N6XRE DokuWiki

This is an old revision of the document!


1. Asustor AS5202T NAS - Linux Btrfs Blog Posts

2. How To Use Raspberry Pi Cameras with Bullseye

3. Raspberry Pi & LoRaWAN Gateway

4. N6XRE Tiddlywiki

5. The Jupyter Notebook - Software

Top


6. Encryption

7. Project Gutenberg - AESOP, IN RHYME; OR, OLD FRIENDS IN A NEW DRESS

8. Geek's Lesson channel

9. Talk to Transformer

Top
Transformer replied to - Stalking and Criminal Threats - https://pastebin.com/rXpAfvHV
https://talktotransformer.com/
Intel NCSM2450.DK1 Movidius Neural Compute Stick Amazon Price:$69.99
Movidius NCS + Raspberry Pi 3B+ Youtube - I Ching Online

Talk to Transformer

Top
https://github.com/openai/gpt-2 - Coding TensorFlow Youtube - https://www.tensorflow.org/tutorials
Openai_gpt-2_Language_Models_are_Unsupervised_Multitask_Learners.pdf


How To Set Up Jupyter Notebook with Python 3 on Ubuntu 18.04
This How To Set Up Jupyter Notebook with Python 3 on Ubuntu 18.04.pdf

    To access the notebook, open this file in a browser:
        file:///home/garyrust/.local/share/jupyter/runtime/nbserver-27409-open.html
    Or copy and paste one of these URLs:
        http://localhost:8888/?token=ea8815acd4b2ca572ca67530395011b3379741e110f5e7dd
     or http://127.0.0.1:8888/?token=ea8815acd4b2ca572ca67530395011b3379741e110f5e7dd

    Use the token of your install

Google Colab: An easy way to learn and use TensorFlow - Colaboratory
Learn how to morph faces with a Generative Adversarial Network!

10. PlutoTV

11. Homemade computer chips / integrated circuits

12. Mini-Nuclear Reactors Are Coming

13. The Living Universe - Documentary about Consciousness and Reality | Waking Cosmos

14. Crime Mapping

Top
https://www.crimemapping.com/map/nv/lasvegas

Top
December’s Most Wanted Malware:
Crypto-Miners Affect 55% of Businesses Worldwide




Why I won't work a developer job anymore
https://youtu.be/MbUvTbD9q4A


Selling Wedding dresses in a brick and mortar store is just another jail.
It couldn't be done honestly without going bankrupt. (it's an occult death cult).
Click
Proto School

15. Stalking and Internet Fraud

Top
Internet Crime Complaint Center (IC3) | Prevention Tips
I'm not trying to cause a problem. Quite the opposite.
Manets are an essential part of security using Ham Radio Repeaters. - IPFS is good for ships at sea.
Compare load times for IPFS - List of human habitation forms and HTTP - List of human habitation forms.
IPFS loads to cache. It takes time to make the P2P connection - but it is like bittorrent, hashed, and secure.
CW - Manet - Firewalls - But how does bitcoin actually work? - Herman Lamm
Also see Internet Ports Blocked or Restricted by Cox and Arp Spoofing below
https://www.fbi.gov/scams-and-safety/common-fraud-schemes/internet-fraud


Top
Click - Talk to Transformer
Herman Lamm’s Stopwatch
Top
https://youtu.be/ph8187hyDVA

Top
https://www.youtube.com/playlist?list=PLaVOO-BHQYREFho-Vak2NeBOuaLB153e_

Top
“Any person who willfully threatens to commit a crime which will result in
death or great bodily injury to another person, with the specific intent
that the statement, made verbally, in writing, or by means of an electronic
communication device, is to be taken as a threat, even if there is no intent
of actually carrying it out, which, on its face and under the circumstances
in which it is made, is so unequivocal, unconditional, immediate, and specific
as to convey to the person threatened, a gravity of purpose and an immediate
prospect of execution of the threat, and thereby causes that person reasonably
to be in sustained fear for his or her safety or for his or her immediate
family's safety.”
Top
Stalking and Signal Threats


Cause =⇒ Effect — NEVER Effect =⇒ Cause — ONLY ONE WAY
Faster than Light?
https://en.wikipedia.org/wiki/Racketeer_Influenced_and_Corrupt_Organizations_Act

QR Code
QR Code start2 (generated for current page)