wiby  
Settings



On Hacking - Richard Stallman

http://stallman.org/articles/on-hacking.html

from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o

cadence's weblog (personal blog)

https://cadence.moe/blog

a grab bag of stories, computers, photos, mind, and all the other thoughts that won't let me go. rss / atom content quality If you're new here, look for the emojis to find my grea

Wii U Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/wiiu/

yet, three independent computers: Firstly, we’ve got DRC-WUP which is a System-on-Chip (SoC) hiding yet-another ARM926EJ-S (the same one from the Wii , how many of these do they h
An in-depth analysis that explains how this console works internally

Blog: The Death of Scientism

http://indigocurnick.xyz/blog/2024-03-05/the-death-of-scientism

in the last century. Computers and computer science came to almost totally dominate the economy. The average lives of average people have never been so radically transformed as si
What has peer review done to us?

List of all blog posts | William Denton

https://www.miskatonic.org/posts/all/

Mickey Spillane on computers (14 July 2010) Upgraded Drupal (07 July 2010) I uses this (12 May 2010) Code4Lib North notes (10 May 2010) Code4Lib North this Thursday and Friday (02

http://webarchive.me/geocities/SiliconValley/2072/leetdood.txt

http://webarchive.me/geocities/SiliconValley/2072/leetdood.txt

drive to learn about computers will be caught by the media hype and will end up searching Altavista for "hacking". When they do that, what do they find? Well--the last time I chec

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Basilikum

https://basilikum.monster/

being amazed. I love computers. They are like magic but without magic. Making computers make things I want will never cease to amaze me. The fact you can read this right now is in

Documentary: The LoserUsers

http://rmitz.org/bbsloser.html

"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h

I'm alone, but not lonely

http://www.cjas.org/~leng/otaku-e.htm

writing games on home-computers first appeared. By the age of thirteen she had made friends with the manager of the game-parlor to which she now went daily. He introduced her to s

The Command Line In 2004

https://garote.bdmonkeys.net/commandline/

of interacting with computers, wouldn't have occurred to me at the time I was being taken for rides in that MGB. I had signed up to take a computer programming class at Ames High

Log on With SSH Keys | LandChad.net

https://landchad.net/sshkeys/

of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo


Find more...