wiby  
Settings



Computer Software: Microsoft Office, Davka, LEC, Lotus, Corel, Serif, IBM/Lenovo Thinkpad - BMSoftware

http://www.bmsoftware.com/

Introduction to Computers BVG Train Yourself Java Advanced and Expert BVG Train Yourself Office 2000 / XP / 2003 BVG Train Yourself Office 2000 and 2002/XP BVG Train Yourself Outl
2500+ computer software titles inc: foreign language translation software, Microsoft Office, Serif, Davka, Corel, Power Translator, LEC Translate. IBM Lenovo Thinkpad laptops

Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

Loper OS » Seven Laws of Sane Personal Computing

http://www.loper-os.org/?p=284

with such things on our computers is a broken one: see the Seventh Law. Obfuscated code destroys my ability to usefully interrogate the machine about its activity at all times, an

Alterslash, the unofficial Slashdot digest

https://alterslash.org/

attacks from quantum computers. While Google has said it is on track to migrate its own systems ahead of the 2035 timeline provided in NIST guidelines , last month leaders at the
Alterslash picks the best 5 comments from each of the day’s Slashdot stories, and presents them on a single page for easy reading.

Digital Freedom across the World

https://eylenburg.github.io/countries.htm

all smartphones and computers sold in Russia must come with pre-installed Russian software, which most likely facilitates government access to these devices anyway. In practice, R

Sky Net

http://www.sonex.org/SkyNet.html

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Tux Machines

http://news.tuxmachines.org/

supported single-board computers. Internet Society US Supreme Court Unanimously Defends Internet Access for Millions The United States Supreme Court unanimously ruled in
Do you waddle the waddle

Develop an Application

https://www.billdietrich.me/DevelopApplication.html

"How to Release Great Software Using these 12 Types of Testing" Andrej Acevski's "What They Don't Tell You About Maintaining an Open Source Project" Build Systems Shell scripts :
Strategies, tools, and languages for developing applications for personal computers and smartphones

Using the MM email client in the Modern World

https://kermitproject.org/mm/

email even on Unix computers that no longer support mailspool delivery by using secure POP3 (Post Office Protocol) to fetch your new mail; you can send and receive mail in ISO 885

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl

Managing EFI Boot Loaders for Linux: Basic Principles

http://www.rodsbooks.com/efi-bootloaders/principles.html

majority of EFIs on computers sold since 2012 or 2013 completely replace the legacy BIOS code, though. Such implementations can typically boot more quickly than can a BIOS, and th


Find more...