Attrition Security Rant: Anti-Virus Companies: Tenacious Spammershttps://attrition.org/security/rant/av-spammers.html
thanks transtec Computers for their support This is where I learn that I mailed a user that doesn't exist on the remote system. They are also kind enough to actually attach a copy
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
GPS Archives | Slashgeohttps://www.slashgeo.org/tag/gps.html
since I'll be away from computers (and even without electricity!) for a few weeks. From the open source / open data front: With open source software, you can get Super Sharp&
A discussion on kernel-maintainer pain points [LWN.net]https://lwn.net/Articles/952146/
Society wrecked it when computers became commodity and were classified as "for boys" and there have been shared experiences of university class professors *assuming* that one has
A regular feature of the Kernel Maintainers Summit is a session where Linus Torvalds discusses [...]
Kicks Condorhttps://www.kickscondor.com/
the whole are on home computers, that has implications. For me, Beaker DOES pay attention to the original good part: view source. It brings view source to the modern ‘ye-app-web’
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
pketh.orghttp://Pketh.org/
brain from coding-for-computers to writing-for-humans is a violent gesture. It takes a lot of force and focus to pull that rusty mental switch. So when writing mode finally does c
Making things simple, radical and beautiful
Blog - Bradley Kühn ( bkuhn )https://ebb.org/bkuhn/blog/
therefore, they are . Computers aren't . Software isn't . When we who are succumb to the capitalist chicanery and erroneously project being unto these systems, we take our first s
Free as in Freedom - Free as in Freedomhttps://faif.us/cast/
with it in relation to computers. (06:10) Bradley and Karen mentioned their long-time use of the HTC Dream (07:30) Bradley mentioned that he helped start the Replicant project, bu
Free as in Freedom is a bi-weekly oggcast about legal, policy and other issues in Free, Libre and Open Source Software
ANARCHISM.net: The New Libertarian Manifesto, by Samuel Edward Konkin IIIhttps://www.anarchism.net/newlibertarianmanifesto.htm
and all his services, computers, suppliers and customers. This mode of operation is already around and growing in the freer segments of Western economies. Thus
Data Is Plural — Full Archivehttps://www.data-is-plural.com/archive/
022.05.25 • Supercomputers, infrastructure permitting, European election results, Moreno and Jennings’ sociograms, and Art Garfunkel’s library. 2022.05.18 • Religion and government
The full newsletter archive of Data Is Plural.
Find more...