Peter Neumann's Home Pagehttps://www.csl.sri.com/users/neumann/
here indicates that an individual is no longer alive -- although I have probably missed a few tagged.) I gave a keynote talk, Identity and Trust in Context, for IDtrust 2009 at NI
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
_have_ to trust any one individual or system. So, people who want real security use a chain of remailers. If any one remailer on the "chain" is honest, then the privacy of the mes
OS-9 Frequently Asked Questionshttps://pages.cs.wisc.edu/~pruyne/os9faq.html
to contact the individual companies listed in the Sourcebook and request a recent catalog, as the information in the Sourcebook is a tad outdated. Microware's quarterly magazine P
Internet Term Guidehttp://webarchive.me/geocities/SiliconValley/5598/talk.html
funded and operated by individuals or organizations much like public television. Freenet providers are part of the National Public Telecomputing Network (NPTN), a Cleveland-based
How to start with CP/Mhttp://www.retrotechnology.com/dri/howto_cpm.html
was designed to allow individuals to do so. One person who provided many CP/M boot disks in the 1990's was Don Maslin. As of 2003 there is a on Gaby's CP/M Web site, a list of wha
Participation in the information agehttps://gotze.dk/phd/it.html
participation by the individuals in the society: "Since communication is the record of human growth, it has to be very varied. It has to get rid of the idea that communicatio
Scientology v. the Internethttps://www.discord.org/lippard/skeptic/03.3.jl-jj-scientology.html
to use, the ability of individuals to create and spread their own messages is enhanced, and control over the flow of knowledge becomes decentralized. Institutions and individuals
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
is presented in the individual tag descriptions , in their Allowed context and Contents parts. Here it is presented in a compact form. This form does not cover all details but mig
John Gilmore's home pagehttp://www.toad.com/gnu/
freedom and privacy for individuals. These compete with "cloud-based" services that put your privacy and your freedom under the control of third parties who don't have your intere
http://www.catb.org/jargon/oldversions/jarg262.txthttp://www.catb.org/jargon/oldversions/jarg262.txt
to try to subsume under individual entries. Though the format is that of a reference, it is also intended that the material be enjoyable to browse or read straight through. Even a
https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txthttps://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt
systems...rights of the individual to be secure from random searches + or invasive tactics to catch criminals, regulate behavior, and control the population - the legitimate needs
Find more...