Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
I'm alone, but not lonelyhttp://www.cjas.org/~leng/otaku-e.htm
writing games on home-computers first appeared. By the age of thirteen she had made friends with the manager of the game-parlor to which she now went daily. He introduced her to s
The Command Line In 2004https://garote.bdmonkeys.net/commandline/
of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High
The Information Philosopher - dedicated to the new information philosophyhttps://www.informationphilosopher.com/
Nonseparability Quantum Computers Quantum Eraser Quantum Keys Quantum Weirdness Qubits Spherical Symmetry Spooky Action at a Distance Wheeler's Delayed Choice Topics Introduction
Information Philosopher is dedicated to the new Information Philosophy, with explanations for Freedom, Values, and Knowledge.
Links user documentationhttp://links.twibright.com/user_en.html
the program between computers. Copy the links file into a directory where you install executable files, preferably on your $PATH (the path where executable files are searched for)
The Design and Implementation of the Tor Browser [DRAFT]https://2019.www.torproject.org/projects/torbrowser/design/
such as seizing the computers of all Tor users in an area (especially after narrowing the field by the above two pieces of information). History records and cache data are the pri
Julia Evanshttps://jvns.ca/
More drawings about computers Nov 2016 A few drawings about Linux Sep 2016 New zine: Linux debugging tools you'll love Jul 2016 A few sketches Apr 2015 A zine about strace Exe
Julia Evans
CK10TUTOR - C-Kermit 10.0 Tutorialhttps://www.kermitproject.org/ckututor.html
of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is
Digital Research Source Codehttp://www.cpm.z80.de/source.html
for CP/M and MP/M computers. CPNET-80 SOURCE : 44K Here is the source for CP/NET for the 8080/Z80. This is a disassembly, but looks well commented. CP/NET-86 SOURCE : 42K Here is
Source codes of Digital Research Software Products, includingCP
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random
Letter to ARRL - Restructing of Ham Radio Licensinghttps://www.wm7d.net/az_proj/az_html/arrl_restructuring.html
injection and in-car computers, students who have to learn more each year to be competitive for jobs and companies which have to produce better products each year, hams are doing
Find more...