wiby  
Settings



Speedrunning Computer Games History with a 6yr Old - Part 1 · duncan­lock­.net

https://duncanlock.net/blog/2020/12/27/speedrunning-computer-games-history-with-a-6yr-old-part-1/

home computer. Home computers were very new back then and I’d never used one before. We played games on it. A lot. Asteriods , Frogger , Missile Strike , Twin Kingdom Valley
The kid doesn't really know any better, so we can play Space Invaders unsullied by time and expectations and enjoy a speedrun through gaming history, playing just the highlights.

Extra Ordinary | D. Griffin Jones

https://www.dgriffinjones.com/

humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Juergen Schmidhuber's AI Blog

https://people.idsia.ch/~juergen/blog.html

of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'

library

https://kyl.neocities.org/libraryarchives

[HIS ROJ] the first computers - history and architectures [HIS SCO] against the grain [HIS SEI] zero - the biography of a dangerous idea [HIS SER] deep ancestors - practicing the

CipherSaber Home Page

https://ciphersaber.gurus.org/

come with all DOS based computers, is suitable. It can still be found on the Microsoft Windows '95 CD-ROM in the OTHER\OLDMSDOS directory, and on the Microsoft Windows '98 CD-ROM
Fight the crypto ban by learning how to write your own strong encryption program.

SmartFilter - I've Got A Little List

http://sethf.com/anticensorware/smartfilter/gotalist.php

mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study

Measuring the Web

http://www.tbray.org/ongoing/When/199x/1996/05/07/OVERVIEW.HTM

run on different computers, and exist to serve quite different purposes. Formalizing the notion of a "site" causes some information loss, but allows us to develop some u

HP Computer Museum

https://hpmuseum.net/display_item.php?hw=242

Desktops Early Calc and Computers (1968) 98X5 Computers (1975) 80 Series (1980) 200 Series (1981) 500 Series (1982) Handheld (1983) Integral (1984) 300 Series (1985) 400 Series (1
The museum of HP computers is a collection of HP computing products introduced between 1966 and 1991. The museum contains: calculators, desktop computers, computer systems, tape dr

Nightwind's Home Page

https://www.fur.com/nighty/

I like working with computers and my previous job was involving system administration duties, software installs/upgrades, account maintaining, and other assorted tasks . I live a

Stop Writing Dead Programs, Strange Loop 2022

https://jackrusher.com/strange-loop-2022/

also a 11:59.87 full Software Transactional Memory 12:01.06 implementation that frankly nobody uses, 12:02.63 but it's still great. It just has a more 12:05.50 complicated API, an

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs


Find more...