wiby  
Settings



The computer built to last 50 years

https://ploum.net/the-computer-built-to-last-50-years/

in the cold. Of course, computers are not typewriters. They do a lot more than typewriters. But could we imagine a computer built like a typewriter? A computer that could stay wit
The computer built to last 50 years par Ploum - Lionel Dricot.

eCommerce News | YourShop - Portugal

https://yourshop.pt/news-b20.html

YourShop POS works on Computers, iPads, and Mobile Phones. Learn more about YourShop POS > 2022-10-20 Masking Communication YourShop lets you communicate a message which is inc
News about: Check in Period & Check out Period, from XHTML to HTML5, Accessibility, DKIM, Webhook, Dual responsive online shop design, Import your Shopping List, Quantity | Uni

eCommerce News | YourShop

https://yourshop.com/b20.html

YourShop POS works on Computers, iPads, and Mobile Phones. Learn more about YourShop POS > 2022-10-20 Masking Communication YourShop lets you communicate a message which is inc
News about: Check in Period & Check out Period, from XHTML to HTML5, Accessibility, DKIM, Webhook, Dual responsive online shop design, Import your Shopping List, Quantity | Uni

RFC 1480: The US Domain

https://www.rfc-editor.org/rfc/rfc1480

In the past, the computers registered in the US Domain were primarily owned by small companies or individuals with computers at home. However, the US Domain has grown and currentl

The small things Manifesto – ~ajroach42.com – I'm Andrew. I write about the past and future of tech, music, media, culture, art, and acti

https://ajroach42.com/the-small-things-manifesto/

underpowered simple computers on home internet connections, and projects like yunohost simplify the maintenance and deployment for self hosting on simple cheap computers. Podcasts
This is a work in progress, a living document.

http://cr.yp.to/djb.html

http://cr.yp.to/djb.html

: chip speed, buying computers , etc. Data structures and program structures : cdb , etc. UNIX : daemontools , portability notes , security-holes course , etc. Time : clockspeed ,

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random

The GNU Privacy Handbook

https://www.gnupg.org/gph/en/manual.html

not general-purpose computers but were precursors to modern-day computers. Today, computers can guess keys very quickly, and this is why key size is important in modern cryptosyst

Links about UCE, UBE, Spam

https://www.sendmail.org/~ca/email/spam.html

in the media. Yahoo! - Computers and Internet:Communications and Networking:Electronic Mail:Junk Email Spam in Usenet Anti-Spam Software for INN (Usenet News) [ (links) ] [ Hints
links about spam, UCE, UBE

John D. Hardin's Résumé

http://www.impsec.org/~jhardin/resume-jh.html

of administering computers, networks and database services and providing consultation, training and mentoring for my colleagues at all skill levels. I am a US Citizen by birth. Pl

Kermit - What is it?

https://kermitproject.org/kermit.html

for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!


Find more...