posts tagged "scheme"http://wingolog.org/tags/scheme
matter bart and lisa, hacker edition storage primitives for the distributed web value representation in javascript implementations guile 2.0.2: building the guildhall static singl
IRC: #boycottnovell @ FreeNode: November 14th, 2008http://techrights.org/o/2008/11/15/irc-log-14112008/
schestowitz Classic hacker"Cracker confusion: http://www.theregister.co.uk/200... Nov 14 00:51 schestowitz twitter: yes, or they send a Sys-con journo to your house to pick some '
IRC Log for November 14th, 2008
How to crack a Binary File Formathttp://www.iwriteiam.nl/Ha_HTCABFF.html
So You Want To Be a Hacker . Felipe Castro wrote a program to convert from Encore music-notationfile format to Lilypond. He thanked me for the advicesI gave. Ghidra : Decompiler b
Welcome!https://aartaka.me/
Thanks. mrlonglong (Hacker News) on ed.bf Funny thing. Hope no one gets the idea to actually use this u/DocEyss (Reddit) on "Object-Oriented C: A Primer" Thanks I hate it u/terabl
A blog of Artyom Bologov, programmer-poet, privacy freak, and eco-activist. Programming, art, F
daemonology.nethttp://www.daemonology.net/
by other authors . Hacker News Daily , a summary of top-rankedarticles from Hacker News . Ask Hacker News Weekly , a summary of top-ranked "Ask HN" (aka. "self post") articles fro
The Retrocomputing Museumhttp://www.catb.org/~esr/retro/
we hope,convey the hacker spirit — and if not that, then at least a hintof what life was like back when programmers were real men and sheepwere nervous. The curators of the
A museum of archaic computer languages
The Landes Reporthttp://www.ProtocolsForDemocracy.org/2020Election.htm
-lobbyists-amid-election-hacker-concerns NEWS ARTICLES AND VIDEOS: MUST READ BELOW: BY Bev Harris - GEMS "cheating" application has been used in most voting systems.
The patch that refresheshttps://brianlivingston.com/windowmanager/archive/articles/op/xml/02/05/06/020506opwinman.xml.html
from new and unknown hacker attacks. Free IDC White Paper - Discover Secure File Sharing for the Enterpriseattacks. SEARCH: News Test Center Features Community Prof Dev Mis
I WROTE LAST week that a free utility, MBSA (Microsoft Baseline Security Analyzer), is now available. This tool allows you to scan the Windows XP, 2000, and NT 4.0 machines on your
Doom Level Design FAQ v1.2, by Tom Neff...https://www.gamers.org/dhs/helpdocs/pwadmake.html
The most popular EXE hacker is DEHACKED, found on the FTPsites mentioned in Appendix B. Lots of fun, but not our topic!2. WALLS-------- [2-1] I flagged a two-sided wall Impassable
CloudFlare, We Have A Problem - joepie91's Ramblingshttp://cryto.net/~joepie91/blog/2016/07/14/cloudflare-we-have-a-problem/
discussion before on Hacker News , so I have some concrete alternatives handy. I'll reiterate them here for your convenience: DDoS mitigation Use a real (network-level) mitiga
UNATLe: United Nations AntiTerrorism Leaugehttp://www.unatle.net/NuclearWar.html
as mind scanning for hackers. Nanotechnology enables full body modification and all sorts of body wide genetic engineering. Software for relatively easy fully customizable develop
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!
Homehttps://0next.net/
0NeXt. A UNIX-like hacker who likes thinkpads, Linux, Free software, and Languages. Copyright 2025 0NeXt Licensed under the GDPL 1.3
Find more...