wiby  
Settings



Great Green Room: A Partial History of Computer Conferencing in Ann Arbor

http://greatgreenroom.org/item_19.html

study methods of using computers in education. He started experimenting with existing computer conferencing systems in 1972, but found them expensive and restrictive to use. In re

Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Life

https://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/

t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,

Sammlung Interessanter Webseiten

https://wwwcip.informatik.uni-erlangen.de/~oj14ozun/links.html

If Bacteria Designed Computers? A few things I know about LISP Machines The Lisp Machine Software Development Environment On the Origin of Circuits Comic The Manga Guide to Electr

CuteApps.com - Quality Software, Commercial, Free Downloads: Windows Linux Java MP3 Pocket PC Palm PocketPC PalmOs, Freeware, Shareware, Demo,

http://cuteapps.com/

and Fantasy Cartoons Computers Developing tools Games Holidays Horror Miscellaneous Movies Music Nature People Places Products Religious Schools Sci-Fi Sports TV Valentines day Ve
CuteApps - Quality Freeware, Shareware, Demo, Download, Program, Software, Windows, MP3, Online, Audio, Desktop Enhancements, Games, Home and Education, Internet, Multimedia and De

Learning HTML 3.2 by Examples

https://www.fi.muni.cz/~hales/html/jk.html

http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto

The QP7 Programming Page: C++ Tutorial [main page]

http://webarchive.me/geocities/SiliconValley/Bay/5707/cppmain.html

internal workings of computers, and books on application development. Another great book choice would be a general book on programming algorithms that isn't nessessarily geared fo

John Gilmore's home page

http://www.toad.com/gnu/

the First Conference on Computers, Freedom and Privacy. I remained quite active in EFF, and served on its Board of Directors for decades, until a spasm of political correctness du

Vernor Vinge on the Singularity

https://mindstalk.net/vinge/vinge-sing.html

There may be developed computers that are "awake" and superhumanly intelligent. (To date, there has been much controversy as to whether we can create human equivalence in a machin

Todos los enlaces @ cidoku.net

http://cidoku.net/links/all

browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m

The eet Problem Resolved (Updated)

http://techrights.org/o/2007/11/22/eet-strommael-gmx-net/

Control Over Their Computers Red Hat under IBM is a total catastrophe Arvind Says... Something Something "Hey Hi" (the State of Today's Media) Look for news about IBM and most lik
There is no choice but to block a compulsive Internet troll

Kermit Software Source Code Archive

https://www.kermitproject.org/archive.html

] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ ENDĀ MATTER ] Welcome to what might be the biggest collection on earth of software source code for

Command Line Interface Guidelines

https://clig.dev/

Forty years later, computers have become so much more accessible to everyone, often at the expense of low-level end user control. On many devices, there is no command-line access
An open-source guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.


Find more...