wiby  
Settings



2019: September - December Political Notes - Richard Stallman

http://stallman.org/archives/2019-sep-dec.html

passengers' safety, and management retaliated against him . One flaw is that 25% of the oxygen masks don't provide oxygen work when activated. Another flaw can cause fires, years

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

DRM Digital rights management overview at Wikipedia + Hardware restriction HP Remotely Kills Perfectly Good Ink Cartridge With DRM For and against DRM in games Performance Compati
All your base are belong to us!

Programs and Equipment That I Use | Pilledtexts.com

https://pilledtexts.com/my-computer-setup/

net. For cryptocurrency management I use Feather as my Moneo wallet and Electrum as my bitcoin wallet. Command Line Tools: I use zsh as my shell. I use vim and spend most of my ti
Bottom line up front: For my hardware I use an Apple laptop with third-party peripherals that can be easily transported. I try to use open-source software when …

Using the MM email client in the Modern World

https://kermitproject.org/mm/

message selection and management features and its user-friendly (truly) DEC-20 style command language. MM was enormously popular at Columbia University and elsewhere from the mid-

NLnet; All projects

https://nlnet.nl/project/

Accessible KDE File Management NGI0 Commons Fund 2025 Accessible file dialogs throughout KDE applications Accessible security NGI0 PET 2019 2022 Integration effort of independent

CRN / Unix

http://crn.hopto.org/unix.html

ES-222 Solaris Volume Management ES-311 Veritas Volume Manager ES-345-S10 Sun Cluster Administration (I love clusters, HACMP from CLAM Associates/IBM really rocks) ES-445-S10 Sun
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

how we identify ourselves · Adam Wiggins

https://adamwiggins.com/making-computers-better/identity

insulated from the key management of users; biometrics for physically-accessed devices; email as the uniting identifier; and multi-factor authentication for important transactions
We identify ourselves to computers hundreds of times a day, but it’s a mess. I want digital identity that is easy to use, private, and secure.

Vita :: James Lyle Peterson

http://www.jklp.org/profession/vita/vita.html

these classes of memory management algorithms, first to the weighted buddy system and then to more general buddy systems. The general algorithms, based on powers-of-two, Fibonacci


Find more...