wiby  
Settings



The NSA - The Super Secret National Security Agency

https://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa.htm

to Infect 'Millions' of Computers with Malware    -  How the NSA Spies on Your Google and Yahoo Accounts    -  Inside TAO - Documents Reveal Top NSA

100R — weathering software winter

http://100r.co/site/weathering_software_winter.html

software, you need slow computers, and we've tried to espouse this as much as we could. We spend our time sailing around, and doing experiments with resilience, that covers comput

Debian -- About Debian

https://www.debian.org/intro/about

on thousands of computers as easily as installing a single application. All of it free . It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools

John Hardin's Home Page

http://www.impsec.org/~jhardin/

Internet from several computers at the same time through only one IP address and telephone line or ISDN/DSL/Cable Modem. Great for homes where two (or more) people want to surf at

Technology Usage

https://dukenukemis.cool/technology-usage/

activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.

Flatpak Is Not the Future

https://ludocode.com/blog/flatpak-is-not-the-future

root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably

http://VFTonline.org/VFTprayer/heaven/000list.txt

http://VFTonline.org/VFTprayer/heaven/000list.txt

Construction Military Computers Military Discharge Military Flight Operations Military Income and Benefits Military Morale, Welfare & Recreation Programs Military Operations Milit

15 reasons not to start using PGP

https://secushare.org/PGP

among human beings. Computers should always ensure the identity of a public key by comparing nothing less than the complete public key. By using short ids for maintaining keys the

HackBack!

https://cryptome.org/2015/07/hackback.htm

know too much about computers, and it really is all it takes to be a successful hacker [0]. [0] https://www.youtube.com/watch?v=DB6ywr9fngU --[ 9 ]-- Resources Links: * https://ww

http://www.luminist.org/archives/mann_i_was_robot.txt

http://www.luminist.org/archives/mann_i_was_robot.txt

document(for all computers) to those who have internet access. dmw@sioux.ee.ufl.edu-3/7/93] I WAS ROBOT (Utopia Now Possible) by Ernest Mann Within these pages you will learn how

Grumpystack

http://grumpystack.uk/

The Grumpystack Computers. The Internet. Are too complicated. But they don't have to be. Grumpystack means : Use less [ software | compute | storage | net ] Local-first Local-scal

Nikola Tesla -- Guided Weapons & Computer Technology | ISBN: 0-9636012-9-6 | 0-9636012-5-3

http://www.tfcbooks.com/mall/more/337ntgw.htm

of present day digital computers. This book, the third installment of the Tesla Presents series, is based upon legal records associated with the Nikola Tesla vs. Reginald A. Fesse
A legal deposition by Nikola Tesla containing heretofore unpublished disclosures on the operation of his large high frequency oscillators at both the Houston Street laboratory in N


Find more...