wiby  
Settings



Programs and Equipment That I Use | Pilledtexts.com

https://pilledtexts.com/my-computer-setup/

Peripherals to computers are just as important to productivity as the software running on the computers, so I put a lot of time testing different configurations. I have an added l
Bottom line up front: For my hardware I use an Apple laptop with third-party peripherals that can be easily transported. I try to use open-source software when …

Ayham's Online Website | A Practical Guide to GnuPG

https://ayham.xyz/posts/a-practical-guide-to-gpg/

keys to other computers and using online services like Github and Codeberg. Generating GnuPG Master-keys GnuPG uses asymmetric encryption, which means that you would use 2 keys. P

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Regulating Robocar Safety

https://www.templetons.com/brad/robocars/regulation.html

bigger, more complex computers and operating systems with more chance of failure. As such, many suspect the best path is not to design the systems with maximum reliability, but to

Light Table Blog

http://lighttable.com/2014/05/16/pain-we-forgot/

people interact with computers as if they were people. Many of the results of this research are suprising and counter-intuitive eg personifying the compiler can improve learning r
Light Table is the next generation code editor. Light Table Connects you to your creation with instant feedback and showing data values flow through your code.

Terms of Service - LibraryHost

https://libraryhost.com/tos/

Access to Other Computers or Networks: Accessing, illegally or without authorization, computers, accounts or networks belonging to another party, or attempting to penetrate securi

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl

Frink

http://frinklang.org/

that within 100 years, computers will be twice as powerful, ten thousand times larger, and so expensive that only the five richest kings of Europe will own them." Features For tho
A practical calculating tool, unit conversion utility, and programming language designed to make physical calculations simple. It tracks units of measure (feet, meters, kilogr

HONEY AND HEMLOCK

http://feeds.feedburner.com/honeyandhemlock/qPml

of television, cinema, computers, tablets, smartphones, and so on. Screens have deeply penetrated our lives and our society. This too is a product of electrical energy and modern

TRX-Manager - What's new ?

http://www.trx-manager.com/whatsnew.htm

Telnet (pse update both computers). . V 4.7.4 Monitoring: Tuning by digit possible using the mouse wheel 4m band added (log and spots filter) Remote control: Terminal shows the ba
Registered User Area

Technology Usage

https://dukenukemis.cool/technology-usage/

activity away from computers, as has been demonstrated for centuries up until modern times. In real life tasks include necessities such as cooking, cleaning, taking my dogs outsid
A page dedicated to explaining how I use certain technologies as well as the internet.

Flatpak Is Not the Future

https://ludocode.com/blog/flatpak-is-not-the-future

root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably


Find more...