wiby  
Settings



Find broken links on your site with Xenu's Link Sleuth (TM)

http://home.snafu.de/tilman/xenulink.html

that happens only on computers with hebrew windows, if the character ת (tav - looks somewhat like PI) is used in URLs. This should be converted to %D7%AA, but is converted i
A free multi-threaded link checking software to analyze web sites to find broken links. Runs on Windows 95, 98, NT, 2000, XP, Vista, 7 and 8.

Mental Health Gulag

http://www.mentalhealthgulag.com/MentalHealthGulag.html

we shall use their own computers to Bring them, the FBI, Down For Their war crimes against me and my computer and the rest of our faction! Killing Police Is How To Cause A Revolut
AllA Viacad’s Current Legal-'Mental Case' And That Of The 'Thought Criminal'.

ANARCHISM.net: Insanity as the Social Norm

https://www.anarchism.net/anarchism_insanityasthesocialnorm.htm

you have 1,000 computers with math calculator programs and all with a different ?master circuits.? Suppose some ignore fours as well as making threes out of fives, or divides seve

Installing Windows 95 & 98

http://www.nickh.org/computer/instlwin9x.html

v2.5 around for older computers.  IF you aren't using TCP/IP networking, you may want to customize your setup, and tell the client software to use IPX only. Yet More Update:

Managing EFI Boot Loaders for Linux: Dealing with Secure Boot

http://www.rodsbooks.com/efi-bootloaders/secureboot.html

when users booted their computers using infected DOS floppies. Although other modes of virus transmission gained prominence as floppies faded in importance and Internet connection

how we identify ourselves · Adam Wiggins

https://adamwiggins.com/making-computers-better/identity

making computers better Adam Wiggins // Oct 2020 why all this is important how we identify ourselves how we store and collaborate on our work how we interact with our tools how we
We identify ourselves to computers hundreds of times a day, but it’s a mess. I want digital identity that is easy to use, private, and secure.

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s


Find more...