wiby  
Settings



Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their

List of archived operating systems | OS Archive

http://osarchive.sda1.eu/

Distribution for old computers. DeLi stands for "Desktop Light" and this distribution runs on runs even on 486 PCs! This distro can be used for desktop usabe - It includes email c

Roadmap to Robocars

https://www.templetons.com/brad/robocars/roadmap.html

and test robocar software, and improve on other's open source efforts. This environment could also be used for contests, and the winners could then get funding to try their softwa

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications

Daring Fireball

https://daringfireball.net/

automation of our computers — and the proliferation of assistants and companions and agents designed to execute tasks for us — I’ve been thinking more about the desktop that’s hid
Commentary on Apple, technology, design, politics, and more.

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

Loper OS » "Cryostat" Genesis.

http://www.loper-os.org/?p=3791

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Order Without the State: Theory, Evidence, and the Possible Future Of

http://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm

fool people or their computers, but one cannot get a bullet through a T-1 line. It is in that sense a world of entirely voluntary interaction. In order to use force against an onl

Freeware Tools and System Utilities for Windows

http://www.nirsoft.net/utils/

entries on your computers, and displays their logon details: User Name, Password, and Domain. You can use it to recover a lost password of your Internet connection or VPN. Dialupa
Unique collection of freeware utilities and freeware password recovery tools

The Kermit Script Library and Tutorial

https://www.kermitproject.org/ckscripts.html

everybody who used computers to communicate with other computers used Kermit as a terminal emulator and for file transfer. C-Kermit for Unix and VMS and MS-DOS Kermit for DOS were


Find more...