Windows 98SE Utilitieshttp://dk.toastednet.org/vogons/win98/
Good for slower computers (like p2 and below). Process Explorer - A Task Manager-like utility. I personally just copy it to my windows directory as taskmgr.exe so I can do a ctrl+
Loper OS » Engelbart's Violinhttp://www.loper-os.org/?p=861
designers think of computers systems today. In fact, Engelbart's belief in efficiency over ease-of-use places him in the fringe of computer interaction design today. That’s sad co
Cyber-Rights.net :// Free, Secure & Private Emailhttps://www.cyber-rights.net/anonymizer.htm
of Internet privacy and security solutions for consumers, corporations, organizations and government agencies. The company provides safe and secure Web experiences to millions of
Free Secure and Private Web Based Email From Cyber-Rights.Net - Based on Hushmail Technology
Stuck in the 2000's Bloghttps://stuckinthe2000s.neocities.org/
certain features, new security updates, support from various newer programs, etc. Unfortunately, despite my love for Vista it had many flaws and received terrible critical and con
Installing and Configuring A Windows 98 Networkhttp://networkers.freeservers.com/win98.htm
to ensure that other computers on the network will recognize it. You install the hardware and software that enables your computer to connect to the network, and then you configure
Log on With SSH Keys | LandChad.nethttps://landchad.net/sshkeys/
of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo
Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Lifehttps://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/
t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,
CK10TUTOR - C-Kermit 10.0 Tutorialhttps://www.kermitproject.org/ckututor.html
of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is
Void * - The website of an old burnouthttps://voidptr.org/
of fun explaining my computers to visitors and talking with others about their machines. Its great to see how many people care about keeping these machines running and not just de
The website of an old burnout
The Human Needs are not Infinite and Insatiablehttp://www.dandebat.dk/eng-behov.htm
vacations and computers. Therefore, it is possible for the governments there to achieve far greater growth rates than the western countries can demonstrate. It is relatively easy
As basic needs are satisfied, national-economic growth will slow down
MacPaint.org: Site Newshttp://www.macpaint.org/blog/
potential of personal computers to the general public. At the Apple shareholders meeting where the Mac was introduced, cheers erupted on seeing images drawn with MacPaint. Photosh
MacPaint.org is devoted to the history and current usage of MacPaint software. Historical and contemporary gallery of MacPaint art
PersonalSit.es | Yes we got hot and fresh siteshttps://personalsit.es/
Theoretically Good With Computers theoreticallygoodwithcomputers.com Details Marco Cognetta | Theoretically Good With Computers https://theoreticallygoodwithcomputers.com/ Tags co
Personal sites are sick as hell, so this site was built so we can all discover each other's. This directory of links are by folks that want to share their site with the world.
Find more...