wiby  
Settings



UNIX Review - Net Worth - Desktop TCP/IP At Middle Age

http://people.ece.ubc.ca/gillies/pages/9802net.html

evolution of desktop computers for more years than I care to mention. I started using the CP/M operating system on 8-bit 8080 and Z80 machines. During those times early in the evo

What's So Bad About Microsoft?

http://www.kmfms.com/whatsbad.html

of more powerful computers, but the latest version of Linux will still work well on older equipment. There are also plenty of other operating systems that work equally well on mac

How to Evaluate Open Source Software / Free Software (OSS/FS) Programs

https://dwheeler.com/oss_fs_eval.html

it to Windows. Today's computers and OSS/FS operating systems are so inexpensive that it's often cheaper to buy special-purpose computers for a task than to try to change the appl
This paper describes how to evaluate open source software

OpenBSD Router Guide

https://openbsdrouterguide.net/

but it can protect your computers and devices on the inside of the network, and it can help you monitor and control the traffic that comes and goes to and from your local network.

Health Assurance Policies

https://www.heartcom.org/HealthAssurance.htm

laptops and desktop computers. The USC alliance, aka AHA! ( A merica's H olistic A lliance) provides numerous AHA! apps for personalized health assessment and choice fulfillm
United Self Care introduces Health Assurance Policies

Installing Windows 95 & 98

http://www.nickh.org/computer/instlwin9x.html

v2.5 around for older computers.  IF you aren't using TCP/IP networking, you may want to customize your setup, and tell the client software to use IPX only. Yet More Update:

SOLAR ECLIPSE 1999 - FINAL QUEST FOR THE HOLY GRAIL

http://greatdreams.com/eclipse.htm

pursue an education in computers only to find in 1998 that scientists have found a chilling comet in the exact place where my drawings showed it to appear (possibly the same comet

C-Kermit 9.0 Update Notes

https://www.kermitproject.org/ckermit90.html

trouble is, different computers, or even different applications on the same computer, might use different standards or conventions ("character sets") for representing the same cha

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

https://www.ietf.org/rfc/rfc2130.txt

https://www.ietf.org/rfc/rfc2130.txt

transmission to other computers. Transfer Encoding Syntax - The mapping from a coded character set which has been encoded in a Character Encoding Scheme to an encoding which may b

KatieZone.biz

http://katiezone.biz/list.html

SDR: [ 1 ] [ 2 ] Living Computers Museum - Online Systems TELEHACK SDF Public Access Unix System - ( Sign Up ) Cameron's World WWWTXT gifcities Commodore Z jsfxr Windows93.net YTM

Acclaim for Unicode

http://www.unicode.org/press/quotations.html

used on smartphones, computers, and social media all over the world now. It once was in danger of dying out, but now it strongly continues in all the modern media communications.


Find more...