Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Lifehttps://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/
t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,
Sammlung Interessanter Webseitenhttps://wwwcip.informatik.uni-erlangen.de/~oj14ozun/links.html
If Bacteria Designed Computers? A few things I know about LISP Machines The Lisp Machine Software Development Environment On the Origin of Circuits Comic The Manga Guide to Electr
CuteApps.com - Quality Software, Commercial, Free Downloads: Windows Linux Java MP3 Pocket PC Palm PocketPC PalmOs, Freeware, Shareware, Demo,http://cuteapps.com/
and Fantasy Cartoons Computers Developing tools Games Holidays Horror Miscellaneous Movies Music Nature People Places Products Religious Schools Sci-Fi Sports TV Valentines day Ve
CuteApps - Quality Freeware, Shareware, Demo, Download, Program, Software, Windows, MP3, Online, Audio, Desktop Enhancements, Games, Home and Education, Internet, Multimedia and De
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto
Synchronet BBS Listhttp://www.synchro.net/sbbslist.html
Amstrad BBS Amstrad Computers BBS Dedicated Amstrad BBS for CPC, PPC, PCW and all Amstrad computers through the ages. Enthusiasts, 8bit fans, gamers and Amstrad PC lovers all welc
The QP7 Programming Page: C++ Tutorial [main page]http://webarchive.me/geocities/SiliconValley/Bay/5707/cppmain.html
internal workings of computers, and books on application development. Another great book choice would be a general book on programming algorithms that isn't nessessarily geared fo
Against an Increasingly User-Hostile Web - Neustadt.frhttps://neustadt.fr/essays/against-a-user-hostile-web/
network that allowed computers around the world to communicate—was already in place but it remained inaccessible to most people. You had to know how to use a local client to conne
We are quietly replacing an open web that connects and empowers with one that restricts and commoditizes people. We need to stop it.
The GNU Privacy Handbookhttps://www.gnupg.org/gph/en/manual.html
not general-purpose computers but were precursors to modern-day computers. Today, computers can guess keys very quickly, and this is why key size is important in modern cryptosyst
History of IRIXhttps://ryan.thoryk.com/sgi/irix_versions.html
of RISC/os : "MIPS computers running RISC-OS can support four different personalities: default, BSD 4.3, System V.3, and System V.4 (older versions of RISC-OS don't support V
Networking software for DOS and Windows 3.xhttp://www.jacco2.dds.nl/samba/dos.html
the network (see which computers are connected to it) at least one computer running Samba, Windows for Workgroups, Windows 95 or Windows NT must be on the network and belong to th
danah boyd :: Publicationshttps://www.danah.org/papers/
boyd. (2011). "Computers can't give credit: How automatic attribution falls short in an online remixing community." CHI 2011 , Vancouver. (Honorable Mention) DOI: 10.114
Werme Family Home Pagehttp://wermenh.com/index.html
Mellon for their PDP-10 computers. While I can spend all day and all night working on code that ranges from Unix internals to WWW hacks in Python, hearing about NH's Division of C
Find more...