Yijing Dao - A critical survey of I Ching books, by Joel Birocohttps://www.biroco.com/yijing/survey.htm
included in Edward Hacker's 'I Ching Handbook' covering many of the books published up to 1992. [Author's update: Hacker, Moore, and Patsco have since brought out I Chin
Yijing Dao - Calling Crane in the Shade: A website dedicated to reviews of books on the Yijing or I Ching, the ancient Chinese oracle known as the Book of Changes, but also contain
bahunyahttps://www.cssbed.com/bahunya/
otherwise. Original Hacker News Thread Is it responsive? Heck yeah! It doesn't include any fancy styles so it's easily mobile responsive. Just add the famous responsive viewport t
Classless CSS snippet gallery. A less ugly way to start a web page.
no Games, some Musings, an outdated FAQ and "0" Fun - Another #%*& Sim Sitehttps://www.angelfire.com/retro/vinylp_ants/ponderings.html
is this. All you object hackers out there, and you might recognize yourself in this paragraph, and know that I do love you, but you act silly sometimes: you, as object hacker, are
The Luxury of Ignorance: An Open-Source Horror Storyhttp://www.catb.org/~esr/writings/cups-horror.html
Applying my fearsome hacker-jutsu, I try clicking"Prev". I get a page about the printer configuration which describesthe queue types, but still no guidance on how to choose betwee
thank u, nexthttps://steveklabnik.com/writing/thank-u-next
I’m not really a kernel hacker, and I’m not sure that Fuchsia is far enough along to really need my skills, but it also really piques my interest. Additionally, I’m always open to
Blog post: thank u, next by Steve Klabnik
Daddeleckehttp://tempect.de/senil/games.html
mal: Ich bin kein guter Hacker. Aber ich habs geschafft, ein paar alte HANGMAN ROMs zu hacken. Und zwar für Interton VC4000 (da war's wirklich nötig!) und Philips G7000.
numbpilledhttps://numbpillled.neocities.org/
argonian hybrid, car hacker, lifelong thief and criminal, amazingly bad driver, meth head, and master locksmith and lock picking skill trainer. lover of splicer and... well, many
Frutiger Aero Archive - Iconshttps://frutigeraeroarchive.org/icons
program called Resource Hacker to do so, or even to extract the icons from an old program. Table of Contents Computer Software iOS Skeuomorphic Android Jelly Bean (4.3) Samsung Sk
A large collection of computer & mobile App Icons and Icon packs from the early 2000s, to customize your device.
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2022/Apr/
for several reasons: Hacker communities are made of people - not corporateclones: people are wonderfully different & have real lives,and interests. Its important to remember t
Kodiak Alaska Military History, Main Indexhttp://www.kadiak.org/
WWII new Dec 2013 Joe Hacker, NAS control tower 1958 Don Harms, Sitkinak 1974 Fredrick F. Davidson 1942-1945 Glen Finklea USMC 1965, 12 images Sgt. Joseph Steven Eorio, Battery D,
Kodiak Alaska Military History with Guestbook, hundreds of pictures, text documents and explanations of old fortifications and new.
About Anthony Thyssenhttps://antofthy.gitlab.io/anthony.html
What I really am is a hacker (original meaning, not the cracker meaningof the media) and as such, live on COKE and often work into the wee hours ofthe mornings (or at least I used
John Carmack's 3/18 .planhttp://rmitz.org/carmack.on.operating.systems.html
a big plus: the highest hacker to user ratio of any os. I don't personally develop on linux, because I do my unixy things with NEXTSTEP, but I have a lot of technical respect for
Find more...