qmail: Second most popular MTA on the Internethttp://www.usenix.org.uk/mirrors/qmail/top.html
makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f
Things that make me madhttps://www.increasinglyadequate.com/mad.html
on those old vTech toy computers that cost 50 bucks in 1995 at Toys R Us. Even a DOS user was 100 times the power use you are. (In 2020 this one no longer rings true. But only bec
Basically, just a list of things that make me mad.
NLnet; 55 New Projects Awarded NGI0 Grantshttps://nlnet.nl/news/2023/20231123-announcing-projects.html
for smartphones, computers, and servers alike. For more details see : https://nlnet.nl/project/WillowSync Layer 8 Data and AI AI Horde — Collaborative infrastructure for running g
C++ Applicationshttps://www.stroustrup.com/applications.html
both Mac OS and Windows computers. Mentor Graphics : Since the 1980s Mentor Graphics has built most of its applications using C++, including: Calibre: software for IC physical ver
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2008/
be a few large powerful computers with lots of terminals is a perennial, and goes in cycles. In the past it has foundered on the rocks of Moore's law - it turned out to be cheaper
Telegram FAQhttps://telegram.org/faq
your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…
Fuck Big Tech: A Privacy Guidehttps://fuckbigtech.neocities.org/
If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional, you best start believing in cyberpunk dystopias, you are in one.
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
The Dockhttp://koshka.love/links.html
designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0
4K Associates : Standards Strategy Consultantshttps://XeNT.com/4K-Associates/Press.html
on close to 10000 computers throughout the Internet. The challenge, called ECC2K-108, was set by Canadian cryptographic company Certicom in 1997 to encourage researchers to test t
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2004/
left for home. Unpacked computers onto new table - can actually sit in front of any 1 of 3 concurrently - brilliant. Lunch, played with H. on the BBC cbeebies page; caught Miguel
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
Find more...