wiby  
Settings



SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan

Sky Net

http://www.sonex.org/SkyNet.html

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Quote Anthology

https://quotes.pouyakary.org/

to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people

http://www.luminist.org/archives/mann_i_was_robot.txt

http://www.luminist.org/archives/mann_i_was_robot.txt

document(for all computers) to those who have internet access. dmw@sioux.ee.ufl.edu-3/7/93] I WAS ROBOT (Utopia Now Possible) by Ernest Mann Within these pages you will learn how

Ye Olde Blogroll - Because blogs are the soul of the web

https://blogroll.org/

David Brownman's Blog Computers, personal, videogames, technology, and more! 雅余 Wilderness・Humanities・Life・Philosophy — Collecting time’s grace and afterglow through walks and tho

Spyware, Adware, and Malware-- Research, Testing, Legislation, and Suits

https://www.benedelman.org/spyware/

installed on their computers. See Simios v. 180solutions complaint (PDF) and coverage (including 180's claim that the case has "no merit"). This suit was voluntarily dis
Index of original research on 'spyware' programs, their transmissions, the ads displayed, and their target sites. Specifically tracks legislative efforts and pending lawsuits.

untitled1.html

http://larch-www.lcs.mit.edu:8001/~corbato/turing91/

as more and more computers are tailored for special applications and for parallelism. Complicating matters too is that parallelism is not a solution for every problem. Certain cal


Find more...