#youbroketheinternet (YBTI)https://youbroketheinternet.org/
obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet
100R — off the gridhttp://100r.co/site/off_the_grid.html
energy to power our computers. By looking at the forecast, we can determine when we will get the most work done: consecutive days of sun grant us enough power for video editing, w
pketh.orghttp://Pketh.org/
brain from coding-for-computers to writing-for-humans is a violent gesture. It takes a lot of force and focus to pull that rusty mental switch. So when writing mode finally does c
Making things simple, radical and beautiful
Brooklyn Camera/Electronic Dealer StoreFrontshttps://www.donwiss.com/pictures/BrooklynStores/
people at desks with computers and this sign on the door confirms they are inside. 29 Aeon Batteries Corp., stores.ebay.com/usadigishop-Inc, myworld.ebay.com/usadigi
A collection of pictures of the actual storefronts behind the websites of camera and electronics dealers based in Brooklyn, NY (and Queens).
Frequently asked questions - FAQhttp://www.visualvision.com/create_a_web_site_manual/your_own_website_creation_software_00002f.htm
are universal on all computers? Yes, Times New Roman, Arial and Courier New. If the user has MSWindows+Office usually also Verdana and some others. It is not possible to di
This page is about games> <
Resume for Donald Edward Hopkinshttps://www.donhopkins.com/home/resume.html
][, C64, and BBC microcomputers. Designed some video games and animated sprite packages, and wrote utilities in 6502 assembly. Supported a co-worker writing educational software u
How to choose a browser for everyday use?http://digdeeper.love/articles/browsers.xhtml
sync to Chrome on other computers and devices. Synced data can include bookmarks, saved passwords, open tabs, browsing history, extensions, addresses, phone numbers, payment metho
The Gig Economy — Chadnethttps://wiki.chadnet.org/the-gig-economy
their ability to break computers in ways far beyond the reach of the layman. The three of us were united by a shared interest in a certain kind of esoteric book. In our modern age
The greatest website on the interwebz!
How You Are Reading This Pagehttps://sheep.horse/2017/10/how_you_are_reading_this_page.html
these devices are just computers in disguise. displays the new page for you to read. But how does that work? What happens to get a web page from wherever they are stored to your e
We use the Internet every day and most of us take it for granted that you click on a link and your computer displays the new page for you to...
The Anatomy of a Search Enginehttp://infolab.stanford.edu/~backrub/google.html
As the capabilities of computers increase, it becomes possible to index a very large amount of text for a reasonable cost. Of course, other more bandwidth intensive media such as
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
Loper OS » "Pest" v. 0xFB.http://www.loper-os.org/?p=4003
Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr
Find more...