Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
full ownership of their computers with the implication that they should be free to use, study, reproduce and share both the hardware and the software components that make up their
List of archived operating systems | OS Archivehttp://osarchive.sda1.eu/
Distribution for old computers. DeLi stands for "Desktop Light" and this distribution runs on runs even on 486 PCs! This distro can be used for desktop usabe - It includes email c
Roadmap to Robocarshttps://www.templetons.com/brad/robocars/roadmap.html
and test robocar software, and improve on other's open source efforts. This environment could also be used for contests, and the winners could then get funding to try their softwa
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan
https://www.rfc-editor.org/rfc/rfc2839.txthttps://www.rfc-editor.org/rfc/rfc2839.txt
diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications
Daring Fireballhttps://daringfireball.net/
automation of our computers — and the proliferation of assistants and companions and agents designed to execute tasks for us — I’ve been thinking more about the desktop that’s hid
Commentary on Apple, technology, design, politics, and more.
Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
Loper OS » "Cryostat" Genesis.http://www.loper-os.org/?p=3791
Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
Order Without the State: Theory, Evidence, and the Possible Future Ofhttp://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm
fool people or their computers, but one cannot get a bullet through a T-1 line. It is in that sense a world of entirely voluntary interaction. In order to use force against an onl
Freeware Tools and System Utilities for Windowshttp://www.nirsoft.net/utils/
entries on your computers, and displays their logon details: User Name, Password, and Domain. You can use it to recover a lost password of your Internet connection or VPN. Dialupa
Unique collection of freeware utilities and freeware password recovery tools
The Kermit Script Library and Tutorialhttps://www.kermitproject.org/ckscripts.html
everybody who used computers to communicate with other computers used Kermit as a terminal emulator and for file transfer. C-Kermit for Unix and VMS and MS-DOS Kermit for DOS were
Find more...