The Design and Implementation of the Tor Browser [DRAFT]https://2019.www.torproject.org/projects/torbrowser/design/
Disk Avoidance 4.4. Application Data Isolation 4.5. Cross-Origin Identifier Unlinkability 4.6. Cross-Origin Fingerprinting Unlinkability 4.7. Long-Term Unlinkability via "New Iden
Linux is NOT Windowshttp://linux.oneandoneis2.org/LNW.htm
of an open-source application achieving success by being better, and being better by being different. Had FF been an IE clone, it would have vanished into obscurity. And had
Recommendations — The Privacy Raccoonhttps://an_g6.codeberg.page/
high quality voice chat application. Mumble is the gold standard as a private, secure and libre voice chat. Note that Mumble isn't end to end encrypted, since it's thought to be s
The C10K problemhttp://www.kegel.com/c10k.html
APIs which let the application retrieve 'file descriptor became ready' notifications: kqueue() This is the recommended edge-triggered poll replacement for FreeBSD (and, soon, NetB
About eBible.orghttp://ebible.org/about.php
signature is a useful application of public key cryptography. In public key cryptography, each user generates a pair of keys that are mathematically related to each other. One he
Universal Document Conversion Server faqshttp://www.ConversionServer.com/faqs.php
the file owner application (e.g. Word, Excel, Netscape), then instructing the owner application to print the document using Windows shell commands. Our experience is that no one u
ImageMAKER Universal Document Conversion Server, a suite of OEM software components for document conversion, unified messaging, wireless applications, document storage and archivin
DX LISTENING DIGEST AUGUST 2003 ARCHIVEhttp://www.w4uvh.net/dxldtd3h.html
time to ready an application forcing prison management to stop playing Metro FM radio, which broadcasts a mixture of urban contemporary music. Pistorius said prison authorities ha
C-Kermit 9.0 General Hints and Tipshttps://www.kermitproject.org/ckcbwr.html
file, or of an "application file" (file whose name is given as the first command-line argument), or of an alternative initialization file ("-y filename"), and get to the prompt. T
Stop Writing Dead Programs, Strange Loop 2022https://jackrusher.com/strange-loop-2022/
38:55.13 can do rapid application development. You 38:57.17 can do all kinds of things, and I will 38:58.60 add that clerk actually improves on the 38:59.69 execution semantics th
https://www.humprog.org/~stephen/https://www.humprog.org/~stephen/
decentralised Internet applications and their construction radically modular programming software build and deployment infrastructure hybrid program analysis/execution engines big
Winlink 2000 Radio-Email System Overviewhttp://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm
WL2K system uses email applications for the client user interface and the process of sending and receiving mail is similar to using any internet service provider. Not only can rad
/useshttps://uses.tech/
Building VueJS applications (for a living) and eating pizza (for fun). Developer Designer Engineer Frontend CSS SCSS JavaScript Vue.js Accessibility Full Stack Node.js Remote 🇺🇸 @
A list of
Find more...