wiby  
Settings



Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Yuri Bezmenov Lecture on Subversion and Demoralization

https://bezmenov.neocities.org/lecture/

factory destroyed computers and the equipment in the factory. And the administration employed strike breakers. Their cars were turned upside down and burned. Their houses were bur

Capabilities for Nodejs

https://josephg.com/blog/node-sandbox/

on. The security of our computers, and our users' data depends on it. (And as an added bonus, it would make it impossible to sneak dirty telemetry and things like that into npm mo

Readspike - Simple news aggregator

https://readspike.com/

therapy Quantum computers simulated their biggest molecule yet – with help Honey has been used as medicine for centuries – does it really work? A lost ancient script reveals how w
Aggregating the news from around the web every minute

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

http://w1.fi/wpa_supplicant/

for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA A
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

Digital Convergence Initiative - Central Texas

https://dcitexas.org/

like to play on their computers and video game consoles create big business in Texas. The state's computer and video game industry was worth $395 million in 2006, up 17 percent fr
Join the Digital Convergence Initiative in transforming Central Texas into a global hub for digital innovation...

I Wrote This #3 :: FIGBERT

https://figbert.com/posts/i-wrote-this-three/

use social media on my computers. To help change my behaviour I downloaded Mast , a paid Mastodon client for the Apple ecosystem. I went with Mast mostly because it’s absolutely g

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

JB's Place

http://jbschirtzinger.beiteshelpublications.org/

Does Rust then purchase computers for people who cannot afford them so they can possibly contribute to the Rust community? What does it mean to demean, insult, or harass someone?

Canadian FTP Search - VROOSH!

http://www.vroosh.ca/canadian/canada_ftp.html

between two computers over the Internet.  It needs to be installed on your computer and can only be used with a live connection to the Internet. The most popular are Cute Ftp
VROOSH! FTP search all the world!

40th Anniversary Kermit protocol

https://kermitproject.org/fortieth.html

possible variety of computers and operating systems including our own DEC-20 mainframes , our IBM mainframes , and the " Superbrain " CP/M microcomputer we were about to place in


Find more...