wiby  
Settings



Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their

Wesley Moore

https://www.wezm.net/v2/

and tinkering with computers; ranging from small microcontrollers, up to large servers and the operating systems that run upon them. I’m a Rustacean 🦀 with a fondness for mechanic

Quoth the Raven, "Welcome!"

http://linuxmafia.com/

old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System

Debian Disguised Work

http://disguised.work/

get direct control from computers [1] , and apparently not banned from the official community for doing so. I’m not enthusiastic enough to do this, I’ve got plenty of other free s

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.


Find more...