wiby  
Settings



FREE SOFTWARE FOR DOS — Disk Utils – 1

https://www.bttr-software.de/freesoft/disk1.htm

HARD DISK PARTITION MANAGEMENT HARD DISK FILE SYSTEMS & DRIVERS HARD DISK ANALYSIS, REPAIR, RECOVERY DISK EDITORS DISK WIPERS CD-ROM UTILS Other page:

Spyware Warrior

http://www.netrn.net/spywareblog/

of the commenter. Management takes no responsibility for the views expressed in comments. Disclosure In April 2005, I began doing part time consulting work for Sunbelt Software, m

The Anatomy of a Search Engine

http://infolab.stanford.edu/~backrub/google.html

Conference On Management Of Data, 1994. [Kleinberg 98] Jon Kleinberg, Authoritative Sources in a Hyperlinked Environment , Proc. ACM-SIAM Symposium on Discrete Algorithms, 1998. [

Analog Office - Analog Office

https://analogoffice.net/

Similarly for task management, I ran on ToDoist for a long time as well as the fun platform Habitica. I used ToDoist to manage GTD type work and Habitica for my habits. I was very

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2008/

the internal objectives management tool. Lots of misc. admin, status reporting, bug tweaking and other paperwork. 2008-11-13: Thursday. Poked at mail, and bugs. Is it a co-inciden

The Machine Fired Me

https://idiallo.com/blog/when-a-machine-fired-me

: I worked in "Identity Management" for a big corp for too long and have to absolutely agree with your story. We were transitioning to a new ID-system including asset-management a
When computers handle big life altering decisions in a company, there needs to be an override for humans to take over. Otherwise, well, they fire employees.

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

without reporting it to management. If the virus was contained because of the effectiveness of anti-virus products, the likelihood of it being reported to our survey researchers w

The Hacker's Diet

https://www.fourmilab.ch/hackdiet/

from an engineering and management standpoint, and provides the tools and an understanding of why they work and how to use them that permit the reader to gain control of their own
The Hacker's Diet: How to lose weight and hair through stress and poor nutrition

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

Cookies and Session Management" reddit's /r/hacking reddit's /r/HowToHack reddit's /r/bugbounty Some people say: learn from the bottom up, learn the details of protocols and langu
How to become a bug-bounty hunter and do penetration testing

A plea against Micro$oft

http://www.madore.org/~david/computers/antims.html

to discover. Remote management, or the possibility of doing everything through a network. The system administrator of a Unix network rarely has to leave his office to actually see
A plea against Micro$oft by David Madore lang=en

Luke Smith Fanclub & Archive

https://lukesmith.neocities.org/

logical volume management; installation covers configuring portage, setting up a secure and efficient system, kernel compilation, and configuring various system services; customiz
LukeSmith.xyz fanclub and archive – removed articles, lost videos, and community opinions. Explore content no longer on lukesmith.xyz.

Julia Evans

https://jvns.ca/

PaperWM: tiled window management for GNOME Oct 2019 SQLite is really easy to compile Mar 2019 Why are monoidal categories interesting? Nov 2018 Tailwind: style your site without w
Julia Evans


Find more...