wiby  
Settings



SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

Without Systemd

https://without-systemd.org/wiki/index_php/Main_Page.html

some small single board computers. FSF-approved OpenWRT ( 2 ) (xref: LEDE Project) provides a fully writable filesystem, and package management. PiBox ( BusyBox init) an embedded

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Amorphous Computing Paper Listing

https://groups.csail.mit.edu/mac/projects/amorphous/paperlisting.html

Meeting on DNA Based Computers (DNA6), June 2000. Toward in vivo Digital Circuits , Weiss, Homsy, Knight, DIMACS Workshop on Evolution as Computation, 1999 Programming Biological

Stroustrup: FAQ

https://www.stroustrup.com/bs_faq.html

and the best uses of computers are outside traditional computer science. See also my C++ style and techniques FAQ . Real novices facing their first "read some data, do something t

Ron Schnell - @RonnieSchnell

http://www.driver-aces.com/ronnie.html

game installed on more computers than any other in the world, except for Solitaire. This includes WoW or anything else you can think of. I am the founder of MailCall.Com, which I

25 Years of Linux — so far [LWN.net]

https://lwn.net/Articles/698042/

in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases

Rants

http://toastytech.com/evil/rants.html

out. Remember, modern computers use YOU. I reeeeeeally need to get around to testing some new Linux distros. 2/6/19 Microsoft is really trying to get retards to switch to Office 3

Can you trust your computer?

http://www.gpascal.com/trust.htm

Most people think their computers should obey them, not obey someone else. With a plan they call "trusted computing," large media corporations (including the movie companies and r


Find more...