On Hacking - Richard Stallmanhttp://stallman.org/articles/on-hacking.html
from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
GPS Archives | Slashgeohttps://www.slashgeo.org/tag/gps.html
since I'll be away from computers (and even without electricity!) for a few weeks. From the open source / open data front: With open source software, you can get Super Sharp&
Gang stalking - Kiwipedia, the free encyclopediahttps://gangstalkingworld.neocities.org/
weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes
Documentary: The LoserUsershttp://rmitz.org/bbsloser.html
"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre
Judicially Arbitrated Imperial E-Democracyhttp://www.e-democracy.biz/
www.omniscientcomputers.org for people interested in Science. www.orderofwhiteknights.com For People Who Care A Ton About Basically Only 1 Major Thing Being Wrong In The World. ww
The Constitution of the New World Order. A means for a stable fully customizable E-Democracy and the basis for it’s initial operation.
Cryptography and Liberty 2000https://archive.epic.org/reports/crypto2000.html/
into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases
kal journalhttps://kalmind.neocities.org/
- I'm fascinated by computers and the inner workings of complex systems. some of my interesets tech, music , creative outlets
The Command Line In 2004https://garote.bdmonkeys.net/commandline/
of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High
Log on With SSH Keys | LandChad.nethttps://landchad.net/sshkeys/
of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo
Omar Rizwanhttps://omar.website/
a fair amount about computers over the last few years, on topics including: wanting provenance everywhere, throughout the computer, whether you're programming or looking at data o
Find more...