wiby  
Settings



Peter Neumann's Home Page

https://www.csl.sri.com/users/neumann/

here indicates that an individual is no longer alive -- although I have probably missed a few tagged.) I gave a keynote talk, Identity and Trust in Context, for IDtrust 2009 at NI

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

_have_ to trust any one individual or system. So, people who want real security use a chain of remailers. If any one remailer on the "chain" is honest, then the privacy of the mes

OS-9 Frequently Asked Questions

https://pages.cs.wisc.edu/~pruyne/os9faq.html

to contact the individual companies listed in the Sourcebook and request a recent catalog, as the information in the Sourcebook is a tad outdated. Microware's quarterly magazine P

Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

funded and operated by individuals or organizations much like public television. Freenet providers are part of the National Public Telecomputing Network (NPTN), a Cleveland-based

How to start with CP/M

http://www.retrotechnology.com/dri/howto_cpm.html

was designed to allow individuals to do so. One person who provided many CP/M boot disks in the 1990's was Don Maslin. As of 2003 there is a on Gaby's CP/M Web site, a list of wha

Participation in the information age

https://gotze.dk/phd/it.html

participation by the individuals in the society: "Since communication is the record of human growth, it has to be very varied. It has to get rid of the idea that communicatio

Scientology v. the Internet

https://www.discord.org/lippard/skeptic/03.3.jl-jj-scientology.html

to use, the ability of individuals to create and spread their own messages is enhanced, and control over the flow of knowledge becomes decentralized. Institutions and individuals

Learning HTML 3.2 by Examples

https://www.fi.muni.cz/~hales/html/jk.html

is presented in the individual tag descriptions , in their Allowed context and Contents parts. Here it is presented in a compact form. This form does not cover all details but mig

John Gilmore's home page

http://www.toad.com/gnu/

freedom and privacy for individuals. These compete with "cloud-based" services that put your privacy and your freedom under the control of third parties who don't have your intere

http://www.catb.org/jargon/oldversions/jarg262.txt

http://www.catb.org/jargon/oldversions/jarg262.txt

to try to subsume under individual entries. Though the format is that of a reference, it is also intended that the material be enjoyable to browse or read straight through. Even a

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

systems...rights of the individual to be secure from random searches + or invasive tactics to catch criminals, regulate behavior, and control the population - the legitimate needs


Find more...