wiby  
Settings



Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan

Friden EC-130 Electronic Calculator

https://www.oldcalculatormuseum.com/friden130.html

through the use of computers. One of his early, as well as historically noteworthy projects, was being part of the development of the ERMA system for under contract to GE for Bank

The Department of Energy -- KEVIN CRAIG - "Liberty Under God"Beginning in Missouri's 7th Congressional District

https://kevincraig.us/energy.htm

amount of groceries, computers, automobiles, and clothing, and not just to the rich. We do not need a Federal Department of Computers, nor a Federal Department of Automobiles. Nor
Kevin Craig is a Christian Anarchist campaigning for *Liberty Under God* in the race for U.S. Congress in Missouri's 7th District.

https://www.kermitproject.org/ftp/kermit/ckermit/makefile

https://www.kermitproject.org/ftp/kermit/ckermit/makefile

ditto, with OpenSSL security added. # + "make linux+krb5" ditto, with Kerberos 5 security added. # + "make linux+krb5+ssl" Linux with OpenSSL and Kerberos 5. # + "make netbsd", Ne

TinkerTool System Release 2: Description

http://www.bresink.com/osx/TinkerToolSys2.html

on Apple Macintosh computers running Mac OS X Snow Leopard, Mac OS X Snow Leopard Server, Mac OS X Lion, Mac OS X Lion Server, OS X Mountain Lion, OS X Mavericks. These historic o
Product description for TinkerTool System Release 2

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

PCs and clones - MCbx

http://oldcomputer.info/pc/

(or almost compatible) computers and sold under different names. PC became popular in offices, homes and industrial systems. Its architecture oriented around ISA bus was expandabl

Chris Koehnke's Webpage

http://chriskoehnke.com/

2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band

AllA’s Grand Unified Theory

http://www.omniscientcomputers.org/GrandUnifiedTheory.html

determined by our super computers which look for any intelligible pattern in text of any language, audio of any language, or video of things streamed continuously. Therefore we ar
A Grand Unified Theory: A fundamental framework of the Fullverse, fractal of universes, implementing string theory, Einstein’s Theory of General and Special Relativity, and wormhol

Bilderberg Club

https://thirdworldtraveler.com/Ruling_Elites/BilderbergClub.html

in the world. Its computers are gathering and analysing daily all the information from the hundreds of monitoring stations that are on the whole planet and in this way they overse

Thailand

https://www.hellenicaworld.com/Thailand/en/Thailand.html

electric appliances, computers and parts, integrated circuits, furniture, plastics, automobiles and automotive parts, agricultural machinery, air conditioning and refrigeration, c
Thailand, World Library

http://www.lysator.liu.se/hackdict/split/virus.html

http://www.lysator.liu.se/hackdict/split/virus.html

cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see SEX ). The virus may do nothing but propagate


Find more...