wiby  
Settings



GRC | Gibson Research Corporation Home Page  

https://www.grc.com/default.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! Since 1988. It
Steve Gibson's and Gibson Research Corporation's Homepage.

Kermit - What is it?

https://kermitproject.org/kermit.html

for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a

Awesome-Warez | All your base are belong to us!

https://lkrjangid1.github.io/Awesome-Warez/

between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

Untitled Document

http://www.ccru.net/id(entity)/ccruhistory.htm

that, come January 1st, computers still reliant on such programs will be terminally confused, unable to distinguish the year 1900 from the Year 2000. Ccru learned from cybernetics

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

Thailand

https://www.hellenicaworld.com/Thailand/en/Thailand.html

electric appliances, computers and parts, integrated circuits, furniture, plastics, automobiles and automotive parts, agricultural machinery, air conditioning and refrigeration, c
Thailand, World Library

UNATLe: United Nations AntiTerrorism Leauge

http://www.unatle.net/NuclearWar.html

And Not Omniscient Computers Giving Us Infinite Hit Points Relative To You And IQ Regulated{Based On Computer Quantity} Hit Points Relative To Other Cute Little Lerypoooss Only Ra
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Quote Anthology

https://quotes.pouyakary.org/

to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people

Curriculum Vitae of Dr. Ronald B. Standler

http://www.rbs2.com/cv.htm

instruments to computers, and statistical analysis of data. University of Florida, Department of Electrical Engineering, Gainesville, FL 32611. Visiting Assistant Professor and Po
curriculum vitae of Dr. Ronald B. Standler


Find more...