wiby  
Settings



Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

scheduling, memory management, device drivers and little else. Everything else such as the network stack, input handling, the filesystem and every other component you may think of

TshwaneDJe Software: David Joffe - Resume / CV

https://tshwanedje.com/members/djoffe/cv.html

tlTerm Terminology Management Software , tlCorpus Concordance Software , tlDatabase data editing software , and has developed many websites, commercial and otherwise. Prior to co-
David Joffe - Resume

CLI Club: Command-line Interface Tools & Alternatives

https://cli.club/

automatic contact-list management, custom code insertion via a Ruby hook system, and more. If you’re the type of person who treats email as an extension of your long-term memory,
A collection of the best CLI

Solene'%

https://dataswamp.org/~solene/index-full.html

to do cyber risk management the way they want, which is unique. A quick word about it if you are not familiar with risk management: for instance, when running software at differen

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

in the Java Management Extensions (JMX) MBean components, unprivileged Java code can access restricted classes. By using that vulnerability in conjunction with a second vulnerabil
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

The TTY demystified

http://linusakesson.net/programming/tty/index.php

this article. Session management. The user probably wants to run several programs simultaneously, and interact with them one at a time. If a program goes into an endless loop, the


Find more...