wiby  
Settings



Greg A. Woods

http://www.weird.com/~woods/

any form of electronic communications is to use strong and proven cryptographic techniques, such as public keys, signatures, and encryption. One of the best ways to employ such te

G-Kermit 2.01

https://www.kermitproject.org/gkermit.html

protocol to another communications program, G-Kermit is likely to perform illegal operations and exit prematurely. If you include this switch when G-Kermit is NOT an external prot

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

ignals & Systems 29  Communications 30  DSP 31  Control Systems 32  Computer Vision 33  Fine, here's AI/ML     Going Deeper 34  Compilers & Assemblers 35  Reverse Engineering 36  P
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

DX LISTENING DIGEST AUGUST 2003 ARCHIVE

http://www.w4uvh.net/dxldtd3h.html

States. The Ministry of Communications released a bill of particulars against a popular morning current affairs radio program, AM, citing 68 examples of what it contended was bias

Spin - Formal Verification

http://spinroot.com/spin/old.html

about computers and communications (published October 2011). Brian Kernighan's latest book, with a general introduction to the digital world, based on his course at Princeton Univ
Spin is a general tool for verifying the correctness of distributed software (software design) in a rigorous and mostly automated fashion.

NLnet; All projects

https://nlnet.nl/project/

Secure P2P real-time communications with RELOAD Blitz - a modular web renderer NGI Zero Core 2024 Rust-based browser engine BlockNote NGI0 Entrust 2023 An modern, open source Bloc

Neil's blog

https://neilzone.co.uk/

in end-to-end encrypted communications in a privacy-respectful manner 2021-10-05 Using freeradius to assign VLANs for UniFi Wi-Fi 2021-09-25 A change of plan: why you wont be able
Neil Brown's personal blog.

Ken Silverman's Build Engine Page

http://www.advsys.net/ken/build.htm

a method of reducing communications bandwidth significantly. (A synchronous master/slave network model.) 07/02/1994: First test of a Build game over a MODEM 09/20/1994: Added WALL

From Here to There, or: Walls Have Ears | unsigned.io

https://unsigned.io/articles/2022_04_02_From_Here_to_There.html

such an effort, our communications infrastructure (even if it runs entirely in private overlay networks) will always be at the mercy of the societal control complex. The power to
Once the centerpiece in the hopes of a free and prosperous world, the Internet is currently undergoing significant mutations towards a consumption-oriented content delivery system,

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

for the World’s Private Communications   (TheGuardian, 2015), Global spy system ECHELON confirmed at last (The Register, 2015), The Most Dangerous People on the Internet Righ
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

Old, but Interesting Programs

http://invisible-island.net/personal/oldprogs.html

course content included communications and control systems—as well as a graduate course on operations research (queuing theory). To gain insight, I wrote programs to make si
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.

WA8LMF Useful Links Page

http://wa8lmf.net/links/

application. Barrett Communications (Formerly Q-Mac Electronics)   Australian manufacturer of an innovative mobile NVIS antenna based on a magnetic loop ant disguised as a ro


Find more...