Cryptography and Liberty 2000https://archive.epic.org/reports/crypto2000.html/
into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases
Web Surfinghttp://web.cs.wpi.edu/~jshutt/surfing.html
Interacting with Computers , 2016) (26-Apr-19; 07-Jan-21) The Craft of Text Editing --or-- Emacs for the Modern World (Craig A. Finseth, 1999) (24-Jul-19; 11-Jan-21) Evil Mode: Or
A plea against Micro$ofthttp://www.madore.org/~david/computers/antims.html
.ens.fr:8080/home/madore/computers/antims.html Anyone may distribute edited or modified versions of this document provided that the modifications are clearly marked as such and tha
A plea against Micro$oft by David Madore lang=en
Loper OS » Engelbart's Violinhttp://www.loper-os.org/?p=861
designers think of computers systems today. In fact, Engelbart's belief in efficiency over ease-of-use places him in the fringe of computer interaction design today. That’s sad co
Blog - Bradley Kühn ( bkuhn )https://ebb.org/bkuhn/blog/
therefore, they are . Computers aren't . Software isn't . When we who are succumb to the capitalist chicanery and erroneously project being unto these systems, we take our first s
66: The lock-breaking pencil | Lateral with Tom Scotthttps://lateralcast.com/episodes/66/
they don't have many computers? Adam: Yeah, what did the software company want you to do as part of their promotion for $1,000? Something that no one would do. Vanessa: Give up yo
Adam Ragusea, Vanessa Hill and Stuart Ashen face questions about stationery stories, secret shapes and sporting sites.
Los Angeles Future Salon - Overviewhttps://www.accelerationwatch.com/reading_group.html
in coming decades. Computers are the central and enabling force behind all other current revolutions in the human sphere, in communications, in miniaturization, in biotechnology a
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random
Letter to ARRL - Restructing of Ham Radio Licensinghttps://www.wm7d.net/az_proj/az_html/arrl_restructuring.html
injection and in-car computers, students who have to learn more each year to be competitive for jobs and companies which have to produce better products each year, hams are doing
A Third Party That Knows How to Partyhttp://www.halexandria.org/dward553.htm
The efficient use of computers, distant education , and some genuine innovations -- even those that fly in the face of unions or purists -- might well allow for a far better educa
SmartFilter - I've Got A Little Listhttp://sethf.com/anticensorware/smartfilter/gotalist.php
mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study
Quote Anthologyhttps://quotes.pouyakary.org/
to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people
Find more...