wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

Roger Clarke's Cookies Page

http://www.rogerclarke.com/II/Cookies.html

Privacy of Users' Computers, Activities' by Lee Gomes, San Jose Mercury News, February 13, 1996, distributed by Phil Agre on his rre service, and referring to earlier but unspecif

Peter Neumann's Home Page

https://www.csl.sri.com/users/neumann/

of the ACM Committee on Computers and Public Policy (CCPP), which I chaired since 1985 -- until it was disbanded in 2018 as part of a complete reorganization of ACM committees. (T

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo

My Sailboat 'Magnolia'

https://www.billdietrich.me/Magnolia.html

and other public computers in the USA. Yes, theoretically it is possible that an ISP or internet cafe could capture your info. Probably most likely threat is that a computer in an
My sailboat 'Magnolia', a 1973 Gulfstar 44 motor-sailer pilothouse ketch in the Caribbean

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

Project 2038 FAQ

http://maul.deepsky.com/~merovech/2038.html

in 2038 due to the way computers store and process time data. According to William Porquet's writings, the issue arises from the fact that many computer systems use a 32-bit repre

SmartFilter - I've Got A Little List

http://sethf.com/anticensorware/smartfilter/gotalist.php

mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study

NLnet; All projects

https://nlnet.nl/project/

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

GNU's Who - GNU Project - Free Software Foundation (FSF)

http://www.gnu.msn.by/people/people.html

nothing to do with computers. Thomas was renamed from Michael Bushnell in 1996. Robert J. Chassell is speaking on free software topics and working to bring better documentation to


Find more...