Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
scheduling, memory management, device drivers and little else. Everything else such as the network stack, input handling, the filesystem and every other component you may think of
TshwaneDJe Software: David Joffe - Resume / CVhttps://tshwanedje.com/members/djoffe/cv.html
tlTerm Terminology Management Software , tlCorpus Concordance Software , tlDatabase data editing software , and has developed many websites, commercial and otherwise. Prior to co-
David Joffe - Resume
CLI Club: Command-line Interface Tools & Alternativeshttps://cli.club/
automatic contact-list management, custom code insertion via a Ruby hook system, and more. If you’re the type of person who treats email as an extension of your long-term memory,
A collection of the best CLI
Solene'%https://dataswamp.org/~solene/index-full.html
to do cyber risk management the way they want, which is unique. A quick word about it if you are not familiar with risk management: for instance, when running software at differen
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
in the Java Management Extensions (JMX) MBean components, unprivileged Java code can access restricted classes. By using that vulnerability in conjunction with a second vulnerabil
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
The TTY demystifiedhttp://linusakesson.net/programming/tty/index.php
this article. Session management. The user probably wants to run several programs simultaneously, and interact with them one at a time. If a program goes into an endless loop, the
Find more...