wiby  
Settings



xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

Chernobyl happened, Computers were still mostly 8-bit, Asbestos was still being used, and, despite the numbers declining already, cigaretts were still way more common. All that as
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

Microscopy Imaging

https://www.microscopyimaging.co.uk/

if at all, with MAC computers and with each Windows version upgrade some models lose their drivers and cease to work. For this reason we do tend to advise against them with a few
A Brunel Microscopes website dedicated to Photomicrography, CCTV and Image capture through the microscope.

Columns & Editorials by Steve Wood

http://www.mathdittos2.com/columns/

about using Macintosh computers for their web sites! I wrote the That Other Steve... series for the now defunct MacTimes News Network in 1998-99. The View from the Classroom serie

Loper OS » "Cryostat" Genesis.

http://www.loper-os.org/?p=3791

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

Old, but Interesting Programs

https://invisible-island.net/personal/oldprogs.html

But I could see that computers could do more than compute. I tried writing a program to generate anagrams. That did not go well. Larry Tessler (a less-known Tesler ). advised me t
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.

The Answer Guy Issue 24

https://www.linuxdoc.org/LDP/LG/issue24/lg_answer24.html

to make use of our 486 computers at work (and just need to know) by running Linux, and still support some things like Windows 3.1x Lotus Lotsuite, etc., which Caldera claims to do

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Apple 1 Registry

http://www.willegal.net/appleii/apple1-originals.htm

of Original Apple 1 Computers 66 Apple 1s Currently Listed this version of registry last updated June, 2015 (This page will not be updated in the foreseeable future) Maintenance o

BiMAVs; Bipedal Mechanized Assault Vehicles

http://www.bimavs.com/

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

millions of infected computers connecting to them, and counting the increasing number of Mac machines. Can you say "this was a religious debate?" Well, I can, which is why the res

MUCK Info

http://transform.to/~starling/stuff/muckinfo.html

run on individual's computers, not the server, and allow the client computers to communicate with a server running Fuzzball in the language of Telnet. You don't need a server to p


Find more...