Sniffin' the Ether v2.0http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html
to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur
Columns & Editorials by Steve Woodhttp://www.mathdittos2.com/columns/
about using Macintosh computers for their web sites! I wrote the That Other Steve... series for the now defunct MacTimes News Network in 1998-99. The View from the Classroom serie
Photogallery Script - Create HTML gallery from image fileshttps://www.kermitproject.org/photogallery.html
was scarce, and desktop computers were slow. Its "default" mode of operation (that is, how it works unless you instruct it otherwise) is tailored to that environment: It resizes y
Winlink 2000 Radio-Email System Overviewhttp://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm
mail from their own computers at their own desks or in the field, with amateur radio operator supervision, through our stations. This is what our served agencies need. The WL2K ne
Emergent Technologies Inc. -- Security Kernel</TITLEhttp://mumble.net/~jar/pubs/secureos/secureos.html
available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR
Linux commands and fileshttp://webarchive.me/geocities/SiliconValley/2072/linux.htm
It stores the names of computers on the LAN. This works sort of like DNS, except that instead of running a dedicated name server, it's just a table of addresses and corresponding
graymirror-substack-com-p-4-principles-of-any-next-regime-2025-05-31 - TextMirrorhttp://textmirror.net/mirror-graymirror-substack-com-p-4-principles-of-any-next-regime-2025-05-31
pests and diseases. Our computers still crash, and even our VR is incredibly primitive. In other ways we are still paying the price for two centuries of utilitarianism, in which e
1 gray mirror 2 gray mirror 3 gray mirror (button) (button) (button) subscribe (button) sign in (button) share this post 4 gray mirror gray mirror 4: principles of any next regime
Old Cavebear Bloghttps://www.cavebear.com/old_cbblog/
was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin
MS-DOS Kermithttps://www.kermitproject.org/mskermit.html
with other kinds of computers, including IBM's own (a service that not even IBM could offer at the time). The prototype was done by Bill Catchings of the Kermit project in a singl
Communications software for DOS and Windows 3.x,offering serial and network communications (including its own compact built-inTCP
https://www.ietf.org/rfc/rfc1034.txthttps://www.ietf.org/rfc/rfc1034.txt
Both personal computers and large timeshared hosts should be able to use the system, though perhaps in different ways. 2.3. Assumptions about usage The organization of the domain
retawq Home Pagehttps://retawq.sourceforge.net/
) for text terminals on computers with Unix-like operating systems. It is written in C, fast, small, nicely configurable, and comfortable; e.g. the low-level network communication
retawq - a multi-threaded web browser fortext terminals
Jeff Duntemann's Wardriving FAQhttp://www.drivebywifiguide.com/wardrivingfaq.htm
The kid was looking for computers supporting online games and had no strong intent to "break into" anything—the problems that developed lay with an essentially unde
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i
Find more...