wiby  
Settings



Rail Baron - Game Description and History

http://www.railgamefans.com/rbp/rbgame.htm

the typical desktop computers of the mid-1980s were underpowered and had limited graphics capabilities. A competent "Artificially Intelligent" railroad baron was still years away.

How to IRC like it's 2017

https://anders.unix.se/2017/06/23/how-to-irc-like-its-2017/

use it from multiple computers/devices and it makes sure they all have the same message history. It’s got web, Android and iOS clients and is a perfect way to get started wi
An elegant weapon, for a more civilized age.

2blowhards.com: They Say "Racist!!" Your Reply Is ...

http://www.2blowhards.com/archives/2008/10/they_say_racist.html

taxes, writing, computers, these kids these days, and lousy educations. E-Mail Donald Demographer, recovering sociologist, and arts buff E-Mail Fenster College administrator and a
2blowhards.com - a weblog

Jim's Random Notes - May 2001

http://www.mischel.com/diary/2001/05/

was performed by 474 computers that had been previously compromised and were running a "bot" that takes commands from a central server.  The person responsible for the bots j

PhD Thesis: Cascading Style Sheets

https://wiumlie.no/2006/phd/

of personal computers for use in the preparation of manuscripts. Electronic publishing offered tools to ease all stages of publishing from authoring, through editing, to printing.

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications

Stop Writing Dead Programs, Strange Loop 2022

https://jackrusher.com/strange-loop-2022/

are why so much of the internet still runs on it today (Facebook, Wikipedia, Tumblr, Slack, Etsy, WordPress, &c). 24:24.59 Now what about types? This is where half 24:24.60 of you

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

Learn All About Web Browser Cookies | Know Cookies

https://knowcookies.com/

website. This is how computers and mobile devices keep track of and store your login information, language and contrast preferences, bookmarks and more. Persistent cookies are als
Learn about cookies with our very accessible and informative website. Have questions or concerns regarding cookie usage? Find out more about cookies today.

Child Sexual Abuse Epidemic!

https://jesus-is-savior.com/Evils%20in%20America/Porno/abuse.htm

“some 400 videotapes … computers, discs, photographs and other material … images of children as young as two have been found.” The same report claimed “a massive vice probe into k
Child Sexual Abuse Epidemic!

Make a crossword puzzle about government

http://www.mrsoshouse.com/pa/crosspuzmakegov.html

Civics & History Computers Home Make a Crossword Puzzle - Government Vocabulary challenge Make a crossword puzzle using 35 or more vocabulary words related to government. 1. O
A project that challenges students to make a crossword puzzle based on government related vocabulary.

Technology Usage

https://dukenukemis.cool/technology-usage/

activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.


Find more...