wiby  
Settings



Using Computers for Educational Freedom

http://people.eecs.berkeley.edu/~bh/freedom.html

a variety of suggested programming projects. This kind of variety is an obviously worthwhile step, but I think that the computer allows a much more profound step toward freedom: a

SmithForth

https://dacvs.neocities.org/SF/

of the Forth programming language for x86-64 desktop computers. SmithForth is a text interpreter that runs in a Linux text console. You can use SmithForth as you would use any oth

Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

personally involved in programming for dynamic and database-backed Web sites as far back as 1993, and I was good at explaining stuff in plain language. Though sympathetic to their

A Scheme Primer

https://files.spritely.institute/papers/scheme-primer.html

the Scheme family of programming languages. It was originally written to aid newcomers to technology being developed at The Spritely Institute but is designed to be general enough

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

superseded all other programming languages. I firmly believe that all programs can be reduced to a Perl one-liner. I use Perl to achieve U+++ status. ( ) > P+++ Perl is a very

https://www.jot.fm/issues/issue_2009_01/article4/

https://www.jot.fm/issues/issue_2009_01/article4/

Objective-C is a programming language adding an OOP layer on top of C, using Smalltalk semantics. The Objective-C language began life as the Object Oriented Pre-Compiler [9] (OOPC

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

did some open-source programming projects, had a GitHub presence, had a personal web site, and a LinkedIn profile. Establish a professional appearance and writing style; you're no
How to become a bug-bounty hunter and do penetration testing

TECO Manual V4

https://www.copters.com/teco.html

String Directly 6. Programming TECO 6.1. Other Features 7. TECO REFERENCE 7.1. 'A' Command 7.1.1. With No Arguments 7.1.2. With One Argument 7.1.3. With Two Arguments 7.2. 'B" Com

Nintendo 64 Architecture | A Practical Analysis

https://classic.copetti.org/writings/consoles/nintendo-64/

and tools for microcode programming [39] . An SGI Indy I came across at The Centre for Computing History (Cambridge, UK) when I visited in August 2024. By comparison, this compute
An in-depth analysis that explains how this console works internally

Stephen Wolfram, A New Kind of Science

https://bactra.org/reviews/wolfram/

development of the LISP programming language, from which Mathematica descends. The book is full to bursting with this kind of thing, in every area of science it touches on that I'

Daedalus 3.5 Scripting

https://www.astrolog.org/labyrnth/daedalus/script.htm

contains its own programming language, which can be used to automate actions, and even design whole games or other programs using Daedalus as a platform. The Macros submenu on the

Roy Longbottom's Computer Benchmarks and Stress Tests and Performance History Index

http://www.roylongbottom.org.uk/

Systems, different programming languages and compilers, different manufacturers). Largest group is for original C compilations, for 76 1991 to 2017 vintage CPUs. From 1984 Dhrysto
The PC benchmark collection is a FREE set of programs that measure performance of CPUs, cache, memory, disks and graphics. They run via Windows, Linux and, now, Android phones and


Find more...