wiby  
Settings



"Do It Better: SSH" by Colin Cogle

http://colincogle.name/blog/do-it-better/ssh/

faster and cheaper, and encryption has become almost frictionless, it's long since replaced Telnet for configuring embedded devices. In fact, even Microsoft acquiesced and made SS
SSH is easy to secure, but that doesn't mean there isn't more work to be done.

What is this Gemini thing anyway, and why am I excited about it? | Lobsters

https://lobste.rs/s/ivryqt/what_is_this_gemini_thing_anyway_why_am_i

optional end-to-end encryption because when working with internal routers within an infrastructure dealing with certificates is a PITA and a completely unnecessary bump in complex
120 comments

CLI Club: Command-line Interface Tools & Alternatives

https://cli.club/

completion, OpenPGP encryption, OTR (Off-the-Record Messaging) support, dynamic modules and external action triggers. Matrix iamb: A Matrix client for Vim addicts iamb is a Matrix
A collection of the best CLI

Email Privacy - PGP Made Easy: How to Keep Your Emails Private

http://www.cyberwolfman.com/emailprv.htm

and telling them about encryption and how to use it.  If you want to donate a dollar to help keep this site alive ( click here ), that's up to you, but it's not necessary.&nb
Tells you an extremely easy way to keep your emails private for free.

Self Hosting | LandChad.net

https://landchad.net/selfhosting/

up a webserver because encryption) Static or dynamic IP address If you want to host your server at home, make sure you have a static IP address, or you can change your dynamic IP
Introduction When you have a(n old) computer lying around, and you have cheap electricity and a good internet connection, self hosting might be a good option for you.Why would you

Unix/Linux Commands, Syntax, And Notes

https://zerocontradictions.net/programming/linux-commands-notes

go through the encryption algorithm so that the system can compare it with the password on the system, which is also encrypted. It’s easy to go from the clear form to the en
This webpage features a summary of commands and information from the Unix Programming Environment, and other commands and information compiled from other sources.

Devuan-Based Distributions | Devuan GNU+Linux Free Operating System

https://www.devuan.org/os/devuan-distros

applications that use encryption, the Tor network, or the i2p network, to securely and anonymously share files, video, voice, and more. ThomOS ThomOS (formerly Crunkbong) is a swi
Free GNU+Linux base OS. Devuan is a fork of Debian without systemd. Devuan provides a safe upgrade path from Debian, to ensure the right to Init Freedom and avoid entanglement.

Background on ITAR Controversy

http://offshore.com.ai/arms-trafficker/itar.html

you agree that sending encryption software over the Internet should not be thought of as "trafficking in arms", please protest ITAR by using the http://online.offshore.com.ai/arms

Why? - 10kB Gallery

https://10kb.neocities.org/about/why

it a glamorous name. "Encryption" and "free software" were only spoken of in mailing lists amongst other geeks. In 2013, in the post–Snowden world, all of that changed. The Intern


Find more...