wiby  
Settings



Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

The Art of Unix Programming

http://www.catb.org/esr/writings/taoup/html/

are trademarks of Apple Computers, Inc. ClearCase is a trademark of Rational Software, Inc. Ethernet is a trademark of 3COM, Inc. Excel, MS-DOS, Microsoft Windows and PowerPoint a

INVESTIGATING 65C816 INTERRUPTS — ©1994–2015 by BCS Technology Limited

http://6502.org/tutorials/65c816interrupts.html

is and understands why computers use interrupts.  If these assumptions don't describe you then you need to seek out other references before continuing.  One such referen

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications

Reaction to the DEC Spam of 1978

https://www.templetons.com/brad/spamreact.html

DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX OPERATING SYSTEM AND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE. BOTH THE DECSYSTEM-2060T AND 2020T OFFER FU

Piet Beertema's website

https://godfatherof.nl/

a wild variety of computers worldwide, speaking the same "language" to communicate: the Internet Protocol, or in short IP. And ' www ', CERN's first and in fact sort of 'prehistor

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell

Every Web Browser Absolutely Sucks. | Luke Smith

https://lukesmith.xyz/articles/every-web-browser-absolutely-sucks/

to do if they change computers or want to replicate their settings is to move one file. Or for someone like me, who has people wanting to install my system configuration a lot , i
The title explains it all, you don't even have to read.There are no good, even passable web browsers. None. Not a single oneeven comes close.The weird thing is this: making a g

Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</

https://www.kermitproject.org/k95.html

and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector

Loper OS » No Formats, no Format Wars.

http://www.loper-os.org/?p=309

If this isn't how our computers work, why do we act as if it were?  The core idiocy of all web format wars lies in the assumption that there must necessarily be a pre-determined,

1401Restoration-CHM

https://ibm-1401.info/

1969s Vintage Computers at the Computer History Museum," Robert Garner, Making IT Work Conference, British Computer Society, London, May 22-23, 2017 Conference presentation Procee


Find more...