wiby  
Settings



Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

Kernel Planet

https://planet.kernel.org/

with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu

System Administration Bits of Knowledge

http://www.toad.com/gnu/sysadmin/

my computer despite it. Computers are very programmable and one of the joys of free software is that if you don't like what the software does, you can change it yourself. I didn't

#1 Free Clip Art - Thousands of free clip art images royalty free and graphics

http://www.1clipart.com/

Computers    • Construction    • Credit Cards    • Dancing - Ballet    • Email    &#
#1 Free Clip Art - Over 10,000 categorized free clip art images and graphics!

My Sailboat 'Magnolia'

https://www.billdietrich.me/Magnolia.html

and other public computers in the USA. Yes, theoretically it is possible that an ISP or internet cafe could capture your info. Probably most likely threat is that a computer in an
My sailboat 'Magnolia', a 1973 Gulfstar 44 motor-sailer pilothouse ketch in the Caribbean

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Acceleration Watch (Understanding Accelerating Change)

https://www.accelerationwatch.com/

the first personal computers (with no antivirus software), the first internet (with its anonymity and darkweb) the first social networks (with their toxic content and manipulation

China

https://www.hellenicaworld.com/China/en/China.html

integrated circuits, computers, garments, machine parts (2022) note: top five export commodities based on value in dollars Imports $3.125 trillion (2023 est.) $3.142 trillion (202
China, World Library

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

The Coronavirus and the 'Fear Factor'... - El Coronavirus y el 'Factor Miedo'...

https://www.bibliotecapleyades.net/ciencia3/ciencia_coronavirus.htm

 -  From Computers to Global Genocide - The Staggering Influence Bill Gates on Public Health Policy around World    -  From "Event 201" to "

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases


Find more...