wiby  
Settings



Mental Health Gulag

http://www.mentalhealthgulag.com/MentalHealthGulag.html

we shall use their own computers to Bring them, the FBI, Down For Their war crimes against me and my computer and the rest of our faction! Killing Police Is How To Cause A Revolut
AllA Viacad’s Current Legal-'Mental Case' And That Of The 'Thought Criminal'.

Douglas W. Jones's punched card index

http://homepage.divms.uiowa.edu/~jones/cards/history.html

Before Computers The punched card as used for data processing, originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York City Board o
A brief technical history of punched cards

The Retro-Computing Society of RI, Inc.

https://rcsri.org/

of historic computers and to increase the awareness of the history of computers and their development. One of our primary goals is to restore historical systems to operational con

Beej's Guide to Network Programming

https://beej.us/guide/bgnet/html/

in the world of computers: Donald Knuth, Bruce Schneier, W. Richard Stevens, and The Woz, my Readership, and the entire Free and Open Source Software Community. 1.11 Publishing In

The Phoenix Arises - Viable Alternatives to the Microsoft Platform - Amiga Operating Envirnment, Linux, Mac OS X Server

http://webarchive.me/geocities/SiliconValley/Drive/3664/os.htm

and Pentium PC class computers. The open source community has xFree86 window manager and KDE running it. freeBSD - for Intel processors NetBSD - for many processors OpenBSD Linux

Obsolete Computer Museum

http://www.obsoletecomputermuseum.org/

Check out all the new computers and gadgets to go with them reviewed on savantmag.com . For the latest product reviews. Tom Copper Exhibit - Special exhibit that makes my collecti

The Simulation Argument and the future of suffering: objections to The Hedonistic Imperative

https://www.hedweb.com/object35.htm

lucky. Yet what digital computers have to tell us about the ultimate mysteries of consciousness and existence remains elusive. At any rate, no attempt will be made here exhaustive

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

Slide Show Screen Saver for Windows

https://www.fourmilab.ch/slidescr/

algorithm on computers equipped with full colour hardware, but there's another reason you might want to use it. “High colour” (15 or 16 bit) displays really don't have
Slide Show Screen Saver for Windows

The Net Wars Trilogy

http://www.madore.org/~david/computers/netwars.html

the Megalohard computers cannot track the Falcon down. At this point, Vallmer holds a conversation - through real-time compressed MPEG - with the BilG Brother, the Emperor, in per
The Net Wars Trilogy, a parody of Star Wars lang=en

s0s's Personal Website

http://home.macintosh.garden/~s0s/

video games, and computers (mostly Macs that run classic Mac OS). Many modern web hosting companies force HTTPS on everyone, without offering the option to disable it. Some compan

Jeff Duntemann's Wardriving FAQ

http://www.drivebywifiguide.com/wardrivingfaq.htm

The kid was looking for computers supporting online games and had no strong intent to "break into" anything—the problems that developed lay with an essentially unde
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i


Find more...