Epochalypse: When computers travel back in time | hertig.bloghttp://hertig.blog/posts/epochalypse-when-computers-travel-back-in-time/
later posted it to Hacker News,where it was the top page for the better part of the day. [3] It appears that it sensitized quite a few people to the problem whohadn't been aware o
There is a computer bug waiting to jump at us in about 14 years. Watch out for it, or you'll suddenly find yourself back in the year 1901.
教育资源_電驢下載基地http://cdn-www.ed2k.online/education/
01.20更新」[pdf]資料下載 《黑客防線》(Hacker Defence)(2004年10月號)[PDF]資料下載 《視窗世界》(Windows World Monthly)(2004年10月號)[PDF]資料下載 《軟件世界》(Software World Monthly)(2004年9月號)[PDF]資料下載 《2014年《參考消息》》更新至11.
Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
Raymond, 1997), TheHacker Spirit at MIT (Richard Stallman, 1999), OpenSource And Economics , Math professor makes the case for free and open educational resources (2018), FamilyGu
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
"Do It Better: SSH" by Colin Coglehttp://colincogle.name/blog/do-it-better/ssh/
once explained this: A hacker can't knock on the door if they can't get to it in the first place. In this scenario, you will expose your SSH server to the Internet, setting up the
SSH is easy to secure, but that doesn't mean there isn't more work to be done.
Isaac Kauvarhttps://ikauvar.github.io/
][ Code ][ Article ] Hacker News ] Summary: Inspired by animal behavior, a method that improves model-based RL adaptivity and achieves a new state-of-the-art score on Crafter. Int
Hi!http://cryto.net/~joepie91/
concerned that I'm a hacker , or you just want to learn more about me ? Or maybe you're interested in knowing more about the police raid that was carried out on me ? Found a secur
AVR Tutorial - AVRDUDEhttp://www.ladyada.net/learn/avr/avrdude.html
RFID/NFC Chumby Hacker Board Soldering tutorial Power Supply tutorial Brother KH-9033 tutorial USB reverse-engineering tutorial Calipe
Path to Pentester – /cyb/+/sec/ wikihttps://cyb-sec.neocities.org/pages/anons-pentest-guide/
CeH (Certified Ethical Hacker) - I have mixed feelings about this cert. Lot’s of people get it, and lots of people have it, who have no idea what hacking really is or how to
Dobrica Pavlinusic's home page: projects.Linuxhttps://www.rot13.org/~dpavlin/linux.html
patches I'm not kernel hacker. Having said that, here are some patches that justfix problems: Make XFS work with User-mode Linux : xfs_uml.diff (credits for this should really go
Worse Is Betterhttps://dreamsongs.com/WorseIsBetter.html
porch with some of the hackers, and someone asked me why I thought people believed C and Unix were better than Lisp. I jokingly answered, "because, well, worse is better.&quo
aerc - a pretty good email clienthttps://aerc-mail.org/
for the discerning hacker. Check out the screencast above to get an idea of how it's used. Some of its more interesting features include: Editing emails in an embedded terminal tm
<![CDATA[Disc Coverers]]>https://anchor.fm/s/3ffac1b8/podcast/rss
the finest of vintage hacker jokes, this book is jam-packed with goodies for the most hyper turbo of nerds, and friend, if you're thirty-three episodes deep into a Discworld revie
Find more...