Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
The Art of Unix Programminghttp://www.catb.org/esr/writings/taoup/html/
are trademarks of Apple Computers, Inc. ClearCase is a trademark of Rational Software, Inc. Ethernet is a trademark of 3COM, Inc. Excel, MS-DOS, Microsoft Windows and PowerPoint a
INVESTIGATING 65C816 INTERRUPTS — ©1994–2015 by BCS Technology Limitedhttp://6502.org/tutorials/65c816interrupts.html
is and understands why computers use interrupts. If these assumptions don't describe you then you need to seek out other references before continuing. One such referen
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
https://www.rfc-editor.org/rfc/rfc2839.txthttps://www.rfc-editor.org/rfc/rfc2839.txt
diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications
Reaction to the DEC Spam of 1978https://www.templetons.com/brad/spamreact.html
DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX OPERATING SYSTEM AND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE. BOTH THE DECSYSTEM-2060T AND 2020T OFFER FU
Piet Beertema's websitehttps://godfatherof.nl/
a wild variety of computers worldwide, speaking the same "language" to communicate: the Internet Protocol, or in short IP. And ' www ', CERN's first and in fact sort of 'prehistor
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Every Web Browser Absolutely Sucks. | Luke Smithhttps://lukesmith.xyz/articles/every-web-browser-absolutely-sucks/
to do if they change computers or want to replicate their settings is to move one file. Or for someone like me, who has people wanting to install my system configuration a lot , i
The title explains it all, you don't even have to read.There are no good, even passable web browsers. None. Not a single oneeven comes close.The weird thing is this: making a g
Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</https://www.kermitproject.org/k95.html
and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector
Loper OS » No Formats, no Format Wars.http://www.loper-os.org/?p=309
If this isn't how our computers work, why do we act as if it were? The core idiocy of all web format wars lies in the assumption that there must necessarily be a pre-determined,
1401Restoration-CHMhttps://ibm-1401.info/
1969s Vintage Computers at the Computer History Museum," Robert Garner, Making IT Work Conference, British Computer Society, London, May 22-23, 2017 Conference presentation Procee
Find more...