wiby  
Settings



Giacomo Tesio - How to run your own social network (with Snac)

https://encrypted.tesio.it/2024/12/18/how-to-run-your-own-social-network.html

on the Fediverse, a few hackers all over the world are building a sustainable and free post-capitalist infrastructure inspired by permaculture . I was exposed to permacomputing ye
Giacomo Tesio - How to run your own social network

interests ⁂ starbreaker.org

http://starbreaker.org/interests/

me LARPing as an elite hacker, either. I’ll never be a 31337 h@x0r. I’m OK with that. But I still enjoy the power that even my modest skill confers. Personal Websites It should be
stuff I’m into, listed in no particular order and subject to change

rollcat's website

https://www.rollc.at/

one’s claim to a hacker badge than solving hardwareproblems in software (or vice versa). I wanted something like macOS’s caffeinate(1) command, except for audio. Read

Supreme ArchMage AllA Erawa Viacad

http://www.supremearchmage.com/SupremeArchMage.html

Rank To Designate A Hacker {Specialist}. Add 'V' Below Rank To Designate A Varyator {Specialist}. Add 'C' Below Rank To Designate A Code Specialist. One Can Be HVC, HV, HC, VC, H,
AllA's Website About What The Supreme ArchMage Is And What AllA Did To Protect Us All From Evil And Even Any Badness Whatsoever.

The Retrocomputing Museum

http://www.catb.org/retro/

we hope,convey the hacker spirit — and if not that, then at least a hintof what life was like back when programmers were real men and sheepwere nervous. The curators of the
A museum of archaic computer languages

Yearly Archives - North Bay Linux Users’ Group

https://nblug.org/articles/

DNSSEC Hacker Public Radio and getting started with Audacity Lightning Talks and Linux discussion The NAND in Nand2Tetris BeagleBone and NTP 2012 PXE  Magic El

wingolog

http://wingolog.org/

at a large event full ofhackers—funny, that this is the extent of my dreams at the moment; as aparent of three young kids, I don’t get out much—and, there, I was toreceive an awar

COMPUTIST Magazine Articles

https://fadden.com/apple2/computist.html

In his book Hackers , Steven Levy wrote: Mark [Duchaineau]'s scheme involved arranging data in spiraling paths on the disk, so information could not be accessed concentrically, li

posts tagged "scheme"

http://wingolog.org/tags/scheme

matter bart and lisa, hacker edition storage primitives for the distributed web value representation in javascript implementations guile 2.0.2: building the guildhall static singl

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

works most of the time.Hackers (or crackers, if you prefer)break into computers and often use strange filenames, like". " or".. " to hide their traces. You may not have noticed, b
The Grymoire's tutorial on the POSIX Shell

Deutsche Übersetzung der GNU General Public License

http://www.linuxhaven.de/dlhp/DE-GPL.html

written by James Hacker. [Unterschrift von Ty Coon] , 1 April 1989 Ty Coon, President of Vice Auf Deutsch: Die Yoyodyne GmbH erhebt keinerlei urheberrechtlichen Anspruch auf das P

Marginalia Search

https://old-search.marginalia.nu/

content 2023-04-18 Hacker News Marginalia Receives NLnet grant 2023-02-26 Marginalia's Index Reaches 100,000,000 Documents 🎊 2022-10-21 Google ei enää tideä 2022-10-19 Helsin
search.marginalia.nu is a small independent do-it-yourself search engine for surprising but content-rich websites that never ask you to accept cookies or subscribe to newsletters.


Find more...