wiby  
Settings



Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

Virtual AGC Colossus Page

http://www.ibiblio.org/apollo/Colossus.html

occur in the modern computers you're familiar with.  Sign disagreement is when the more-significant and less-significant halves of a double-precision value have opposite arit

scottnesbitt.net

https://scottnesbitt.net/

Ensemble: Making Old Computers New Again" (December 10, 2004) "Creating PDFs in Linux" (March 25, 2005) "The New Face of Desktop Publishing for Linux" (May 6, 2005) "Choosing a Li

TI Rambles February 2025

http://stephen.shawweb.co.uk/rambles25/R2025.html

own companies using HP computers including a computer time- sharing service (eg he provided the host computer). He moved to TI900/10 or 12 using DX10, and transferred financial pr
TI-99


Find more...