wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

etc. Data criminals and hackers. (Identity thieves, spammers, credit-card thieves, blackmailers, ransomware, etc.Hackers who want to use your device as part of a botnet or crypto-
Best practices and information about computer and smartphone security and privacy

Juergen Schmidhuber's AI Blog

https://people.idsia.ch/~juergen/blog.html

was also discussed on Hacker News, reddit, and various media. ★ Sept 2021 (revised 2022): Scientific Integrity and the History of Deep Learning:The 2021 Turing Lecture, and
'AI Blog of Juergen Schmidhuber'

Anime Admirers Cowboy Bebop

http://www.animeadmirers.com/oapages/aacowboybebop1.html

Ed is a wacky computer hacker and genius...although you'd never know it. Her (yep, her) father calls her Francoise, but she is also known as Edward Wong Hau Pepelu Tivrusky IV or

Real Programmers Don't Use Pascal

http://www.pbm.com/~lindahl/real.programmers.html

the typical Unixhacker never can remember what the PRINT command is called thisweek-- but when it gets right down to it, Unix is a glorifiedvideo game. People don't do Serious Wor

Matt Swanson - On Becoming T-Shaped

https://mdswanson.com/blog/2013/07/30/on-t-shaped-people.html

, a Full Stack Product Hacker , etc. I came across an old — in internet time — article from Mark Otto (pre-Bootstrap fame!) about investing in gaining T-shaped skills as a fresh-o
writing on software, book writeups and projects by a software engineer from Indianapolis

Russell O’Connor’s Blog

http://r6.ca/blog/

Confession of a Haskell Hacker 2012-06-23T10:49:01Z : Polymorphic Update with van Laarhoven Lenses 2012-05-05T17:39:11Z : ACM Followup 2012-02-06T00:52:36Z : Mirco… Mezzo&#8

After the Beep

https://afterthebeep.tel/

10:07 PM 0:14 Live from hacker’s town 134 2024/04/02 10:06 PM 0:05 Press 1 to kindly… 133 2024/04/02 10:03 PM 0:02 Testing again 132 2024/04/02 9:58 PM 0:05 Um, yeah. What? Um 131
CALL NOW!!! Messages are manually approved and captioned. Thank you for your patience!

Apple Computer History - books published in the 1980s. Page 1 of 2

https://landsnail.com/apple/1980s.htm

used for the book . Hackers: Heroes of the Computer Revolution by Steven Levy 1984; Delta Books; ISBN: 0385312105; 455 pages Amazon reviews | Reviews: 1 2 | 25-year Retrospective
Includes brief summaries of Apple history books, pictures of book covers, links to reviews, author pages, and other Apple history websites.

MelonLand Surf Club - Webring

https://melonland.net/surf-club

Personal blog of Dan Q: hacker, magician, geocacher, gamer... Made by: Dan Q Joined 2 months ago! Forum Posts: 158 Report! Limette's Playground https://limette.neocities.org/ Made
A webring for all the cool people on the MelonLand Forum!

~~@Com~~|~~ NowScape.com ~~ on the 'Net since 1994

http://nowscape.com/

DNA could be a hacker’s ultimate dream. "   ~ Charles Simonyi 1986
Fun and interesting things about all kinds of stuff: an eclectic collection.

Freedom Downtime Easter Eggs

https://www.2600.com/easter/eggs.html

for the words computer, hacker, computers, hackers, computer hacker, and computer hackers whenever they are spoken in the film. Words: Specially selected words are displayed throu

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

Rudolf Marek (coreboot hacker) found out how to extract this key in this video demonstration , and based on this work, Damien Zammit (another coreboot hacker) partially replaced i


Find more...