Giacomo Tesio - How to run your own social network (with Snac)https://encrypted.tesio.it/2024/12/18/how-to-run-your-own-social-network.html
on the Fediverse, a few hackers all over the world are building a sustainable and free post-capitalist infrastructure inspired by permaculture . I was exposed to permacomputing ye
Giacomo Tesio - How to run your own social network
interests ⁂ starbreaker.orghttp://starbreaker.org/interests/
me LARPing as an elite hacker, either. I’ll never be a 31337 h@x0r. I’m OK with that. But I still enjoy the power that even my modest skill confers. Personal Websites It should be
stuff I’m into, listed in no particular order and subject to change
rollcat's websitehttps://www.rollc.at/
one’s claim to a hacker badge than solving hardwareproblems in software (or vice versa). I wanted something like macOS’s caffeinate(1) command, except for audio. Read
Supreme ArchMage AllA Erawa Viacadhttp://www.supremearchmage.com/SupremeArchMage.html
Rank To Designate A Hacker {Specialist}. Add 'V' Below Rank To Designate A Varyator {Specialist}. Add 'C' Below Rank To Designate A Code Specialist. One Can Be HVC, HV, HC, VC, H,
AllA's Website About What The Supreme ArchMage Is And What AllA Did To Protect Us All From Evil And Even Any Badness Whatsoever.
The Retrocomputing Museumhttp://www.catb.org/retro/
we hope,convey the hacker spirit — and if not that, then at least a hintof what life was like back when programmers were real men and sheepwere nervous. The curators of the
A museum of archaic computer languages
Yearly Archives - North Bay Linux Users’ Grouphttps://nblug.org/articles/
DNSSEC Hacker Public Radio and getting started with Audacity Lightning Talks and Linux discussion The NAND in Nand2Tetris BeagleBone and NTP 2012 PXE Magic El
wingologhttp://wingolog.org/
at a large event full ofhackers—funny, that this is the extent of my dreams at the moment; as aparent of three young kids, I don’t get out much—and, there, I was toreceive an awar
COMPUTIST Magazine Articleshttps://fadden.com/apple2/computist.html
In his book Hackers , Steven Levy wrote: Mark [Duchaineau]'s scheme involved arranging data in spiraling paths on the disk, so information could not be accessed concentrically, li
posts tagged "scheme"http://wingolog.org/tags/scheme
matter bart and lisa, hacker edition storage primitives for the distributed web value representation in javascript implementations guile 2.0.2: building the guildhall static singl
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
works most of the time.Hackers (or crackers, if you prefer)break into computers and often use strange filenames, like". " or".. " to hide their traces. You may not have noticed, b
The Grymoire's tutorial on the POSIX Shell
Deutsche Übersetzung der GNU General Public Licensehttp://www.linuxhaven.de/dlhp/DE-GPL.html
written by James Hacker. [Unterschrift von Ty Coon] , 1 April 1989 Ty Coon, President of Vice Auf Deutsch: Die Yoyodyne GmbH erhebt keinerlei urheberrechtlichen Anspruch auf das P
Marginalia Searchhttps://old-search.marginalia.nu/
content 2023-04-18 Hacker News Marginalia Receives NLnet grant 2023-02-26 Marginalia's Index Reaches 100,000,000 Documents 🎊 2022-10-21 Google ei enää tideä 2022-10-19 Helsin
search.marginalia.nu is a small independent do-it-yourself search engine for surprising but content-rich websites that never ask you to accept cookies or subscribe to newsletters.
Find more...