wiby  
Settings



FreeBSD is an amazing operating system

https://unixdigest.com/articles/freebsd-is-an-amazing-operating-system.html

on FreeBSD. The only computers that didn't run FreeBSD was the computers at the office where the sales people and secretaries worked, those ran Microsoft Windows 98. When I asked

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!

GRC | Gibson Research Corporation Home Page  

https://www.grc.com/default.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! Since 1988. It
Steve Gibson's and Gibson Research Corporation's Homepage.

Extra Ordinary | D. Griffin Jones

https://www.dgriffinjones.com/

humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

LINRAD VIDEOS

http://www.sm5bsz.com/linuxdsp/videos.htm

low end low cost ARM computers with similar or better performance. Many USB dongles. |||| [multi-rtl] This video shows a Compaq 6510b running with 4 rtlsdr USB dongles at 2 MHz. I

Looking at Windows Vista | Peter Torpey

https://petertorpey.com/articles/windows_vista.html

familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

NLnet; All projects

https://nlnet.nl/project/

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent

Greg's Domain

http://wooledge.org/~greg/index2.html

taken some photos . Computers I use Debian GNU/Linux and OpenBSD on cheap x86 hardware. Windows has its place (preferably the trash bin), but I'll take a free Unix system any day.

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

SoylentNews: SoylentNews is people

https://soylentnews.org/

insistence that computers must speak to people is not dead. But it is diminishing, generation by generation, as the field grows further from its roots. You have the opportunity to


Find more...