wiby  
Settings



Home - The Cyberix Network

http://cy-x.net/

control over their computers (1d ago) Anonymous in Zoomers using phones too often (1d ago) Anonymous posted 2 times in I now understand why some people want absolute control over

tsr's NES archive

http://atarihq.com/tsr/

hard drives, faster computers, and better connections. Maybe this wasn't such a problem a couple years ago when the number of people involved were few, but now (especially around

NLnet; Interview With Viktor Lofgren from Marginalia Search

https://nlnet.nl/news/2023/20231016-marginalia.html

of hardware. Because computers have gotten super powerful in the last ten years. And we are at a point where operating a search engine isn’t necessarily that expensive anymore. Te

DEBORAH NATSIOS AND JOHN YOUNG BIBLIOGRAPHY

http://natsios-young.org/

Can Target Suspects' Computers With Accuracy." Newsday, 12 Dec. 2001, C8. Jaffee, Sam. "The Height of Folly: The World Trade Center towers shouldn't be rebuilt.? BusinessWeek Onli

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

chance that quantum computers will make all current ciphers irrelevant - https://hackaday.com/2015/09/29/quantum-computing-kills-encryption/ (archive) (MozArchive) - so private co

peramides

http://peramid.es/

Turing's "Can Digital Computers Think?" (1951) Cirno's interactive math class (requires Macromedia Flash Player) Continue to the attic ( ) AMP project git repository Recommended I

How To Ask Questions The Smart Way

http://www.catb.org/esr/faqs/smart-questions.html

basics of how personal computers, Unix, and the Internet work, see The Unix and Internet Fundamentals HOWTO . When you release software or write patches for software, try to follo

FreshPorts -- The Place For Ports - Most recent commits

https://www.freshports.org/

2.1_12 Save your computers from the evil clutches of Bill x11-wm/vtwm 5.5.0_1 Twm with a virtual desktop and optional Motif-like features Remove GNU_CONFIGURE_MANPREFIX variable f
Most recent commits

https://www.ietf.org/rfc/rfc2376.txt

https://www.ietf.org/rfc/rfc2376.txt

computing resources of computers, if they are performed many times. 5 The Byte Order Mark (BOM) and Conversions to/from UTF-16 The XML Recommendation, in section 4.3.3, specifies

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2007/

disconnected from computers: so, surprised when I said I worked on OpenOffice to a room full of people to fund that 4 out of 6 had it installed, and were using it - and one of the

Jim's Random Notes - May 2001

http://www.mischel.com/diary/2001/05/

was performed by 474 computers that had been previously compromised and were running a "bot" that takes commands from a central server.  The person responsible for the bots j

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they


Find more...