wiby  
Settings



Networking software for DOS and Windows 3.x

http://www.jacco2.dds.nl/samba/dos.html

the network (see which computers are connected to it) at least one computer running Samba, Windows for Workgroups, Windows 95 or Windows NT must be on the network and belong to th

Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)

https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html

Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

Lakes' Blog

https://lakesnet.nekoweb.org/blog-2025.html

it through the software manager, the terminal, an unverified flatpak, nothing. And with the unverified flatpak, it won't let me use spicetify either. I know Spotify is a massive c

Recommendations — The Privacy Raccoon

https://an_g6.codeberg.page/

just other people computers. Or even worse, mega corporation's computers. Do not trust anyone with your personal data and host your "cloud" storage yourself. If you don't have the

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/how_it_works.html

spam bots or hacked computers. This allows admins to be alerted early and take action to shut down spam at the source. We feel that the best way to block spam is to eliminate the
Junk Email Filter - Front End Spam

NLnet; Current projects

https://nlnet.nl/project/current.html

ARM-based single board computers AtomicServer Local-First AtomicServer Local-First Headless CMS Authlib Reliable OAuth and OIDC handling in Python Autogram 2.0 Create and validate

Windows XP Guide

http://www.prints.pink/unlisted/windowsxp.html

(or using two separate computers, if you prefer). You might also want to look into the One Core API for Windows XP, although I won't be discussing it here as I know nothing about


Find more...