A Security Curriculumhttps://learnaifromscratch.github.io/theabsolutestateofsoftware.html
secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
PuTTY FAQhttps://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html
connections to other computers. We maintain the tool; we don't administer any computers that you're likely to be able to use, in the same way that the people who make web browsers
Halestrom's Peregrinationshttp://halestrom.net/darksleep/
January 2017 Mounting computers on wooden boards Putting a Pentium 4 rig, power supply and all, on piece of plywood for easy hanging. Monday 5 December 2016 Project: Wooden synchr
So-called modern web developers are the culpritshttps://unixdigest.com/articles/so-called-modern-web-developers-are-the-culprits.html
demands on users computers, you're responsible . The impact your product is having on the environment, you're responsible . The impact your project is having on people with disabi
Michael Tsai - Bloghttps://mjtsai.com/blog/
a blank window. Apple computers have come with text-editing software since the original Mac was released, in 1984; the current iteration of the program launched in the mid-ninetie
Blog | Eddie Dalehttps://www.eddiedale.com/blog
and MacOS as my daily computers. Some days I feel like MacOS, and some days I feel like Omarchy. I really started to enjoy the tiling window manager in Omarchy (Hyprland), and nat
The Power of Centralizationhttps://secushare.org/centralization
than that, almost all computers share the problem of "downstream abuse", so the only ultimate way to protect something from your friends is to not share it online. Top
Technological slaveryhttp://digdeeper.love/articles/technological_slavery.xhtml
chance that quantum computers will make all current ciphers irrelevant - https://hackaday.com/2015/09/29/quantum-computing-kills-encryption/ (archive) (MozArchive) - so private co
Mataroa Collectionhttps://collection.mataroa.blog/
http://ajroach42.com/ Computers A Reasonable Approximation http://reasonableapproximation.net/ Programming, movies TTTThis http://tttthis.com/ Economics, history Linux Kernel Monk
Wayne Pollock's Home Pagehttp://wpollock.com/
Intro to Computers & Tech. ( CGS 1000-48040) Intro to Computers & Tech. ( CGS 1000-48076) Why is orientation required? From HCC Absence Study ( PDF ) My Weekly Schedule fo
Wayne Pollock homepage
Find more...