wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

The Unix and Internet Fundamentals HOWTO

https://tldp.org/HOWTO/Unix-and-Internet-Fundamentals-HOWTO/

basics of PC-class computers, Unix-like operating systems, and the Internet in non-technical language. Table of Contents 1. Introduction 1.1. Purpose of this document 1.2. New ver

Exploring the Internet!

https://www.ou.edu/research/electron/internet/

(- they invented it) Computers and Internet Programming Languages: Perl - Yahoo's index Programming: Perl Scripts - yet another Yahoo index Free hit counter and statistics from Ne

URLs: It's complicated...

https://www.netmeister.org/blog/urls.html

status with all things computers is best described as "it's complicated". We're frenemies. One of us doesn't seem to like the other. Let me show you what I mean. Everybody knows w
Let's play silly games with URLs...

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

poindexter, WHO?

http://tilde.club/~poindexter/

data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from

Linux Security Hardening and Other Tweaks

https://vez.mrsk.me/linux-hardening

As the clocks on most computers have a tendency to drift over time, it's a good idea to run some kind of NTP client. There are a variety of options available. The base Arch instal
A collection of kernel and userland settings one can change to improve the security and usability of a Linux system. Targeted at Arch, but should work for other distros too.

Frequently asked questions - FAQ

http://www.easywebeditor.com/create_a_web_page/web_page_software_00002f.htm

are universal on all computers?   Yes, Times New Roman, Arial and Courier New. If the user has MSWindows+Office usually also Verdana and some others. It is not possible to di
This page is about games> <

Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?

http://lolwut.info/misc/permissive-vs-copyleft-responses.html

my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay

Answers for young people - Tim Berners-Lee

https://www.w3.org/People/Berners-Lee/Kids.html

on different computers, but you had to log on to different computers to get at it. Also, sometimes you had to learn a different program on each computer. So finding out how things

Tanya Pretorius' Bookmarks | Home

http://www.tanyapretorius.co.za/index.htm

google of dictionaries. Computers People Cypherella Romana Machado's interests are transhumanism, extropianism and cryptography. She's a Playboy model. Extropians - Cypherella, Ge
Tanya is an infoholic, linguist, computerjunky, semiotician, feminist, teacher, writer, facebookian, tgifan, dog trainer, typesetter, webmaster, activist and reader.


Find more...