Data Is Plural — Full Archivehttps://www.data-is-plural.com/archive/
022.05.25 • Supercomputers, infrastructure permitting, European election results, Moreno and Jennings’ sociograms, and Art Garfunkel’s library. 2022.05.18 • Religion and government
The full newsletter archive of Data Is Plural.
Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Lifehttps://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/
t.sys.pdp10,alt.folklore.computers,comp.lang.lisp,alt.os.multics Subject: The Thompson Login Trojan: The REAL Story Date: 30 Apr 1995 01:11:47 -0400 Message-ID: <3nv66j$bi5@xcal
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,
CuteApps.com - Quality Software, Commercial, Free Downloads: Windows Linux Java MP3 Pocket PC Palm PocketPC PalmOs, Freeware, Shareware, Demo,http://cuteapps.com/
and Fantasy Cartoons Computers Developing tools Games Holidays Horror Miscellaneous Movies Music Nature People Places Products Religious Schools Sci-Fi Sports TV Valentines day Ve
CuteApps - Quality Freeware, Shareware, Demo, Download, Program, Software, Windows, MP3, Online, Audio, Desktop Enhancements, Games, Home and Education, Internet, Multimedia and De
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto
Synchronet BBS Listhttp://www.synchro.net/sbbslist.html
Amstrad BBS Amstrad Computers BBS Dedicated Amstrad BBS for CPC, PPC, PCW and all Amstrad computers through the ages. Enthusiasts, 8bit fans, gamers and Amstrad PC lovers all welc
Awesome-Warez | All your base are belong to us!https://lkrjangid1.github.io/Awesome-Warez/
between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!
John Gilmore's home pagehttp://www.toad.com/gnu/
the First Conference on Computers, Freedom and Privacy. I remained quite active in EFF, and served on its Board of Directors for decades, until a spasm of political correctness du
Tech - Anil Dashhttps://www.anildash.com/tags/tech/
apps wearables computers What I Learned From Twitter's Leaders 08 Nov 2013 tech twitter entrepreneurship leadership innovation ThinkUp and What the Web Can Be 15 Oct 2013 tech
A blog about making culture. Since 1999.
Overview of Present Missionhttps://www.heavensgate.com/misc/ovrview.htm
primitive human computers (brains) we were using. Consequently, new steps and understandings were presented throughout our awakening in a carefully calculated sequence. By this me
Jonathan Mitchell's Story Pagehttp://jonathans-stories.com/journal/
programming and about computers and do more writing and do requisite research for certain types of writing. It has also given me perceptual motor impairments and bad handwriting i
Zorba Portable Computerhttp://www.zorba.z80.de/
the last 8 bit portable computers running the CP/M operating system. It's features were almost identical to the Kaypro II. Nevertheless Zorba users were very satisfied. They were
This web site is dedicated to all that is and was the Zorba Portable Computer
Vernor Vinge on the Singularityhttps://mindstalk.net/vinge/vinge-sing.html
There may be developed computers that are "awake" and superhumanly intelligent. (To date, there has been much controversy as to whether we can create human equivalence in a machin
Find more...