Mental Health Gulaghttp://www.mentalhealthgulag.com/MentalHealthGulag.html
we shall use their own computers to Bring them, the FBI, Down For Their war crimes against me and my computer and the rest of our faction! Killing Police Is How To Cause A Revolut
AllA Viacad’s Current Legal-'Mental Case' And That Of The 'Thought Criminal'.
Douglas W. Jones's punched card indexhttp://homepage.divms.uiowa.edu/~jones/cards/history.html
Before Computers The punched card as used for data processing, originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York City Board o
A brief technical history of punched cards
The Retro-Computing Society of RI, Inc.https://rcsri.org/
of historic computers and to increase the awareness of the history of computers and their development. One of our primary goals is to restore historical systems to operational con
Beej's Guide to Network Programminghttps://beej.us/guide/bgnet/html/
in the world of computers: Donald Knuth, Bruce Schneier, W. Richard Stevens, and The Woz, my Readership, and the entire Free and Open Source Software Community. 1.11 Publishing In
The Phoenix Arises - Viable Alternatives to the Microsoft Platform - Amiga Operating Envirnment, Linux, Mac OS X Serverhttp://webarchive.me/geocities/SiliconValley/Drive/3664/os.htm
and Pentium PC class computers. The open source community has xFree86 window manager and KDE running it. freeBSD - for Intel processors NetBSD - for many processors OpenBSD Linux
Obsolete Computer Museumhttp://www.obsoletecomputermuseum.org/
Check out all the new computers and gadgets to go with them reviewed on savantmag.com . For the latest product reviews. Tom Copper Exhibit - Special exhibit that makes my collecti
The Simulation Argument and the future of suffering: objections to The Hedonistic Imperativehttps://www.hedweb.com/object35.htm
lucky. Yet what digital computers have to tell us about the ultimate mysteries of consciousness and existence remains elusive. At any rate, no attempt will be made here exhaustive
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
Slide Show Screen Saver for Windowshttps://www.fourmilab.ch/slidescr/
algorithm on computers equipped with full colour hardware, but there's another reason you might want to use it. “High colour” (15 or 16 bit) displays really don't have
Slide Show Screen Saver for Windows
The Net Wars Trilogyhttp://www.madore.org/~david/computers/netwars.html
the Megalohard computers cannot track the Falcon down. At this point, Vallmer holds a conversation - through real-time compressed MPEG - with the BilG Brother, the Emperor, in per
The Net Wars Trilogy, a parody of Star Wars lang=en
s0s's Personal Websitehttp://home.macintosh.garden/~s0s/
video games, and computers (mostly Macs that run classic Mac OS). Many modern web hosting companies force HTTPS on everyone, without offering the option to disable it. Some compan
Jeff Duntemann's Wardriving FAQhttp://www.drivebywifiguide.com/wardrivingfaq.htm
The kid was looking for computers supporting online games and had no strong intent to "break into" anything—the problems that developed lay with an essentially unde
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i
Find more...