Q4OS - desktop operating systemhttps://q4os.org/blog.html
tablets, single board computers, embedded devices and more. Q4OS on ARM devices runs fast and is pretty snappy. Q4OS is one of the few distributions that offers a full featured de
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin
DEC VAX Historyhttp://williambader.com/museum/vax/vaxhistory.html
1 is entitled VAX: COMPUTERS FOR THE '80s and has a picture of a VAX-11/750 in front of a VAX-11/780. The chapter starts by explaining that The letters VAX suggest the premier fea
TinkerDifferenthttps://tinkerdifferent.com/
line of notebook computers, sold between 1991 and 2006. 262 2.5K Sub-forums Sub-forums Macintosh Portable PowerBook (68k-based) PowerBook (PowerPC-based) PowerBook G3 & iBook
A community of tinkerers dedicated to vintage computing.
Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
wingologhttp://wingolog.org/
america bdw compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme s
Looking at Windows Vista | Peter Torpeyhttps://petertorpey.com/articles/windows_vista.html
familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A
C-Kermit 9.0 General Hints and Tipshttps://www.kermitproject.org/ckcbwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl
Libreboot ā Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
Wesley Moorehttps://www.wezm.net/v2/
and tinkering with computers; ranging from small microcontrollers, up to large servers and the operating systems that run upon them. Iām a Rustacean š¦ with a fondness for mechanic
RISC OS Open: About ushttps://www.riscosopen.org/content/about
worked for Acorn Computers. The ROOL team is able to help partners and customers to quickly integrate, optimise and deploy efficient RISC OS based solutions in order to take advan
Find more...