Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
library of the lost and foundhttps://enzuru.tilde.institute/
64 and Other Commodore Computers Lisp A History of Clojure CLSOS: Specification of a Lisp operating system Common Lisp Quick Reference Common Lisp: A Gentle Introduction to Symbol
About the KJ4AJP Weather Stationhttp://kj4ajp.mambm.com/WeatherStation/
or to Homeland Security in the event of a chemical spill or terrorist incident. Questions or comments about the station are welcome, please send to kj4ajp at arrl dot net . BACK T
Reaction to the DEC Spam of 1978https://www.templetons.com/brad/spamreact.html
DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX OPERATING SYSTEM AND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE. BOTH THE DECSYSTEM-2060T AND 2020T OFFER FU
https://www.kermitproject.org/ftp/kermit/ckermit/makefilehttps://www.kermitproject.org/ftp/kermit/ckermit/makefile
ditto, with OpenSSL security added. # + "make linux+krb5" ditto, with Kerberos 5 security added. # + "make linux+krb5+ssl" Linux with OpenSSL and Kerberos 5. # + "make netbsd", Ne
TinkerTool System Release 2: Descriptionhttp://www.bresink.com/osx/TinkerToolSys2.html
on Apple Macintosh computers running Mac OS X Snow Leopard, Mac OS X Snow Leopard Server, Mac OS X Lion, Mac OS X Lion Server, OS X Mountain Lion, OS X Mavericks. These historic o
Product description for TinkerTool System Release 2
PCs and clones - MCbxhttp://oldcomputer.info/pc/
(or almost compatible) computers and sold under different names. PC became popular in offices, homes and industrial systems. Its architecture oriented around ISA bus was expandabl
Chris Koehnke's Webpagehttp://chriskoehnke.com/
2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band
AllA’s Grand Unified Theoryhttp://www.omniscientcomputers.org/GrandUnifiedTheory.html
determined by our super computers which look for any intelligible pattern in text of any language, audio of any language, or video of things streamed continuously. Therefore we ar
A Grand Unified Theory: A fundamental framework of the Fullverse, fractal of universes, implementing string theory, Einstein’s Theory of General and Special Relativity, and wormhol
Thailandhttps://www.hellenicaworld.com/Thailand/en/Thailand.html
electric appliances, computers and parts, integrated circuits, furniture, plastics, automobiles and automotive parts, agricultural machinery, air conditioning and refrigeration, c
Thailand, World Library
http://www.lysator.liu.se/hackdict/split/virus.htmlhttp://www.lysator.liu.se/hackdict/split/virus.html
cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see SEX ). The virus may do nothing but propagate
What This Blog Ishttps://riggraz.dev/intro.html
I do or think about computers, programming and alike, to create a place that defines myself in the realm of IT. When I’ll be old, I want this place to summarize what I did. I want
Hey, it’s riggraz.
Find more...