wiby  
Settings



The Laboratory for Advanced Systems Research

https://lasr.cs.ucla.edu/

for Mobile Computers Through Predictive Methods (1998-2001) [NSF] Travler:   Transparent Virtual Mobile Environment (1994-1999) [DARPA] Rumor:   User-Level Replication (

alt.cyberpunk FAQ – /cyb/+/sec/ wiki

https://cyb-sec.neocities.org/pages/alt-cyberpunk-faq/

technology” (computers, the mass media), making the system better at keeping those within it, inside it. Often this technological system extends into its human “compon

SerenityOS

http://serenityos.org/

system for desktop computers! SerenityOS is a love letter to '90s user interfaces with a custom Unix-like core. It flatters with sincerity by stealing beautiful ideas from various

Draft-leach-cifs-v1-spec-02

http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html

in use by personal computers and workstations running a wide variety of operating systems. Table Of Contents STATUS OF THIS MEMO...................................................

Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org fr

https://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html

we should design our computers this way. But here we run into the same problem we do that results in me not being able to trust my computer: every program runs *as me*. Solitaire,

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox


Find more...