wiby  
Settings



Vintage Computer Hardware and Software

http://users.glitchwrks.com/~glitch/vintage.html

8085 Projects | Vintage Computers | Test Equipment | Programming | Contact .:[Vintage Computer Hardware and Software]:. Vintage Computing Playing with S-100 Computers Links to ent

Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I

::[FSFLA]:: Who's afraid of Spectre & Meltdown?

http://www.fsfla.org/ikiwiki/blogs/lxo/pub/who-is-afraid-of-spectre-and-meltdown.en.html

take over control of computers: they rather enable even unprivileged software in sandboxed environments to access data in memory that is not and should not be directly accessible

Robotic Driving Simulator

https://www.templetons.com/brad/robocars/simulator.html

allows adding extra computers to generate more virtual cameras or other virtual sensors. Getting one open source robot The project -- and the robocar world -- would be greatly fac

Linux

https://www.billdietrich.me/Linux.html

to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why

KA7OEI - Audio comb filter for hum removal

http://www.modulatedlight.org/optical_comms/comb_filter.html

of everything! Not all computers/sound cards are created equal.   While audio filtering can be done with a rather modest computer (an 800 MHz single-core computer is adequate

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

business how old I am Computers Computers Most geeks identify themselves by their use of computers and computer networks. In order to quantify your geekiness level on computers, c

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2

PTBSync Desktop Organizer

https://netcult.ch/elmue/Desktop-Organizer/

5.7b : Bugfix: On some computers version 5.7 produced elevated CPU load. New in Version 5.7 : Adapted to run on Windows 8. Bugfix JavaScript Error: ";" expected. Improved Internet

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

by people and not computers... To aid that idea SAC even instituted the "failSafe"; program. What made it automatic was the program flow of the SAGE computer.... In simple terms t


Find more...