Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin
Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
Virtual AGC Colossus Pagehttp://www.ibiblio.org/apollo/Colossus.html
occur in the modern computers you're familiar with. Sign disagreement is when the more-significant and less-significant halves of a double-precision value have opposite arit
scottnesbitt.nethttps://scottnesbitt.net/
Ensemble: Making Old Computers New Again" (December 10, 2004) "Creating PDFs in Linux" (March 25, 2005) "The New Face of Desktop Publishing for Linux" (May 6, 2005) "Choosing a Li
TI Rambles February 2025http://stephen.shawweb.co.uk/rambles25/R2025.html
own companies using HP computers including a computer time- sharing service (eg he provided the host computer). He moved to TI900/10 or 12 using DX10, and transferred financial pr
TI-99
Find more...