Kermit Software Source Code Archivehttps://www.kermitproject.org/archive.html
] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ END MATTER ] Welcome to what might be the biggest collection on earth of software source code for
Quoth the Raven, "Welcome!"http://linuxmafia.com/
old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System
Debian Disguised Workhttp://disguised.work/
systems known as “supercomputers”), which nowadays power over 80% of the Top500 supercomputer list and are the computer platform of choice of practically all data centers. RAD Lab
Faces Archivehttps://kinzler.com/ftp/faces/
for PalmOS handheld computers to include an X-Face in Address Book entries. Includes software for X-Face image conversion under Windows. Mirrored occasionally from <URL:http://
Collected and mirrored sources for software that can use picons databases containing personal icons of users, domains and newsgroups on the net.
Why? - 10kB Galleryhttps://10kb.neocities.org/about/why
times were simple. Computers were owned by the rich and the nerdy — the programs created by the select few who had the privilege and the time to spend on the magic box that we cal
OpenBSD Router Guidehttps://openbsdrouterguide.net/
but it can protect your computers and devices on the inside of the network, and it can help you monitor and control the traffic that comes and goes to and from your local network.
On the xz-utils backdoorhttps://andrewdmorrow.com/on-the-xz-utils-backdoor.html
(and arguably before computers took over the world). They sprang up in the early 90's and remain largely unchanged. Relationships of trust which were appropriate to a hobbyist pro
Trust The Linux ecosystem (the kernel and distros like Ubuntu, Debian, and Fedora; which together form the backbone of modern digital infrastructure) operates on multiple distinct
XML Linking Language (XLink) Version 1.1https://www.w3.org/TR/xlink/
for consumption by computers. 2.2 Arcs, Traversal, and Behavior [ Definition : Using or following a link for any purpose is called traversal .] Even though some kinds of link can
https://www.ietf.org/rfc/rfc5228.txthttps://www.ietf.org/rfc/rfc5228.txt
of SI units that computers frequently use, "K" specifies kibi-, or 1,024 (2^10) times the value of the number; "M" specifies mebi-, or 1,048,576 (2^20) times the value of the numb
Old Cavebear Bloghttps://www.cavebear.com/old_cbblog/
was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin
Find more...