Internet Term Guidehttp://webarchive.me/geocities/SiliconValley/5598/talk.html
gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr
The Unix and Internet Fundamentals HOWTOhttps://tldp.org/HOWTO/Unix-and-Internet-Fundamentals-HOWTO/
basics of PC-class computers, Unix-like operating systems, and the Internet in non-technical language. Table of Contents 1. Introduction 1.1. Purpose of this document 1.2. New ver
Exploring the Internet!https://www.ou.edu/research/electron/internet/
(- they invented it) Computers and Internet Programming Languages: Perl - Yahoo's index Programming: Perl Scripts - yet another Yahoo index Free hit counter and statistics from Ne
URLs: It's complicated...https://www.netmeister.org/blog/urls.html
status with all things computers is best described as "it's complicated". We're frenemies. One of us doesn't seem to like the other. Let me show you what I mean. Everybody knows w
Let's play silly games with URLs...
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
poindexter, WHO?http://tilde.club/~poindexter/
data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from
Linux Security Hardening and Other Tweakshttps://vez.mrsk.me/linux-hardening
As the clocks on most computers have a tendency to drift over time, it's a good idea to run some kind of NTP client. There are a variety of options available. The base Arch instal
A collection of kernel and userland settings one can change to improve the security and usability of a Linux system. Targeted at Arch, but should work for other distros too.
Frequently asked questions - FAQhttp://www.easywebeditor.com/create_a_web_page/web_page_software_00002f.htm
are universal on all computers? Yes, Times New Roman, Arial and Courier New. If the user has MSWindows+Office usually also Verdana and some others. It is not possible to di
This page is about games> <
Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?http://lolwut.info/misc/permissive-vs-copyleft-responses.html
my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay
Answers for young people - Tim Berners-Leehttps://www.w3.org/People/Berners-Lee/Kids.html
on different computers, but you had to log on to different computers to get at it. Also, sometimes you had to learn a different program on each computer. So finding out how things
Tanya Pretorius' Bookmarks | Homehttp://www.tanyapretorius.co.za/index.htm
google of dictionaries. Computers People Cypherella Romana Machado's interests are transhumanism, extropianism and cryptography. She's a Playboy model. Extropians - Cypherella, Ge
Tanya is an infoholic, linguist, computerjunky, semiotician, feminist, teacher, writer, facebookian, tgifan, dog trainer, typesetter, webmaster, activist and reader.
Find more...