Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
Looking at Windows Vista | Peter Torpeyhttps://petertorpey.com/articles/windows_vista.html
familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A
Greg A. Woodshttp://www.weird.com/~woods/
name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it
John Elliott's homepagehttp://www.seasip.info/
site are dedicated to computers and/or operating systems which unkind people might describe as obsolete : Sinclair Spectrum items: A section on Jet Set Willy , including an editor
Sniffin' the Ether v2.0http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html
to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur
Wayland Isn't Going to Save The Linux Desktophttps://dudemanguy.github.io/blog/posts/2022-06-10-wayland-xorg/wayland-xorg.html
people should use their computers. Sway offers a way to do this via swaymsg and I'm sure the other compositors have some sort of server-side method, but this is one of those thing
Todos los enlaces @ cidoku.nethttp://cidoku.net/links/all
browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</https://www.kermitproject.org/k95.html
and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector
introhttps://srobb.net/
us who have dealt with computers and the internet for awhile have all had this experience--our friend calls, and says, 'Guess what? I'm finally hooked up to the internet and got 5
WA8LMF Useful Links Pagehttp://wa8lmf.net/links/
anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin
Find more...