wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

https://www.jot.fm/issues/issue_2009_01/article4/

https://www.jot.fm/issues/issue_2009_01/article4/

provided by NeXT Computers, costing several hundred dollars, and a Free Software implementation from the GNU project. A third implementation, the Portable Object Compiler translat

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Lena @ Things Of Interest

https://qntm.org/mmacevedo

one can refer to how computers boot, and how applications start, opting to perform a large amount of completely useless calculations instead of just loading a ready to run memory
A note from the author You can now buy this story as part of my collection, Valuable Humans in Transit and Other Stories. This collection also includes a sequel story, titled &q

Why I Develop For The Mac – Evan Miller

https://www.evanmiller.org/why-i-develop-for-the-mac.html

of performance of the computers that the company ships. Browser vendors with cross-platform drawing kits just don't invest the same kind of effort into drawing lines and circles.

The Early History Of Smalltalk

https://worrydream.com/EarlyHistoryOfSmalltalk/

interactive time-shared computers, graphics screens and pointing devices. Advanced computer languages were invented to simulate complex systems such as oil refineries and semi-int

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases

Apollo Archive

https://jim.rees.org/apollo-archive/

Apollo Page Retrocomputers Apollo Collection Typewritten Software - Retrotechnology Research Laboratory These sites were up at one time but were down last time I checked. Apollo D

Book review: Retro debugging

https://wozniak.ca/blog/2019/01/04/1/

Debugging for Microcomputers (Robert C. Bruce, Reston Publishing, 351 pp., 1980) Program Style, Design, Efficiency, Debugging, and Testing, 2nd Ed. (Dennie Van Tassel, Prentice-Ha

Rants

http://toastytech.com/evil/rants.html

out. Remember, modern computers use YOU. I reeeeeeally need to get around to testing some new Linux distros. 2/6/19 Microsoft is really trying to get retards to switch to Office 3

Can you trust your computer?

http://www.gpascal.com/trust.htm

Most people think their computers should obey them, not obey someone else. With a plan they call "trusted computing," large media corporations (including the movie companies and r


Find more...