wiby  
Settings



Richard Stallman's Personal Page

http://stallman.org/

is a bad idea to have computers count the votes in public elections . Internet Voting: don't even think of it! The patent system is, at best, not worth keeping . (February 2014) W

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications

Rail Baron - Game Description and History

http://www.railgamefans.com/rbp/rbgame.htm

the typical desktop computers of the mid-1980s were underpowered and had limited graphics capabilities. A competent "Artificially Intelligent" railroad baron was still years away.

Vulonkaaz's links

https://vulonkaaz.zip/links.html

be useful for school computers or whatever) Eaglercraft : Minecraft Java ported to web browser, lower performance than native java of course but it's crazy it even works, even hav

DX LISTENING DIGEST AUGUST 2003 ARCHIVE

http://www.w4uvh.net/dxldtd3h.html

such as the number of computers in the two Koreas. Many South Koreans are unaware of the program. But for decades, North Korea has considered it a propaganda tool aimed at destabi

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl

Flatpak Is Not the Future

https://ludocode.com/blog/flatpak-is-not-the-future

root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably

BeOS.jp.ax BeOS Fansite and Archive

https://beos.jp.ax/

designed for personal computers. It offers a unique user interface and advanced multimedia capabilities. Be OS was first developed in the early 1990s by Be Inc. and gained attenti

Bit permutations

http://programming.sirrida.de/bit_perm.html

as was done on ancient computers. Today only base 2 (i.e. bits) is used, and this is what is crucially needed for all bit operations. If signed numbers are present, it is assumed
An essay about bit permutations in software

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

https://www.ietf.org/rfc/rfc3490.txt

https://www.ietf.org/rfc/rfc3490.txt

the resolvers on user's computers. Faltstrom, et al. Standards Track [Page 2] RFC 3490 IDNA March 2003 1.1 Problem Statement The IDNA specification solves the problem of extendi

BIROCO.COM ~ A way to look at things

https://www.biroco.com/about.htm

anything to do with computers for another second… but useful to have a place set up where I can write off-the-cuff and instantly publish when the mood takes me. From day-to-
Personal site of Joel Biroco, writer, artist, esotericist.


Find more...