Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their
Sniffin' the Ether v2.0http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html
to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur
Tools I Usehttps://domainofheraclius.info/tools/
Links Tools I Use I use computers a lot , and as a result I use a lot of software and hardware tools from day to day. I also have "opinions". This page contains a summary of the s
Photogallery Script - Create HTML gallery from image fileshttps://www.kermitproject.org/photogallery.html
was scarce, and desktop computers were slow. Its "default" mode of operation (that is, how it works unless you instruct it otherwise) is tailored to that environment: It resizes y
Greg's Domainhttp://wooledge.org/~greg/index2.html
taken some photos . Computers I use Debian GNU/Linux and OpenBSD on cheap x86 hardware. Windows has its place (preferably the trash bin), but I'll take a free Unix system any day.
Todos los enlaces @ cidoku.nethttp://cidoku.net/links/all
browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys/pdf/DEBUG.TXT
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
What made the PC, Mac, and Linux so great (or not)http://toastytech.com/guis/macvspc.html
What made Personal Computers great The story of the "Personal Computer" started before the IBM PC. The earliest personal computers included machines such as the Altair, TRS-80, Co
Emergent Technologies Inc. -- Security Kernel</TITLEhttp://mumble.net/~jar/pubs/secureos/secureos.html
available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR
Linux commands and fileshttp://webarchive.me/geocities/SiliconValley/2072/linux.htm
It stores the names of computers on the LAN. This works sort of like DNS, except that instead of running a dedicated name server, it's just a table of addresses and corresponding
Find more...