wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

TELNET: The Mother of All (Application) Protocols

https://XeNT.com/4K-Associates/IEEE-L7-v2.html

spectrum of host computers connected to the ARPANET were a motley crew: varying keyboards, character sets, display sizes, line lengths, speeds, and those were just the physical in

https://www.ietf.org/rfc/rfc2277.txt

https://www.ietf.org/rfc/rfc2277.txt

when working with computers. Note that negotiating English is NOT the same as Default Language; Default Language is an emergency measure in otherwise unmanageable situations. In m

Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I

Metadata Activity

https://www.w3.org/Metadata/Activity

can purchase books, computers, clothes, and any number of other items; you can book seats on planes and rooms in hotels. The possible uses of the Web seem endless, but there the t

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.

WAI-ARIA 1.0 User Agent Implementation Guide

https://www.w3.org/TR/2014/REC-wai-aria-implementation-20140320/

defined in a way that computers can process a representation of an object , such as elements and attributes , and reliably represent the object in a way that various humans will a

Loper OS » "Pest" v. 0xFB.

http://www.loper-os.org/?p=4003

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

3D Gopher, by McCahill and Erickson

http://www.pliant.org/personal/Tom_Erickson/GopherVR.html

of RISC-based personal computers, the time seems ripe. Finally, we would like to put our beliefs about the advantages of 3-D spatial interfaces to the test. We see two possible ad

PET index - Transfer files to the PET and back

http://www.6502.org/users/andre/petindex/transfer.html

all 8-bit Commodore computers that are equipped with a cassette interface (PET series, VIC-20, C64, C128, 264 series, PET-II series) and any computer that has a 38400 bps RS-232 i
PET index - Transfer files to the PET and back

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why

A to Z of C - Beta | Online book on C/DOS programming

http://guideme.itgo.com/atozofc/

The Real World With Computers 41. Writing BIOS Flashing the BIOS — How-to 42. Programming CMOS RAM 43. Device Driver Programming Device driver Device driver writing kit (wit
A to Z of C is the non-profit project to bring cheapest and best book for C


Find more...