FreeBSD is an amazing operating systemhttps://unixdigest.com/articles/freebsd-is-an-amazing-operating-system.html
on FreeBSD. The only computers that didn't run FreeBSD was the computers at the office where the sales people and secretaries worked, those ran Microsoft Windows 98. When I asked
GRC | Gibson Research Corporation Home Pagehttps://www.grc.com/default.htm
SQRL PDP-8 Computers TrueCrypt Repository Big Number Calculator The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! Since 1988. It
Steve Gibson's and Gibson Research Corporation's Homepage.
202511 - apenwarrhttps://apenwarr.ca/log/
do they make all the computers connect? We can't even get the world to agree on 60 Hz vs 50 Hz, 120V vs 240V, or which kind of physical power plug to use. Communications equipment
Extra Ordinary | D. Griffin Joneshttps://www.dgriffinjones.com/
humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
LINRAD VIDEOShttp://www.sm5bsz.com/linuxdsp/videos.htm
low end low cost ARM computers with similar or better performance. Many USB dongles. |||| [multi-rtl] This video shows a Compaq 6510b running with 4 rtlsdr USB dongles at 2 MHz. I
Looking at Windows Vista | Peter Torpeyhttps://petertorpey.com/articles/windows_vista.html
familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
Greg's Domainhttp://wooledge.org/~greg/index2.html
taken some photos . Computers I use Debian GNU/Linux and OpenBSD on cheap x86 hardware. Windows has its place (preferably the trash bin), but I'll take a free Unix system any day.
CRN / Unixhttp://crn.hopto.org/unix.html
into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.
CASsette IO Utilities - Readmehttp://www.mvcsys.de/doc/casioutil.html
from vintage pocket computers Download Generations of Casio pockets. The PB-100 series The FX-702P The PB-700, PB-770 and FX-750P The FX-850P, FX-870P, FX-880P, FX-890P, VX-1 to 4
Windows Explorer Timeline | Gekkhttp://gekk.info/articles/explorer.html
, where other computers live, and My Briefcase , which is literally a meta-representation of portable devices or storage media that exist outside of your computer. So in essence M
At a glance comparison of every major Explorer release
Find more...