wiby  
Settings



Q4OS - desktop operating system

https://q4os.org/blog.html

tablets, single board computers, embedded devices and more. Q4OS on ARM devices runs fast and is pretty snappy. Q4OS is one of the few distributions that offers a full featured de

DEC VAX History

http://williambader.com/museum/vax/vaxhistory.html

1 is entitled VAX: COMPUTERS FOR THE '80s and has a picture of a VAX-11/750 in front of a VAX-11/780. The chapter starts by explaining that The letters VAX suggest the premier fea

TinkerDifferent

https://tinkerdifferent.com/

line of notebook computers, sold between 1991 and 2006. 271 2.6K Sub-forums Sub-forums Macintosh Portable PowerBook (68k-based) PowerBook (PowerPC-based) PowerBook G3 & iBook
A community of tinkerers dedicated to vintage computing.

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

SM5BSZ Home Page

http://www.sm5bsz.com/

works on standard PC computers. (IBM-compatible, x86) Linrad was developed under the Linux operating system but it is available also for Microsoft Windows as well as for FreeBSD.

WA8LMF Useful Links Page

http://wa8lmf.net/links/

anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin    Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks

Wesley Moore

https://www.wezm.net/v2/

and tinkering with computers; ranging from small microcontrollers, up to large servers and the operating systems that run upon them. I’m a Rustacean 🦀 with a fondness for mechanic


Find more...