wiby  
Settings



Babbage - The language of the future

https://www.tlc-systems.com/babbage.htm

Babbage encourages hardware portability. After all, what good is a computer if you can't take it with you? The examples that follow will give you some idea of what Babbage looks l

/tech/ - Technology - Page 1

https://zzzchan.xyz/tech/index.html

>>17710 When computers can write the most trivial of software themselves, people will only need to program sophisticated software. The only programmers rendered obsolete by
Technology & Computing

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Genetic Images Interactive Exhibit

http://karlsims.com/genetic-images.html

can be simulated on computers. Populations of virtual entities specified by coded descriptions in the computer can be evolved by applying these same natural rules of variation and
Exhibit allowing visitors to interactively evolve abstract still images.

The Retro-Computing Society of RI, Inc.

https://rcsri.org/rcs-info.shtml

of historic computers and to increase the awareness of the history of computers and their development. One of our primary goals is to restore historical systems to operational con

HP Computer Museum

https://hpmuseum.net/display_item.php?hw=242

Desktops Early Calc and Computers (1968) 98X5 Computers (1975) 80 Series (1980) 200 Series (1981) 500 Series (1982) Handheld (1983) Integral (1984) 300 Series (1985) 400 Series (1
The museum of HP computers is a collection of HP computing products introduced between 1966 and 1991. The museum contains: calculators, desktop computers, computer systems, tape dr

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

stardot.org.uk - Index page

https://www.stardot.org.uk/forums/index.php

rg.uk for users of Acorn computers and emulators Skip to content Quick links FAQ Contact us Login Register Board index Rob Napier's Acorn Computers Biography: VOICES FROM A FUTURE
for users of Acorn computers and emulators

http://www.midwinter.com/lurk/ftp/b5.tech.htm

http://www.midwinter.com/lurk/ftp/b5.tech.htm

The system of guidence computers and beacon trackers and the like that allow a ship to navigate in hyper-space using a pre-created Jump Gate or Point. Low power consumption means

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2017/

Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.


Find more...