Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin
Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their
Wesley Moorehttps://www.wezm.net/v2/
and tinkering with computers; ranging from small microcontrollers, up to large servers and the operating systems that run upon them. I’m a Rustacean 🦀 with a fondness for mechanic
Quoth the Raven, "Welcome!"http://linuxmafia.com/
old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System
Debian Disguised Workhttp://disguised.work/
get direct control from computers [1] , and apparently not banned from the official community for doing so. I’m not enthusiastic enough to do this, I’ve got plenty of other free s
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
Find more...