bryan wann :: binary furyhttps://binaryfury.wann.net/
fixing up vintage computers and software, so why not get a vintage tractor running? TL;DR: good news: tractor runs, bad news, a lot of bad things [photos: flickr – IH 484 tr
Bryan Wann, California, USA
Awesome-Warez | All your base are belong to us!https://lkrjangid1.github.io/Awesome-Warez/
between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!
GRC | Gibson Research Corporation Home Pagehttps://www.grc.com/default.htm
SQRL PDP-8 Computers TrueCrypt Repository Big Number Calculator The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! Since 1988. It
Steve Gibson's and Gibson Research Corporation's Homepage.
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
C-Kermit 9.0 General Hints and Tipshttps://www.kermitproject.org/ckcbwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
The Computer Underground, Inchttp://tcu-inc.com/
support. We do not sell computers, but will support Linux Servers and Workstations in the Bay Area of California. What we prefer to support Perl, PHP, Python, Javascript, HTML, SQ
The Computer Underground sells and supportsa variety of computer platforms and operating systems. Also, we provide consultants with networking, systemsadministration, and programmi
The Art of Unix Programminghttp://www.catb.org/esr/writings/taoup/html/
are trademarks of Apple Computers, Inc. ClearCase is a trademark of Rational Software, Inc. Ethernet is a trademark of 3COM, Inc. Excel, MS-DOS, Microsoft Windows and PowerPoint a
Loper OS » No Formats, no Format Wars.http://www.loper-os.org/?p=309
If this isn't how our computers work, why do we act as if it were? The core idiocy of all web format wars lies in the assumption that there must necessarily be a pre-determined,
Find more...