wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan

Greg A. Woods

http://www.weird.com/~woods/

name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it

How money and the profit motive destroy everything

http://digdeeper.love/articles/capitalismcancer.xhtml

. Even ports for dead computers (archive) (MozArchive) get swiftly taken down. It's not enough for them to go after the games - development toolkits (archive) (MozArchive) can't b

Blog Posts

https://www.jefftk.com/p/

of Running People on Computers May 14, 2013 Keeping Choices Donation Neutral May 11, 2013 Milk Mixing Machine May 10, 2013 The Economics of Producing Your Own CD May 09, 2013 Vege

Why Windows XP Is Bad

http://webarchive.me/geocities/SiliconValley/2072/whyxpbad.htm

Windows XP on their OEM computers. The computers will ship with Windows XP pre-activated, but if you ever want to reinstall XP (which some people do frequently because it's often

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

Self-hosting a static website in Slackware 15

http://digdeeper.love/articles/static.xhtml

Anyway, click the "two computers" button and you should end up connected: Left side contains the folders on your computer, right side - the ones on your VPS. Double click the fold


Find more...