifyingly insecure? The problem is many-faceted, but an importan
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Find more...