Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Juergen Schmidhuber's AI Bloghttps://people.idsia.ch/~juergen/blog.html
of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'
Big History - a journey through time, space, evolution, and historyhttp://malankazlev.com/bighistory/
the widespread use of computers, the internet, and mobile technology leading to new ways of communicating, conducting business, and accessing information. The biotech revolution S
An overview of the history of the universe, from the Big Bang to the present day and beyond, showing the relation between the cosmos, life, and history, and deep time, historical t
Vintage Computing and Gaming | The Retrogaming and Retrocomputing Blogazinehttp://www.vintagecomputing.com/
embrace and integrate computers into their lives, changing the way we live, work, and play forever. So it will be important in the future to be able to look back and see how we go
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.
Wayne Pollock's Home Pagehttp://wpollock.com/
Intro to Computers & Tech. ( CGS 1000-48040) Intro to Computers & Tech. ( CGS 1000-48076) Why is orientation required? From HCC Absence Study ( PDF ) My Weekly Schedule fo
Wayne Pollock homepage
Accidentally Turing-Completehttp://beza1e1.tuxen.de/articles/accidentally_turing_complete.html
the complexity of the computers people build in Minecraft is impressive. Dwarf Fortress In a similar vein, the infamous Dwarf Fortress game provides various ways to build logical
A list of things that were not supposed to be Turing-complete, but are.
Startseite - BeniBela onlinehttps://www.benibela.de/
slow and even if modern computers are fast enough that it usually does not matter, you sometimes have/want to make something as fast as possible. Nil aware: yes, if it works if st
BeniBela online ist eine Seite über die Programmierung mit Delphi, und eine Downloadseite für Tools und Spiele.
Using the MM email client in the Modern Worldhttps://kermitproject.org/mm/
email even on Unix computers that no longer support mailspool delivery by using secure POP3 (Post Office Protocol) to fetch your new mail; you can send and receive mail in ISO 885
simonsafar.comhttps://simonsafar.com/
site! It's mostly about computers, but there is some other things here, too. If you're really not into computers, you might still be interested in maps , uses of willpower , actua
TRX-Manager - What's new ?http://www.trx-manager.com/whatsnew.htm
Telnet (pse update both computers). . V 4.7.4 Monitoring: Tuning by digit possible using the mouse wheel 4m band added (log and spots filter) Remote control: Terminal shows the ba
Registered User Area
Child Sexual Abuse Epidemic!https://jesus-is-savior.com/Evils%20in%20America/Porno/abuse.htm
“some 400 videotapes … computers, discs, photographs and other material … images of children as young as two have been found.” The same report claimed “a massive vice probe into k
Child Sexual Abuse Epidemic!
Technology Usagehttps://dukenukemis.cool/technology-usage/
activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.
Find more...