#youbroketheinternet (YBTI)https://youbroketheinternet.org/
obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet
Roger Clarke's Cookies Pagehttp://www.rogerclarke.com/II/Cookies.html
Privacy of Users' Computers, Activities' by Lee Gomes, San Jose Mercury News, February 13, 1996, distributed by Phil Agre on his rre service, and referring to earlier but unspecif
Peter Neumann's Home Pagehttps://www.csl.sri.com/users/neumann/
of the ACM Committee on Computers and Public Policy (CCPP), which I chaired since 1985 -- until it was disbanded in 2018 as part of a complete reorganization of ACM committees. (T
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
My Sailboat 'Magnolia'https://www.billdietrich.me/Magnolia.html
and other public computers in the USA. Yes, theoretically it is possible that an ISP or internet cafe could capture your info. Probably most likely threat is that a computer in an
My sailboat 'Magnolia', a 1973 Gulfstar 44 motor-sailer pilothouse ketch in the Caribbean
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
Project 2038 FAQhttp://maul.deepsky.com/~merovech/2038.html
in 2038 due to the way computers store and process time data. According to William Porquet's writings, the issue arises from the fact that many computer systems use a 32-bit repre
SmartFilter - I've Got A Little Listhttp://sethf.com/anticensorware/smartfilter/gotalist.php
mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study
NLnet; All projectshttps://nlnet.nl/project/
ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent
Asterisk™: The Definitive Guidehttp://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html
of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged
GNU's Who - GNU Project - Free Software Foundation (FSF)http://www.gnu.msn.by/people/people.html
nothing to do with computers. Thomas was renamed from Michael Bushnell in 1996. Robert J. Chassell is speaking on free software topics and working to bring better documentation to
Find more...