wiby  
Settings



posts tagged "scheme"

http://wingolog.org/tags/scheme

matter bart and lisa, hacker edition storage primitives for the distributed web value representation in javascript implementations guile 2.0.2: building the guildhall static singl

IRC: #boycottnovell @ FreeNode: November 14th, 2008

http://techrights.org/o/2008/11/15/irc-log-14112008/

schestowitz Classic hacker"Cracker confusion: http://www.theregister.co.uk/200... Nov 14 00:51 schestowitz twitter: yes, or they send a Sys-con journo to your house to pick some '
IRC Log for November 14th, 2008

How to crack a Binary File Format

http://www.iwriteiam.nl/Ha_HTCABFF.html

So You Want To Be a Hacker . Felipe Castro wrote a program to convert from Encore music-notationfile format to Lilypond. He thanked me for the advicesI gave. Ghidra : Decompiler b

Welcome!

https://aartaka.me/

Thanks. mrlonglong (Hacker News) on ed.bf Funny thing. Hope no one gets the idea to actually use this u/DocEyss (Reddit) on "Object-Oriented C: A Primer" Thanks I hate it u/terabl
A blog of Artyom Bologov, programmer-poet, privacy freak, and eco-activist. Programming, art, F

daemonology.net

http://www.daemonology.net/

by other authors . Hacker News Daily , a summary of top-rankedarticles from Hacker News . Ask Hacker News Weekly , a summary of top-ranked "Ask HN" (aka. "self post") articles fro

The Retrocomputing Museum

http://www.catb.org/~esr/retro/

we hope,convey the hacker spirit — and if not that, then at least a hintof what life was like back when programmers were real men and sheepwere nervous. The curators of the
A museum of archaic computer languages

The Landes Report

http://www.ProtocolsForDemocracy.org/2020Election.htm

-lobbyists-amid-election-hacker-concerns NEWS ARTICLES AND VIDEOS: MUST READ BELOW: BY Bev Harris - GEMS "cheating" application has been used in most voting systems. 

The patch that refreshes

https://brianlivingston.com/windowmanager/archive/articles/op/xml/02/05/06/020506opwinman.xml.html

from new and unknown hacker attacks. Free IDC White Paper - Discover Secure File Sharing for the Enterpriseattacks. SEARCH:   News Test Center Features Community Prof Dev Mis
I WROTE LAST week that a free utility, MBSA (Microsoft Baseline Security Analyzer), is now available. This tool allows you to scan the Windows XP, 2000, and NT 4.0 machines on your

Doom Level Design FAQ v1.2, by Tom Neff...

https://www.gamers.org/dhs/helpdocs/pwadmake.html

The most popular EXE hacker is DEHACKED, found on the FTPsites mentioned in Appendix B. Lots of fun, but not our topic!2. WALLS-------- [2-1] I flagged a two-sided wall Impassable

CloudFlare, We Have A Problem - joepie91's Ramblings

http://cryto.net/~joepie91/blog/2016/07/14/cloudflare-we-have-a-problem/

discussion before on Hacker News , so I have some concrete alternatives handy. I'll reiterate them here for your convenience: DDoS mitigation Use a real (network-level) mitiga

UNATLe: United Nations AntiTerrorism Leauge

http://www.unatle.net/NuclearWar.html

as mind scanning for hackers. Nanotechnology enables full body modification and all sorts of body wide genetic engineering. Software for relatively easy fully customizable develop
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!

Home

https://0next.net/

0NeXt. A UNIX-like hacker who likes thinkpads, Linux, Free software, and Languages. Copyright 2025 0NeXt Licensed under the GDPL 1.3


Find more...