wiby  
Settings



security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

devoid of security infrastructure (e.g., no privilege levels), I had a theory: "Hey, suppose I tried the strategy of keeping my system upgraded, not running sucky software, dealin

Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org fr

https://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html

only >>> one infrastructure. The VC spec with VC schema is sufficiently expressive >>> syntactically to encompass all these semantics we just have to standardize

Friden EC-130 Electronic Calculator

https://www.oldcalculatormuseum.com/friden130.html

US government's secret infrastructure. Those who would know details about this work, even to this day, are not forthcoming with information relating to the government projects, so

Yearly Archives - North Bay Linux Users’ Group

https://nblug.org/articles/

NBLUG  Elections Infrastructure as Code SELinux Lightning Talks &  Hackfest You Don’t Know JACK 2019 Edition NixOS Lightning Talks &  Hackfe

G-Kermit 2.01

https://www.kermitproject.org/gkermit.html

in new releases of infrastructure items like system services and programming languages, the reality is that Unix-based software constantly needs to be "updated" to "comply" with o

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

where an entire new infrastructure is required, it is often still 15-30 years. Optical amplifiers took around 20 years from concept to deployment. Combinatorial chemistry, which o

15 reasons not to start using PGP

https://secushare.org/PGP

to undermine the PGP infrastructure on a large scale, but it would not go unnoticed whereas a targeted attack most likely would. You can make the attack slightly more difficult by

Plato? Aristotle? Socrates? Morons. « Isegoria

http://www.isegoria.net/2009/07/plato-aristotle-socrates-morons/

based legal infrastructure constructed after the Second World War takes priority over addressing these issues. The fact that this infrastructure was created for an entirely differ

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/archive/activity.html

to get enough of the infrastructure bootstrapped & working to run a first simple calc unit test - adding two ones via a spreadsheet, in the build tree. Continued hacking away

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

down to who owns the infrastructure, and who decides the "rules" according to which it runs. That's why we can't win this "war" by installing some type of software on our computer

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

Supercell testing infrastructure (February 2, 2011) First look at Ubuntu "Natty" and the state of Unity (February 14, 2011) Easy, powerful, stable: Pick two with OpenSho

David A. Wheeler's Blog

https://dwheeler.com/blog/2011/

built up an internal infrastructure with the tools that people want to use; in a vast number of cases, they use OSS to do this. For example, Intellipedia is implemented using Medi


Find more...