"Do It Better: SSH" by Colin Coglehttp://colincogle.name/blog/do-it-better/ssh/
connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.
CLI Club: Command-line Interface Tools & Alternativeshttps://cli.club/
Send files between computers. shbin Turn a Github repo into a pastebin. sharing Send and receive files on your mobile device. ncp Transfer files and folders, to and from NFS serve
A collection of the best CLI
Accessible Rich Internet Applications (WAI-ARIA) 1.0https://www.w3.org/TR/2014/REC-wai-aria-20140320/complete
TAB key on most desktop computers). SVG authors may place elements in the navigation order by manipulating the focusable attribute and they may dynamically specify the navigation
Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org frhttps://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html
we should design our computers this way. But here we run into the same problem we do that results in me not being able to trust my computer: every program runs *as me*. Solitaire,
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox
Find more...