WELCOME

I try to keep this Index.html page simple and clean. Everything should be in Alphabetical order

Due to my need to return to older posts, I will use time stamps within the .txt document.

I will also be refining many of these .txt files down. However the .pdf documents will never be removed, but more may be added in the future.

EMACS

Documentation on Emacs

  • EmacsLearningAndCommands.txt
  • GNU/LINUX

    Documentation on GNU/LINUX

  • ArgumentsAgainstRicing.txt
  • DefenseOfFreetardism.txt
  • DefenseOfRMS.txt
  • DistroList.txt
  • FOSS.txt
  • LinuxDesktopEnvironments.txt
  • PersistentUSB.txt
  • SoftwareForPrivacy.txt
  • SoftwareMinimalism.txt
  • Systemd.txt
  • TheDistributionGiants.txt
  • MISC

    Misc Lists and Readings

  • ADigestOfDeduction.txt
  • ChanList.txt
  • EDC.txt
  • LibraNotLibre.txt
  • Manifesto.txt
  • MonthlyGroceryList.txt
  • MovieList.txt
  • MusicList.txt
  • MyAnimeList.txt
  • OCPD.txt
  • PoisonousPlants.txt
  • PokemonDexList.txt
  • ThinkpadTimeline.txt
  • UnconvntionalSelfDefense.txt
  • WorkoutRoutine.txt
  • OSINT

    Open Source Intelligence Writings

  • DoxingIntroAndMethodology.txt
  • IntroToOSINT.txt
  • POLITIC

    Writings and Positions on Politics

  • AnarchismSchoolsOfThought.txt
  • PoliticalPartyProblem.txt
  • SEC+

    Additional Security Readings

  • CommonUtilityKeys.txt
  • DecenetralizedInternet.txt
  • HowToDisappear.txt
  • Onions.txt
  • RemoveYourFingerprints.txt
  • Resources.txt
  • SecurityForTheParanoidUser.txt
  • TSAMasterKeys.txt
  • STORIES

    Writing Ideas and Short Stories

  • Offline.txt
  • SerialCult.txt
  • Session1.txt
  • TechnoPaganism.txt
  • COMPSEC

    Documentation on Computer Science and Security

  • Anonymity.pdf
  • AnonymousSecurityHandbook.pdf
  • CompSecIncidentHandling.pdf
  • COPInfoSecManagement.pdf
  • Crypto101.pdf
  • CryptoParty.pdf
  • ISOIEC270012013.pdf
  • PrivacyForIdentities.pdf
  • SecAndCounterSurveillance.pdf
  • SecManagmentSystemsReq.pdf
  • SecuringOnlinePersonas.pdf
  • LOCKPICKING

    Documentation on Lockpicking and Lockpicking Tools

  • BnE.pdf
  • BurglarAlarms.pdf
  • CIALockPicking.pdf
  • CompleteGuideToLockpicking.pdf
  • Handcuffs.pdf
  • KeyBlanks.pdf
  • Keys.pdf
  • LSIGuide.pdf
  • MakingLockTools.pdf
  • OptDecode.pdf
  • Padlocks.pdf
  • PracticalLockpicking.pdf
  • SafecrackingComputerScientist.pdf
  • SecretsOfLockPicking.pdf
  • TechniquesOfSafecracking.pdf
  • ThisKeyIsYourKey.pdf
  • UsingALockPickGun.pdf
  • OTHER FILES

  • IndustrialSocietyAndItsFuture.pdf
  • OTHER SITES

  • Brutalist Web
  • Scambaiting Toolbox
  • DigDeeper
  • Drizzybot
  • Panopticlick
  • PRISM Break
  • Sherlock
  • Spyware
  • CONTACT

    ELDRITCHDATA@TUTA.IO

    The internet is a cruel and horrible place

    THE SACRED CHANT

    What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called "Linux", and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called "Linux" distributions are really distributions of GNU/Linux. - Richard Stallman

    END OF LINE