wiby  
Settings



Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their

SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

Ayham's Online Website | A Practical Guide to GnuPG

https://ayham.xyz/posts/a-practical-guide-to-gpg/

keys to other computers and using online services like Github and Codeberg. Generating GnuPG Master-keys GnuPG uses asymmetric encryption, which means that you would use 2 keys. P

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Looking at Windows Vista | Peter Torpey

https://petertorpey.com/articles/windows_vista.html

familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A

Web Hosting: Dedicated Servers (thefreecountry.com)

https://www.thefreecountry.com/webhosting/dedicated-servers.shtml

servers are basically computers that have a single function: to host and run the websites you place on them. Unlike shared web hosting where you have to share your disk space, CPU
Reviews of web hosts providing dedicated servers, where your website does not share a computer with other customers.

Trends and the Future of Computing and the Internet

http://mrp3.com/trends.net.html

of the art. But today's computers often have multiple cores and operate at speeds far in excess of 2Ghz, have gigabytes of RAM, terabytes of disk storage, and video resolution bet

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

40th Anniversary Kermit protocol

https://kermitproject.org/fortieth.html

possible variety of computers and operating systems including our own DEC-20 mainframes , our IBM mainframes , and the " Superbrain " CP/M microcomputer we were about to place in

BiMAVs; Bipedal Mechanized Assault Vehicles

http://www.bimavs.com/

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

millions of infected computers connecting to them, and counting the increasing number of Mac machines. Can you say "this was a religious debate?" Well, I can, which is why the res


Find more...