wiby  
Settings



Decode Systems

http://www.decodesystems.com/

Cal-Tex CT7001 VINTAGE COMPUTERS Computer Rescue HP 2000 ACCESS RCA COSMAC Microprocessor Vintage Periodicals Captain Zilog E&L MMD-1 Mini-Micro Designer Apple Computer Vintag

Sniffin' the Ether v2.0

http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html

to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur

Netherlands

https://www.hellenicaworld.com/Netherlands/en/Netherlands.html

broadcasting equipment, computers (2022) note: top five import commodities based on value in dollars Reserves of foreign exchange and gold $69.83 billion (2023 est.) $63.353 billi
Netherlands, World Library

Model Metropolis

https://logicmag.io/play/model-metropolis/

network of computers and radars that promised to computerize the U.S. Air Force’s response to a Soviet nuclear attack by streamlining the detection of incoming bombers and automat
The strange prehistory and dangerous afterlife of SimCity.

Technology Usage

https://dukenukemis.cool/technology-usage/

activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.

Flatpak Is Not the Future

https://ludocode.com/blog/flatpak-is-not-the-future

root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably

Cybercide III

https://milesfortis.us/dunn/cybercide03.htm

a strong background in computers and owns a houseful of them. One day he had innocently turned one of them on (an old Packard Bell it should be mentioned) and his monitor shorted

15 reasons not to start using PGP

https://secushare.org/PGP

among human beings. Computers should always ensure the identity of a public key by comparing nothing less than the complete public key. By using short ids for maintaining keys the

HackBack!

https://cryptome.org/2015/07/hackback.htm

know too much about computers, and it really is all it takes to be a successful hacker [0]. [0] https://www.youtube.com/watch?v=DB6ywr9fngU --[ 9 ]-- Resources Links: * https://ww

Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</

https://www.kermitproject.org/k95.html

and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector

Robots In Plain English

https://robotsinplainenglish.com/

A column on computers, engineering, and automation, free of jargon. (About) (LinkedIn) (Substack) Robots Are Hard Revisiting the original Roomba and its simple architecture (2025-

The Decline of Mass Transit

https://www.templetons.com/brad/robocars/transit-ends.html

have been flown by computers for years) are mass transit. They aren't particularly efficient. They get about 50 passenger miles/gallon, and thus take about as much fuel as 2 peopl


Find more...