wiby  
Settings



SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)

https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html

Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Don's Maps - Palaeolithic / Paleolithic European, Russian, Ukrainian and Australian Archaeology / Archeology

https://www.donsmaps.com/

I got much better computers and software over the years, Adobe Photoshop and Illustrator for example, and my maps became colourised and had more detail. I did a lot of maps of the
Resources for the study of Palaeolithic European, Russian, Ukrainian and Australian Archaeology

Some publications

https://members.loria.fr/PZimmermann/papers/

classical (nonquantum) computers, including, in particular, our most recent computational records for integer factoring and prime-field discrete logarithms. 2021: Three Cousins of

Acceleration Watch (Understanding Accelerating Change)

https://www.accelerationwatch.com/

entitled " Today's Computers, Intelligent Machines, and Our Future ." The final section of this essay "considers the implications of the emergence of intelligent ma

25 Years of Linux — so far [LWN.net]

https://lwn.net/Articles/698042/

in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Documents, Links & Videos

https://www.ed-thelen.org/comp-hist/merged.html

Sites Architecture, Computers in General Computers available in era Specific Technology & Memory Manufacturer Specific Sites Machine Specific Sites Machine Specific Documents and

Web Surfing

http://web.cs.wpi.edu/~jshutt/surfing.html

Interacting with Computers , 2016) (26-Apr-19; 07-Jan-21) The Craft of Text Editing --or-- Emacs for the Modern World (Craig A. Finseth, 1999) (24-Jul-19; 11-Jan-21) Evil Mode: Or

Blog - Bradley Kühn ( bkuhn )

https://ebb.org/bkuhn/blog/

therefore, they are . Computers aren't . Software isn't . When we who are succumb to the capitalist chicanery and erroneously project being unto these systems, we take our first s


Find more...