wiby  
Settings



"Do It Better: SSH" by Colin Cogle

http://colincogle.name/blog/do-it-better/ssh/

connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.

CLI Club: Command-line Interface Tools & Alternatives

https://cli.club/

Send files between computers. shbin Turn a Github repo into a pastebin. sharing Send and receive files on your mobile device. ncp Transfer files and folders, to and from NFS serve
A collection of the best CLI

Accessible Rich Internet Applications (WAI-ARIA) 1.0

https://www.w3.org/TR/2014/REC-wai-aria-20140320/complete

TAB key on most desktop computers). SVG authors may place elements in the navigation order by manipulating the focusable attribute and they may dynamically specify the navigation

Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org fr

https://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html

we should design our computers this way. But here we run into the same problem we do that results in me not being able to trust my computer: every program runs *as me*. Solitaire,

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox


Find more...