wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Sky Net

http://www.sonex.org/SkyNet.html

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Debian -- About Debian

https://www.debian.org/intro/about

on thousands of computers as easily as installing a single application. All of it free . It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

Chernobyl happened, Computers were still mostly 8-bit, Asbestos was still being used, and, despite the numbers declining already, cigaretts were still way more common. All that as
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Loper OS » No Formats, no Format Wars.

http://www.loper-os.org/?p=309

If this isn't how our computers work, why do we act as if it were?  The core idiocy of all web format wars lies in the assumption that there must necessarily be a pre-determined,

Brief History of Character Codes in North America, Europe, and East Asia

http://tronweb.super-nova.co.jp/characcodehist.html

What makes personal computers useful to the majority of people is not that they can process numerical data--yes, a lot of people still prepare their tax statements with a handheld

Pete's QBASIC / QuickBasic Site

http://petesqbsite.com/

compatible with today’s computers. Back in the Windows 3.x / 95 / 98 / ME days, computers still booted into MS-DOS before they booted into Windows, so QB ran fairly seamlessly. It

PulkoMandy's home on the web

http://pulkomandy.tk/

rarely used in modern computers. Instead we will consider that the elements are stored next to each other, in consecutive memory addresses. This results in the following definitio


Find more...