Data Is Plural — Full Archivehttps://www.data-is-plural.com/archive/
022.05.25 • Supercomputers, infrastructure permitting, European election results, Moreno and Jennings’ sociograms, and Art Garfunkel’s library. 2022.05.18 • Religion and government
The full newsletter archive of Data Is Plural.
Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Lifehttps://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/
t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto
Awesome-Warez | All your base are belong to us!https://lkrjangid1.github.io/Awesome-Warez/
between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!
John Gilmore's home pagehttp://www.toad.com/gnu/
the First Conference on Computers, Freedom and Privacy. I remained quite active in EFF, and served on its Board of Directors for decades, until a spasm of political correctness du
Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Testimony of Howard Rheingoldhttps://www.ciec.org/transcripts/April_1_Rheingold.html
that resides on computers is sent through 23 communication wires, we're seeing that voice and images and 24 software, as well as words, can be converted to digital form 25 and sen
Tech - Anil Dashhttps://www.anildash.com/tags/tech/
apps wearables computers What I Learned From Twitter's Leaders 08 Nov 2013 tech twitter entrepreneurship leadership innovation ThinkUp and What the Web Can Be 15 Oct 2013 tech
A blog about making culture. Since 1999.
Jonathan Mitchell's Story Pagehttp://jonathans-stories.com/journal/
programming and about computers and do more writing and do requisite research for certain types of writing. It has also given me perceptual motor impairments and bad handwriting i
Todos los enlaces @ cidoku.nethttp://cidoku.net/links/all
browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m
Find broken links on your site with Xenu's Link Sleuth (TM)http://home.snafu.de/tilman/xenulink.html
that happens only on computers with hebrew windows, if the character ת (tav - looks somewhat like PI) is used in URLs. This should be converted to %D7%AA, but is converted i
A free multi-threaded link checking software to analyze web sites to find broken links. Runs on Windows 95, 98, NT, 2000, XP, Vista, 7 and 8.
M-J. Dominus Perl Paraphernaliahttps://perl.plover.com/
differ profoundly from computers, buildings, or automobiles, where repeated elements abound. Fred Brooks, Jr. Return to: Universe of Discourse main page | What's new page mjd@plov
Find more...