Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Juergen Schmidhuber's AI Bloghttps://people.idsia.ch/~juergen/blog.html
of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'
Big History - a journey through time, space, evolution, and historyhttp://malankazlev.com/bighistory/
the widespread use of computers, the internet, and mobile technology leading to new ways of communicating, conducting business, and accessing information. The biotech revolution S
An overview of the history of the universe, from the Big Bang to the present day and beyond, showing the relation between the cosmos, life, and history, and deep time, historical t
Jeff Duntemann's ContraPositive Diaryhttp://www.duntemann.com/november2008.htm
introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is
Welcome To The Tech Guide!http://www.thetechguide.com/
home and seizure of his computers that were part of a criminal investigation into an iPhone prototype lost by an Apple employee. by Declan McCullagh and Greg Sandoval CNET News Cl
The Tech Guide includes resources for tweaking your computer, troubleshooting, and hardware and software reviews.
net.techhttp://www.kushaldave.com/nettech.htm
offers viewpoints on computers and society. Newslinx offers daily web news. Hotwired has some excellent resources regarding web tools at its Webmonkey and Packet sections. Tech Ta
The Starfleet Museum - Starship Design Notes, Part 2https://www.starfleet-museum.org/notes2.htm
duel two deck high main computers in the saucer. The subspace transmitter continued to reduce in size. The nav/sensor/transmitter dish had a longer range for its size. Instead of
ASH (ALT.SUICIDE.HOLIDAY) FAQ part 1/4: Introductionhttps://archive.ashspace.org/ashbusstop.org/intro.html
at http://dmoz.org/Computers/Internet/E-mail/Anonymous_Mailers/ Setting up for usage of an anonymous remailer is a hassle, but that is the only negative aspect. Nobody will mind y
The Secret State: MI5 (Home Office/MoD), The Security Service and MI6 (Foreign Office/MoD), GCHQ signals intelligence, The Secret Intelligenchttp://www.bilderberg.org/sis.htm
were getting on with my computers. They said they were still under investigation. I asked if they'd found anything to charge me with, and they said no. I asked if they were going
Child Sexual Abuse Epidemic!https://jesus-is-savior.com/Evils%20in%20America/Porno/abuse.htm
“some 400 videotapes … computers, discs, photographs and other material … images of children as young as two have been found.” The same report claimed “a massive vice probe into k
Child Sexual Abuse Epidemic!
Model Metropolishttps://logicmag.io/play/model-metropolis/
network of computers and radars that promised to computerize the U.S. Air Force’s response to a Soviet nuclear attack by streamlining the detection of incoming bombers and automat
The strange prehistory and dangerous afterlife of SimCity.
Technology Usagehttps://dukenukemis.cool/technology-usage/
activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.
Find more...