wiby  
Settings



On Hacking - Richard Stallman

http://stallman.org/articles/on-hacking.html

from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o

Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day

GPS Archives | Slashgeo

https://www.slashgeo.org/tag/gps.html

since I'll be away from computers (and even without electricity!) for a few weeks. From the open source / open data front: With open source software, you can get Super Sharp&

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes

Documentary: The LoserUsers

http://rmitz.org/bbsloser.html

"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Judicially Arbitrated Imperial E-Democracy

http://www.e-democracy.biz/

www.omniscientcomputers.org for people interested in Science. www.orderofwhiteknights.com For People Who Care A Ton About Basically Only 1 Major Thing Being Wrong In The World. ww
The Constitution of the New World Order. A means for a stable fully customizable E-Democracy and the basis for it’s initial operation.

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases

kal journal

https://kalmind.neocities.org/

- I'm fascinated by computers and the inner workings of complex systems. some of my interesets tech, music , creative outlets

The Command Line In 2004

https://garote.bdmonkeys.net/commandline/

of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High

Log on With SSH Keys | LandChad.net

https://landchad.net/sshkeys/

of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo

Omar Rizwan

https://omar.website/

a fair amount about computers over the last few years, on topics including: wanting provenance everywhere, throughout the computer, whether you're programming or looking at data o


Find more...