wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Juergen Schmidhuber's AI Blog

https://people.idsia.ch/~juergen/blog.html

of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'

Big History - a journey through time, space, evolution, and history

http://malankazlev.com/bighistory/

the widespread use of computers, the internet, and mobile technology leading to new ways of communicating, conducting business, and accessing information. The biotech revolution S
An overview of the history of the universe, from the Big Bang to the present day and beyond, showing the relation between the cosmos, life, and history, and deep time, historical t

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

Welcome To The Tech Guide!

http://www.thetechguide.com/

home and seizure of his computers that were part of a criminal investigation into an iPhone prototype lost by an Apple employee. by Declan McCullagh and Greg Sandoval CNET News Cl
The Tech Guide includes resources for tweaking your computer, troubleshooting, and hardware and software reviews.

net.tech

http://www.kushaldave.com/nettech.htm

offers viewpoints on computers and society. Newslinx offers daily web news. Hotwired has some excellent resources regarding web tools at its Webmonkey and Packet sections. Tech Ta

The Starfleet Museum - Starship Design Notes, Part 2

https://www.starfleet-museum.org/notes2.htm

duel two deck high main computers in the saucer. The subspace transmitter continued to reduce in size. The nav/sensor/transmitter dish had a longer range for its size. Instead of

ASH (ALT.SUICIDE.HOLIDAY) FAQ part 1/4: Introduction

https://archive.ashspace.org/ashbusstop.org/intro.html

at http://dmoz.org/Computers/Internet/E-mail/Anonymous_Mailers/ Setting up for usage of an anonymous remailer is a hassle, but that is the only negative aspect. Nobody will mind y

The Secret State: MI5 (Home Office/MoD), The Security Service and MI6 (Foreign Office/MoD), GCHQ signals intelligence, The Secret Intelligenc

http://www.bilderberg.org/sis.htm

were getting on with my computers. They said they were still under investigation. I asked if they'd found anything to charge me with, and they said no. I asked if they were going

Child Sexual Abuse Epidemic!

https://jesus-is-savior.com/Evils%20in%20America/Porno/abuse.htm

“some 400 videotapes … computers, discs, photographs and other material … images of children as young as two have been found.” The same report claimed “a massive vice probe into k
Child Sexual Abuse Epidemic!

Model Metropolis

https://logicmag.io/play/model-metropolis/

network of computers and radars that promised to computerize the U.S. Air Force’s response to a Soviet nuclear attack by streamlining the detection of incoming bombers and automat
The strange prehistory and dangerous afterlife of SimCity.

Technology Usage

https://dukenukemis.cool/technology-usage/

activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.


Find more...