Great Green Room: A Partial History of Computer Conferencing in Ann Arborhttp://greatgreenroom.org/item_19.html
study methods of using computers in education. He started experimenting with existing computer conferencing systems in 1972, but found them expensive and restrictive to use. In re
Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Lifehttps://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/
t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,
Sammlung Interessanter Webseitenhttps://wwwcip.informatik.uni-erlangen.de/~oj14ozun/links.html
If Bacteria Designed Computers? A few things I know about LISP Machines The Lisp Machine Software Development Environment On the Origin of Circuits Comic The Manga Guide to Electr
CuteApps.com - Quality Software, Commercial, Free Downloads: Windows Linux Java MP3 Pocket PC Palm PocketPC PalmOs, Freeware, Shareware, Demo,http://cuteapps.com/
and Fantasy Cartoons Computers Developing tools Games Holidays Horror Miscellaneous Movies Music Nature People Places Products Religious Schools Sci-Fi Sports TV Valentines day Ve
CuteApps - Quality Freeware, Shareware, Demo, Download, Program, Software, Windows, MP3, Online, Audio, Desktop Enhancements, Games, Home and Education, Internet, Multimedia and De
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto
The QP7 Programming Page: C++ Tutorial [main page]http://webarchive.me/geocities/SiliconValley/Bay/5707/cppmain.html
internal workings of computers, and books on application development. Another great book choice would be a general book on programming algorithms that isn't nessessarily geared fo
John Gilmore's home pagehttp://www.toad.com/gnu/
the First Conference on Computers, Freedom and Privacy. I remained quite active in EFF, and served on its Board of Directors for decades, until a spasm of political correctness du
Vernor Vinge on the Singularityhttps://mindstalk.net/vinge/vinge-sing.html
There may be developed computers that are "awake" and superhumanly intelligent. (To date, there has been much controversy as to whether we can create human equivalence in a machin
Todos los enlaces @ cidoku.nethttp://cidoku.net/links/all
browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m
The eet Problem Resolved (Updated)http://techrights.org/o/2007/11/22/eet-strommael-gmx-net/
Control Over Their Computers Red Hat under IBM is a total catastrophe Arvind Says... Something Something "Hey Hi" (the State of Today's Media) Look for news about IBM and most lik
There is no choice but to block a compulsive Internet troll
Kermit Software Source Code Archivehttps://www.kermitproject.org/archive.html
] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ ENDĀ MATTER ] Welcome to what might be the biggest collection on earth of software source code for
Command Line Interface Guidelineshttps://clig.dev/
Forty years later, computers have become so much more accessible to everyone, often at the expense of low-level end user control. On many devices, there is no command-line access
An open-source guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.
Find more...