The NSA - The Super Secret National Security Agencyhttps://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa.htm
to Infect 'Millions' of Computers with Malware - How the NSA Spies on Your Google and Yahoo Accounts - Inside TAO - Documents Reveal Top NSA
100R — weathering software winterhttp://100r.co/site/weathering_software_winter.html
software, you need slow computers, and we've tried to espouse this as much as we could. We spend our time sailing around, and doing experiments with resilience, that covers comput
Debian -- About Debianhttps://www.debian.org/intro/about
on thousands of computers as easily as installing a single application. All of it free . It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools
John Hardin's Home Pagehttp://www.impsec.org/~jhardin/
Internet from several computers at the same time through only one IP address and telephone line or ISDN/DSL/Cable Modem. Great for homes where two (or more) people want to surf at
Technology Usagehttps://dukenukemis.cool/technology-usage/
activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.
Flatpak Is Not the Futurehttps://ludocode.com/blog/flatpak-is-not-the-future
root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably
http://VFTonline.org/VFTprayer/heaven/000list.txthttp://VFTonline.org/VFTprayer/heaven/000list.txt
Construction Military Computers Military Discharge Military Flight Operations Military Income and Benefits Military Morale, Welfare & Recreation Programs Military Operations Milit
15 reasons not to start using PGPhttps://secushare.org/PGP
among human beings. Computers should always ensure the identity of a public key by comparing nothing less than the complete public key. By using short ids for maintaining keys the
HackBack!https://cryptome.org/2015/07/hackback.htm
know too much about computers, and it really is all it takes to be a successful hacker [0]. [0] https://www.youtube.com/watch?v=DB6ywr9fngU --[ 9 ]-- Resources Links: * https://ww
http://www.luminist.org/archives/mann_i_was_robot.txthttp://www.luminist.org/archives/mann_i_was_robot.txt
document(for all computers) to those who have internet access. dmw@sioux.ee.ufl.edu-3/7/93] I WAS ROBOT (Utopia Now Possible) by Ernest Mann Within these pages you will learn how
Grumpystackhttp://grumpystack.uk/
The Grumpystack Computers. The Internet. Are too complicated. But they don't have to be. Grumpystack means : Use less [ software | compute | storage | net ] Local-first Local-scal
Nikola Tesla -- Guided Weapons & Computer Technology | ISBN: 0-9636012-9-6 | 0-9636012-5-3http://www.tfcbooks.com/mall/more/337ntgw.htm
of present day digital computers. This book, the third installment of the Tesla Presents series, is based upon legal records associated with the Nikola Tesla vs. Reginald A. Fesse
A legal deposition by Nikola Tesla containing heretofore unpublished disclosures on the operation of his large high frequency oscillators at both the Houston Street laboratory in N
Find more...