Q4OS - desktop operating systemhttps://q4os.org/blog.html
tablets, single board computers, embedded devices and more. Q4OS on ARM devices runs fast and is pretty snappy. Q4OS is one of the few distributions that offers a full featured de
DEC VAX Historyhttp://williambader.com/museum/vax/vaxhistory.html
1 is entitled VAX: COMPUTERS FOR THE '80s and has a picture of a VAX-11/750 in front of a VAX-11/780. The chapter starts by explaining that The letters VAX suggest the premier fea
TinkerDifferenthttps://tinkerdifferent.com/
line of notebook computers, sold between 1991 and 2006. 271 2.6K Sub-forums Sub-forums Macintosh Portable PowerBook (68k-based) PowerBook (PowerPC-based) PowerBook G3 & iBook
A community of tinkerers dedicated to vintage computing.
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
C-Kermit 9.0 General Hints and Tipshttps://www.kermitproject.org/ckcbwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
SM5BSZ Home Pagehttp://www.sm5bsz.com/
works on standard PC computers. (IBM-compatible, x86) Linrad was developed under the Linux operating system but it is available also for Microsoft Windows as well as for FreeBSD.
WA8LMF Useful Links Pagehttp://wa8lmf.net/links/
anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks
Wesley Moorehttps://www.wezm.net/v2/
and tinkering with computers; ranging from small microcontrollers, up to large servers and the operating systems that run upon them. I’m a Rustacean 🦀 with a fondness for mechanic
Find more...