wiby  
Settings



Kermit - What is it?

https://kermitproject.org/kermit.html

for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a

/tech/ - Technology - Page 1

https://zzzchan.xyz/tech/index.html

Only Non networked computers. It's how they fought the Cylons in Battlestar Galactica and also how Terry fought the CIA niggers! Just run the terminator over, it's eyes glow in th
Technology & Computing

All links @ cidoku.net

http://cidoku.net/en/links/all

friend who likes old computers and cactuses. In Spanish. LiterallyHifumi A personal site and blog about technology, birds, and singing synths. Very interesting is the World Wide W

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

Todos los enlaces @ cidoku.net

http://cidoku.net/links/all

browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m

Great Green Room: A Partial History of Computer Conferencing in Ann Arbor

http://greatgreenroom.org/item_19.html

study methods of using computers in education. He started experimenting with existing computer conferencing systems in 1972, but found them expensive and restrictive to use. In re

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Managing EFI Boot Loaders for Linux: Dealing with Secure Boot

http://www.rodsbooks.com/efi-bootloaders/secureboot.html

when users booted their computers using infected DOS floppies. Although other modes of virus transmission gained prominence as floppies faded in importance and Internet connection


Find more...