wiby  
Settings



Windows 98SE Utilities

http://dk.toastednet.org/vogons/win98/

Good for slower computers (like p2 and below). Process Explorer - A Task Manager-like utility. I personally just copy it to my windows directory as taskmgr.exe so I can do a ctrl+

Loper OS » Engelbart's Violin

http://www.loper-os.org/?p=861

designers think of computers systems today. In fact, Engelbart's belief in efficiency over ease-of-use places him in the fringe of computer interaction design today. That’s sad co

Cyber-Rights.net :// Free, Secure & Private Email

https://www.cyber-rights.net/anonymizer.htm

of Internet privacy and security solutions for consumers, corporations, organizations and government agencies. The company provides safe and secure Web experiences to millions of
Free Secure and Private Web Based Email From Cyber-Rights.Net - Based on Hushmail Technology

Stuck in the 2000's Blog

https://stuckinthe2000s.neocities.org/

certain features, new security updates, support from various newer programs, etc. Unfortunately, despite my love for Vista it had many flaws and received terrible critical and con

Installing and Configuring A Windows 98 Network

http://networkers.freeservers.com/win98.htm

to ensure that other computers on the network will recognize it. You install the hardware and software that enables your computer to connect to the network, and then you configure

Log on With SSH Keys | LandChad.net

https://landchad.net/sshkeys/

of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo

Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Life

https://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/

t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is

Void * - The website of an old burnout

https://voidptr.org/

of fun explaining my computers to visitors and talking with others about their machines. Its great to see how many people care about keeping these machines running and not just de
The website of an old burnout

The Human Needs are not Infinite and Insatiable

http://www.dandebat.dk/eng-behov.htm

vacations and computers. Therefore, it is possible for the governments there to achieve far greater growth rates than the western countries can demonstrate. It is relatively easy
As basic needs are satisfied, national-economic growth will slow down

MacPaint.org: Site News

http://www.macpaint.org/blog/

potential of personal computers to the general public. At the Apple shareholders meeting where the Mac was introduced, cheers erupted on seeing images drawn with MacPaint. Photosh
MacPaint.org is devoted to the history and current usage of MacPaint software. Historical and contemporary gallery of MacPaint art

PersonalSit.es | Yes we got hot and fresh sites

https://personalsit.es/

Theoretically Good With Computers theoreticallygoodwithcomputers.com Details Marco Cognetta | Theoretically Good With Computers https://theoreticallygoodwithcomputers.com/ Tags co
Personal sites are sick as hell, so this site was built so we can all discover each other's. This directory of links are by folks that want to share their site with the world.


Find more...