GRC | Gibson Research Corporation Home Pagehttps://www.grc.com/default.htm
SQRL PDP-8 Computers TrueCrypt Repository Big Number Calculator The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! Since 1988. It
Steve Gibson's and Gibson Research Corporation's Homepage.
Kermit - What is it?https://kermitproject.org/kermit.html
for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a
Awesome-Warez | All your base are belong to us!https://lkrjangid1.github.io/Awesome-Warez/
between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
Untitled Documenthttp://www.ccru.net/id(entity)/ccruhistory.htm
that, come January 1st, computers still reliant on such programs will be terminally confused, unable to distinguish the year 1900 from the Year 2000. Ccru learned from cybernetics
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
Thailandhttps://www.hellenicaworld.com/Thailand/en/Thailand.html
electric appliances, computers and parts, integrated circuits, furniture, plastics, automobiles and automotive parts, agricultural machinery, air conditioning and refrigeration, c
Thailand, World Library
UNATLe: United Nations AntiTerrorism Leaugehttp://www.unatle.net/NuclearWar.html
And Not Omniscient Computers Giving Us Infinite Hit Points Relative To You And IQ Regulated{Based On Computer Quantity} Hit Points Relative To Other Cute Little Lerypoooss Only Ra
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!
CRN / Unixhttp://crn.hopto.org/unix.html
into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.
Quote Anthologyhttps://quotes.pouyakary.org/
to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people
Curriculum Vitae of Dr. Ronald B. Standlerhttp://www.rbs2.com/cv.htm
instruments to computers, and statistical analysis of data. University of Florida, Department of Electrical Engineering, Gainesville, FL 32611. Visiting Assistant Professor and Po
curriculum vitae of Dr. Ronald B. Standler
Find more...