wiby  
Settings



Linux commands and files

http://webarchive.me/geocities/SiliconValley/2072/linux.htm

system). It's like a programming variable, except those are used in programming. Both DOS and Linux let you set and store them. To see a list of current environment variables and

TshwaneDJe Software: David Joffe - Resume / CV

https://tshwanedje.com/members/djoffe/cv.html

He sometimes does programming livestreams . He is also a part-time artist , and is pro-revival of the tradition of beauty and skill in art. Recent work includes implementation of
David Joffe - Resume

Rob Savoye

http://www.welcomehome.org/rob.html

administration, system programming. I'm also a long-time GNU/Linux hacker, and member of the GNU project. Email me if you have any projects that could use my assistance. The main
My page has a lot of information oncomputers, ice, rock, and mountain climbing, appropriate alternatetechnlogies, and alternativre lifestyles...

Loper OS » No Formats, no Format Wars.

http://www.loper-os.org/?p=309

Have you discovered a programming language in which it is impossible to write obfuscated code? Reply Stanislav says: January 21, 2011 at 3:55 pm Dear Bassett Disaster, Of course a

Brief History of Character Codes in North America, Europe, and East Asia

http://tronweb.super-nova.co.jp/characcodehist.html

Language (HTML), the programming language used for creating hypermedia pages on the World Wide Web. The other encoding method for JIS is the method called Extended UNIX Code-JP (E

https://www.humprog.org/~stephen/

https://www.humprog.org/~stephen/

has mostly focused on programming languages and the systems that support them—including language runtimes and operating systems. Micro-blog and calendar December 2025. A new

OS X as a UNIX workstation (for Astronomers)

http://www.netpurgatory.com/osx-unix.html

practice in FORTRAN programming is to have source files end with .F and contain C preprocessor directives. After preprocessing, the new files end in .f and are then processed by t

Kermit Security Reference

https://www.kermitproject.org/security.html

Services Application Programming Interface), which hooks into the Kerberos 5 authentication system. NOTE: Since K95 2.1.3 was released, GSSAPI has changed out from under it, and i

BiMAVs; Bipedal Mechanized Assault Vehicles

http://www.bimavs.com/

statements, any kind of programming code, or anything else that has been designed in(she does some of that). A good analogy is a Japanese character which has the variation on the
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

by "The League for Programming Freedom." (The LPF paper "Against Software Patents" http://lpf.ai.mit.edu/Patents/against-software-patents.html appears to be the same as the DDJ ar
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

memalign.github.io

https://memalign.github.io/

on 1/13/2026 Tags: Programming , Tools Today, I'm sharing a web app for keeping up with your Bluesky timeline: MemSky . You can use it in the browser or add it to your home screen
Today, I'm sharing a web app for keeping up with your Bluesky timeline: MemSky. You can use it in the browser or add it to your home screen as a…

Sidreloc

http://linusakesson.net/software/sidreloc/index.php

Obfuscated programming Piano music Sane programming Scene productions SID related pages Software downloads Underhanded code Video clip


Find more...