On Hacking - Richard Stallmanhttp://stallman.org/articles/on-hacking.html
from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o
cadence's weblog (personal blog)https://cadence.moe/blog
a grab bag of stories, computers, photos, mind, and all the other thoughts that won't let me go. rss / atom content quality If you're new here, look for the emojis to find my grea
Wii U Architecture | A Practical Analysishttps://www.copetti.org/writings/consoles/wiiu/
yet, three independent computers: Firstly, we’ve got DRC-WUP which is a System-on-Chip (SoC) hiding yet-another ARM926EJ-S (the same one from the Wii , how many of these do they h
An in-depth analysis that explains how this console works internally
Blog: The Death of Scientismhttp://indigocurnick.xyz/blog/2024-03-05/the-death-of-scientism
in the last century. Computers and computer science came to almost totally dominate the economy. The average lives of average people have never been so radically transformed as si
What has peer review done to us?
List of all blog posts | William Dentonhttps://www.miskatonic.org/posts/all/
Mickey Spillane on computers (14 July 2010) Upgraded Drupal (07 July 2010) I uses this (12 May 2010) Code4Lib North notes (10 May 2010) Code4Lib North this Thursday and Friday (02
http://webarchive.me/geocities/SiliconValley/2072/leetdood.txthttp://webarchive.me/geocities/SiliconValley/2072/leetdood.txt
drive to learn about computers will be caught by the media hype and will end up searching Altavista for "hacking". When they do that, what do they find? Well--the last time I chec
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
Basilikumhttps://basilikum.monster/
being amazed. I love computers. They are like magic but without magic. Making computers make things I want will never cease to amaze me. The fact you can read this right now is in
Documentary: The LoserUsershttp://rmitz.org/bbsloser.html
"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h
I'm alone, but not lonelyhttp://www.cjas.org/~leng/otaku-e.htm
writing games on home-computers first appeared. By the age of thirteen she had made friends with the manager of the game-parlor to which she now went daily. He introduced her to s
The Command Line In 2004https://garote.bdmonkeys.net/commandline/
of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High
Log on With SSH Keys | LandChad.nethttps://landchad.net/sshkeys/
of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo
Find more...