wiby  
Settings



SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

How to Spot a Psychopath

http://www.howtospotapsychopath.com/feed/

on sub-$10,000 computers, et cetera. 3: Zillions of cheaters ruining the game for everyone else. 4: Zillions of griefers ruining the game for everyone else. 5: Zillions of foul-mo

SAGE-  Phoenix Air Defense Sector & 4629 Support Squadron

http://www.smecc.org/sage-__phoenix_air_defense_sector_%26_4629_support_squadron.htm

All of today's modern computers are much smaller and use transistors. The vacuum tubes in the SAGE computer give a "science fiction" effect in their fascinating array of colorful

Invisible LAN Home Page

http://invisiblesoft.com/invlan/index.shtml

running on other computers in the network. Your computer must be running Windows 95/98/Me, but the other computers can be running DOS, Windows 3.X, or Windows 95/98/Me. You'll fin
HomePage for Invisible Software

The Anarchist FAQ - V. What would a stateless society look like?

http://www.anarchistfaq.com/E.html

of the 1970s, computers have promised to be a decentralizing force on the same scale as electrical power a century earlier. The Expansion of the Desktop Revolution and Peer Produc

Memory part 2: CPU caches [LWN.net]

https://lwn.net/Articles/252125/

it does not matter. But computers do not have large main memories for no reason. The working set is bound to be larger than the cache. This is especially true for systems running
The second part of Ulrich Drepper's 'What every programmer should know about memory' document [...]

The Biointelligence Explosion as conceived by ChatGPT

https://www.biointelligence-explosion.com/chatgpt/

DP] Classical computers cannot explore the nature, varieties, causal-functional efficacy and phenomenal binding of consciousness. Why does superintelligence.com argue that full-sp

Documentary: The LoserUsers

http://rmitz.org/bbsloser.html

"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h

Woolyss - Chipmusic > Discovery

https://woolyss.com/chipmusic.php

for creating music on computers. In short, it is the sound of the first demos and video games. Screenshot of 'Big Chuj' demo by Hooy-program , on ZX Spectrum Historically, the chi
Free resource for chipmusic, chiptune, 8-bit music, lo-fi music, micromusic, tracking music. Videos, online old-school retro flash games

Anthropomorphization

http://catb.org/jargon/html/anthropomorphization.html

capacity from computers. Hackers tend to take this a step further and argue that the difference between a substrate of CHON atoms and water and a substrate of silicon and metal is

B&TW Intro: Mal-ware

http://www.spywarewarrior.com/uiuc/btw/ps-intro/btw-intro1.htm

what they do with their computers. As I've said before: " Dumb users trump smart software every day of the week. " Viruses & Worms The first thing we need to do is i


Find more...