wiby  
Settings



VC&G | ยป My memories of what life was like before the Internet

http://www.vintagecomputing.com/index.php/archives/3132/my-memories-of-what-life-was-like-before-the-internet#more-3132

cars, video games, computers, crafts, etc. These publications arrived once a month in your mailbox, and you felt like you were up-to-date with current events in that field. Resear
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.

Installing and Configuring A Windows 98 Network

http://networkers.freeservers.com/win98.htm

to ensure that other computers on the network will recognize it. You install the hardware and software that enables your computer to connect to the network, and then you configure

https://www.ietf.org/rfc/rfc3023.txt

https://www.ietf.org/rfc/rfc3023.txt

computing resources of computers, if they are performed many times. References [ASCII] "US-ASCII. Coded Character Set -- 7-Bit American Standard Code for Information Interchange",

Sammlung Interessanter Webseiten

https://wwwcip.informatik.uni-erlangen.de/~oj14ozun/links.html

If Bacteria Designed Computers? A few things I know about LISP Machines The Lisp Machine Software Development Environment On the Origin of Circuits Comic The Manga Guide to Electr

tsr's NES archive

http://atarihq.com/tsr/

hard drives, faster computers, and better connections. Maybe this wasn't such a problem a couple years ago when the number of people involved were few, but now (especially around

Technical Writing

http://www.rbs0.com/tw.htm

the basis for digital computers and computer programming, which have revolutionized our way of working. For example, whenever an attorney does a search of a computer data base (e.
style in technical writing

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!

Source Song Charts

http://tsort.info/music/charts.htm

songs being played on computers (and some MP3 players), this list contains the top 100 songs in the most active tags on Scrobulate in 2005. Unfortunately the list is distorted by
Music Chart Source Song Charts

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

chance that quantum computers will make all current ciphers irrelevant - https://hackaday.com/2015/09/29/quantum-computing-kills-encryption/ (archive) (MozArchive) - so private co

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/home.html

server or your client computers. And if you need email hosting, we have that too! We use our advanced spam filter and virus filter servers to remove the junk email and computer vi
Junk Email Filter - Front End Spam

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they

https://www.rfc-editor.org/rfc/rfc5894.txt

https://www.rfc-editor.org/rfc/rfc5894.txt

the resolvers on users' computers. IDNA allows the graceful introduction of IDNs not only by avoiding upgrades to existing infrastructure (such as DNS servers and mail transport a


Find more...