Some Thoughts As I Sit Here in Another Standup - Lloyd Atkinsonhttps://www.lloydatkinson.net/posts/2024/some-thoughts-as-i-sit-here-in-another-standup/
Developer Version - Hacker News Monday # Today is the last day of the sprint. I’ve completed all my assigned work. Normally, I’d just pick up more work from the backlog and just d
What is the software industry playing at?
alex/gemlog/2021-01-08-useless.gmihttp://alex.flounder.online/gemlog/2021-01-08-useless.gmi
See this article on Hacker News: https://news.ycombinator.com/item?id=27490769 Lobste.rs: https://lobste.rs/s/3nsvkk/gemini_is_useless /gemlog/ Proxy Proxied from the original at
Security issues for the world wide webhttp://pages.swcp.com/~mccurley/danger/infect_unix.html
to be trustworthy. Hackers are trying every day to find newways to cause failurs in programs, and they are succeeding. the base protocols used by the internet (e.g., DNS, SMTP, an
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2009/
PostgreSQL hacker working at Google. There are lesswell known examples of even greater perversity. proprietary patent indemnification If you assign rights, you give the owner of t
meta.sr.hthttps://meta.sr.ht/
hub for sourcehut , the hacker's forge. Features of this service include: PGP encrypted and signed emails from sourcehut services Two-factor authentication with TOTP Detailed
[Nettime-nl] Dark fiber van geert lovinkhttps://www.nettime.org/Lists-Archives/nettime-nl-0301/msg00053.html
naar een politieke hacker-ethiek.Lovink maakt in zijn boek overigens geen keuze tussen de hegemoniale of de subversieve interpretatie van 'dark fiber'. In de meer algemene analyse
Ghost in the Shell: You thought *you* didn't like the blue screen of death!http://www.geocities.ws/MHTorringjan/reviews/GITS.html
of a dangerous computer hacker that can infiltrate and manipulate androids and cyborgs. What they don't know is that the hacker, known as Project 2501, is actually a formless elec
Max Bernsteinhttps://bernsteinbear.com/
at Shopifyand a Hacker in Residence at the Dartmouth College computer science department.I did a half-batch of Recurse Center (Fall 2 2024) andreally enjoyed it. You can email me
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
etc. Data criminals and hackers. (Identity thieves, spammers, credit-card thieves, blackmailers, ransomware, etc.Hackers who want to use your device as part of a botnet or crypto-
Best practices and information about computer and smartphone security and privacy
rachelbythebay : Writinghttp://rachelbythebay.com/w/
Monday, May 11, 2020 Whacker News updated for 2020 Friday, May 8, 2020 Responses to reader feedback Thursday, May 7, 2020 Old box, dumb code, few thousand connections, no big deal
Edmund Muller - Jesus Toddhttps://edmundmuller.neocities.org/jesus-todd
knew it involved some hacker named Benjidestroying the global regime’s remaining complexsystems, but as long as it didn’t interfere with hisfarming and Bible reading,
[description goes here]
WWW.CRITICALSECRET.COM DIACHRONIC REVIEWShttps://www.criticalsecret.com/
Un Manifeste Hacker Installation typographique GALLIEN GUIBERT Achetez la version francophone internationale maintenant ! PRESSE Buy the French International Ve
2 Online Reviews plus 1 Podcast Review, Arts and Musics, Writings and Poetry, Theory and Experimental Works, + some Live Events and some Print Books, mostly in French, Free access
Find more...