wiby  
Settings



Sniffin' the Ether v2.0

http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html

to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur

Columns & Editorials by Steve Wood

http://www.mathdittos2.com/columns/

about using Macintosh computers for their web sites! I wrote the That Other Steve... series for the now defunct MacTimes News Network in 1998-99. The View from the Classroom serie

Photogallery Script - Create HTML gallery from image files

https://www.kermitproject.org/photogallery.html

was scarce, and desktop computers were slow. Its "default" mode of operation (that is, how it works unless you instruct it otherwise) is tailored to that environment: It resizes y

Winlink 2000 Radio-Email System Overview

http://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm

mail from their own computers at their own desks or in the field, with amateur radio operator supervision, through our stations. This is what our served agencies need. The WL2K ne

Emergent Technologies Inc. -- Security Kernel</TITLE

http://mumble.net/~jar/pubs/secureos/secureos.html

available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR

Linux commands and files

http://webarchive.me/geocities/SiliconValley/2072/linux.htm

It stores the names of computers on the LAN. This works sort of like DNS, except that instead of running a dedicated name server, it's just a table of addresses and corresponding

graymirror-substack-com-p-4-principles-of-any-next-regime-2025-05-31 - TextMirror

http://textmirror.net/mirror-graymirror-substack-com-p-4-principles-of-any-next-regime-2025-05-31

pests and diseases. Our computers still crash, and even our VR is incredibly primitive. In other ways we are still paying the price for two centuries of utilitarianism, in which e
1 gray mirror 2 gray mirror 3 gray mirror (button) (button) (button) subscribe (button) sign in (button) share this post 4 gray mirror gray mirror 4: principles of any next regime

Old Cavebear Blog

https://www.cavebear.com/old_cbblog/

was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin

MS-DOS Kermit

https://www.kermitproject.org/mskermit.html

with other kinds of computers, including IBM's own (a service that not even IBM could offer at the time). The prototype was done by Bill Catchings of the Kermit project in a singl
Communications software for DOS and Windows 3.x,offering serial and network communications (including its own compact built-inTCP

https://www.ietf.org/rfc/rfc1034.txt

https://www.ietf.org/rfc/rfc1034.txt

Both personal computers and large timeshared hosts should be able to use the system, though perhaps in different ways. 2.3. Assumptions about usage The organization of the domain

retawq Home Page

https://retawq.sourceforge.net/

) for text terminals on computers with Unix-like operating systems. It is written in C, fast, small, nicely configurable, and comfortable; e.g. the low-level network communication
retawq - a multi-threaded web browser fortext terminals

Jeff Duntemann's Wardriving FAQ

http://www.drivebywifiguide.com/wardrivingfaq.htm

The kid was looking for computers supporting online games and had no strong intent to "break into" anything—the problems that developed lay with an essentially unde
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i


Find more...