wiby  
Settings



Accessible Rich Internet Applications (WAI-ARIA) 1.0

https://www.w3.org/TR/2014/REC-wai-aria-20140320/complete

TAB key on most desktop computers). SVG authors may place elements in the navigation order by manipulating the focusable attribute and they may dynamically specify the navigation

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

HackBack!

https://cryptome.org/2015/07/hackback.htm

know too much about computers, and it really is all it takes to be a successful hacker [0]. [0] https://www.youtube.com/watch?v=DB6ywr9fngU --[ 9 ]-- Resources Links: * https://ww

Link - Vital Network

http://vitn.com/li.htm

electronics, computers, internet APS Technologies Computer hardware / software PC Connection Computer hardware / software CDW Computer Discount Warehouse. Computer hardware / soft

Old, but Interesting Programs

https://invisible-island.net/personal/oldprogs.html

But I could see that computers could do more than compute. I tried writing a program to generate anagrams. That did not go well. Larry Tessler (a less-known Tesler ). advised me t
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.

Solene'%

https://dataswamp.org/~solene/index-full.html

switched to different computers: two in Bluetooth, one for the dongle. The first profile is always the dongle. This allows you to connect the mouse to two different computers with

Find broken links on your site with Xenu's Link Sleuth (TM)

http://home.snafu.de/tilman/xenulink.html

that happens only on computers with hebrew windows, if the character ת (tav - looks somewhat like PI) is used in URLs. This should be converted to %D7%AA, but is converted i
A free multi-threaded link checking software to analyze web sites to find broken links. Runs on Windows 95, 98, NT, 2000, XP, Vista, 7 and 8.

Search Engine Glossary - Marketing

http://www.searchengineguide.com/jennifer-laycock/search-engine-marketing-glossary.php

index. On personal computers, cache is used to save a copy of web sites images, text and code to help speed up download upon future visits to the site. On search engines, cache se

POSIX accounts, permission, and security

https://cygwin.com/cygwin-ug-net/ntsec.html

for users, groups, computers and Active Directory (AD) domains. SIDs are basically comparable to POSIX user ids (UIDs) and group ids (GIDs), but are more complicated because they


Find more...