wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

About the KJ4AJP Weather Station

http://kj4ajp.mambm.com/WeatherStation/

KJ4AJP Weather Station hardware was manufactured by Fine Offset Electronics . The Fine Offset stations are imported and rebranded by various distributors, this station was purchas

Cybernetics Limitation, -1

https://www.devermore.com/cybershards/cybernetics.html

Skull Comp) These microcomputers operate using the natural bio-electrical energy from the brain to power them. They have good processing power and large storage capacities. The co

Rudy Rucker, "Notes For THE BIG AHA"

https://www.rudyrucker.com/thebigaha/notesforthebigaha/Text/notesforthebigaha.xhtml

for the backstory. Chip computers are long gone, and biotech devices have been the rule. But now the popularity of biotech devices is dying out as well. My character evolves into

The Writings of Leslie Lamport

https://lamport.azurewebsites.net/pubs/pubs.html

On Programming Parallel Computers Parallel Execution on Array and Vector Computers Multiple Byte Processing with Full-Word Instructions The Synchronization of Independent Processe

Flatpak Is Not the Future

https://ludocode.com/blog/flatpak-is-not-the-future

root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably

Brief History of Character Codes in North America, Europe, and East Asia

http://tronweb.super-nova.co.jp/characcodehist.html

What makes personal computers useful to the majority of people is not that they can process numerical data--yes, a lot of people still prepare their tax statements with a handheld

MICRO-PROGRAMMED VERSUS HARDWIRED CONTROL UNITS;

https://www.cs.binghamton.edu/~reckert/hardwire3new.html

CONTROL UNITS: HOW COMPUTERS REALLY WORK Richard R. Eckert Department of Computer Science State University of New York Binghamton, NY 13901 Much taken from SIGCSE Bulletin, Vol. 2

Digital History | Promises and Perils of Digital History

https://chnm.gmu.edu/digitalhistory/introduction/

will be scanned into computers and made available to anyone, anywhere, almost instantly, over high-speed networks.” Not to be outdone by his authors, Wired publisher Louis R

The Club of the Exalted Elite

https://exaltedelite.club/

be used between trusted computers, never meant for privacy or security. Decentralization is a bit like only acting within trusted, separate communities of people & places on the i

Internet Census 2012

https://census2012.sourceforge.net/paper.html

if they had actual computers behind them. [ Map ] 1051 Million IPs had a reverse DNS record. [ Map ] 729 Million of these IPs had nothing more and did not respond to any probe. 30

SegaBase - Sega Dreamcast

http://www.atani-software.net/segabase/index-segadchistory1.html

Macintosh personal computers, whereas the SH-4 was a natural (and unproven) extention of technology with which Sega's tech teams was already familiar.  3Dfx's Voodoo2 was at
Sam's ongoing project to document Sega's entire classic videogame libarary


Find more...