wiby  
Settings



Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their

Sniffin' the Ether v2.0

http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html

to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur

Tools I Use

https://domainofheraclius.info/tools/

Links Tools I Use I use computers a lot , and as a result I use a lot of software and hardware tools from day to day. I also have "opinions". This page contains a summary of the s

Photogallery Script - Create HTML gallery from image files

https://www.kermitproject.org/photogallery.html

was scarce, and desktop computers were slow. Its "default" mode of operation (that is, how it works unless you instruct it otherwise) is tailored to that environment: It resizes y

Greg's Domain

http://wooledge.org/~greg/index2.html

taken some photos . Computers I use Debian GNU/Linux and OpenBSD on cheap x86 hardware. Windows has its place (preferably the trash bin), but I'll take a free Unix system any day.

Todos los enlaces @ cidoku.net

http://cidoku.net/links/all

browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys/pdf/DEBUG.TXT

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

What made the PC, Mac, and Linux so great (or not)

http://toastytech.com/guis/macvspc.html

What made Personal Computers great The story of the "Personal Computer" started before the IBM PC. The earliest personal computers included machines such as the Altair, TRS-80, Co

Emergent Technologies Inc. -- Security Kernel</TITLE

http://mumble.net/~jar/pubs/secureos/secureos.html

available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR

Linux commands and files

http://webarchive.me/geocities/SiliconValley/2072/linux.htm

It stores the names of computers on the LAN. This works sort of like DNS, except that instead of running a dedicated name server, it's just a table of addresses and corresponding


Find more...