wiby  
Settings



Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software

OpenBSD Router Guide

https://openbsdrouterguide.net/

but it can protect your computers and devices on the inside of the network, and it can help you monitor and control the traffic that comes and goes to and from your local network.

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

"Do It Better: SSH" by Colin Cogle

http://colincogle.name/blog/do-it-better/ssh/

connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.

WA8LMF Useful Links Page

http://wa8lmf.net/links/

anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin    Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Resume -- Chip Morningstar

http://www.fudco.com/chip/resume.html

devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev

https://www.ietf.org/rfc/rfc6763.txt

https://www.ietf.org/rfc/rfc6763.txt

offload, so that computers can sleep and still be discoverable on the network. Early versions of such chipsets were sometimes quite limited: for example, some were Cheshire & Kroc

Link Pantry

https://linkpantry.com/

and weirdness of computers. suricrasia.online/iceberg how-i-experience-web-today.com is a showcase of how the mayority of people experience the web today. elgoog.im is a playful w
A Collection Of Links On Various Topics

Tools and utilities for Windows

http://www.ltr-data.se/opencode.html

administration of computers and networks? Migrate old source code to modern development systems? Have some kind of hard-to-solve problem with computers, networks, drivers, applica
Tools for Windows

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

generates 350 Linux computers for schools (March 19, 2008) Fioretti, Marco A look at free software in Ecuador (December 3, 2008) Fleming, Matt The bootstrap process on EFI systems


Find more...