Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
FreeBSD is an amazing operating systemhttps://unixdigest.com/articles/freebsd-is-an-amazing-operating-system.html
on FreeBSD. The only computers that didn't run FreeBSD was the computers at the office where the sales people and secretaries worked, those ran Microsoft Windows 98. When I asked
The Art of Unix Programminghttp://www.catb.org/esr/writings/taoup/html/
are trademarks of Apple Computers, Inc. ClearCase is a trademark of Rational Software, Inc. Ethernet is a trademark of 3COM, Inc. Excel, MS-DOS, Microsoft Windows and PowerPoint a
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
https://www.rfc-editor.org/rfc/rfc2839.txthttps://www.rfc-editor.org/rfc/rfc2839.txt
diverse types of computers over potentially hostile communication links. Since 1981, the Kermit Project at Columbia University has expanded the protocol, developed communications
Reaction to the DEC Spam of 1978https://www.templetons.com/brad/spamreact.html
DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX OPERATING SYSTEM AND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE. BOTH THE DECSYSTEM-2060T AND 2020T OFFER FU
Piet Beertema's websitehttps://godfatherof.nl/
a wild variety of computers worldwide, speaking the same "language" to communicate: the Internet Protocol, or in short IP. And ' www ', CERN's first and in fact sort of 'prehistor
Introduction: Why Lisp?https://gigamonkeys.com/book/introduction-why-lisp.html
father got his start in computers writing an operating system in assembly for the machine he used to gather data for his doctoral dissertation in physics. After running computer s
The Computer Underground, Inchttp://tcu-inc.com/
support. We do not sell computers, but will support Linux Servers and Workstations in the Bay Area of California. What we prefer to support Perl, PHP, Python, Javascript, HTML, SQ
The Computer Underground sells and supportsa variety of computer platforms and operating systems. Also, we provide consultants with networking, systemsadministration, and programmi
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Every Web Browser Absolutely Sucks. | Luke Smithhttps://lukesmith.xyz/articles/every-web-browser-absolutely-sucks/
to do if they change computers or want to replicate their settings is to move one file. Or for someone like me, who has people wanting to install my system configuration a lot , i
The title explains it all, you don't even have to read.There are no good, even passable web browsers. None. Not a single oneeven comes close.The weird thing is this: making a g
Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</https://www.kermitproject.org/k95.html
and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector
Find more...