wiby  
Settings



Networking software for DOS and Windows 3.x

http://www.jacco2.dds.nl/samba/dos.html

the network (see which computers are connected to it) at least one computer running Samba, Windows for Workgroups, Windows 95 or Windows NT must be on the network and belong to th

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

Latest News (Press Releases)

https://www.prlog.org/news/

Business Celebrities Computers Construction Consumer Consumer electronics Cooking Coupons Culture Deals Defense Education Electronics Energy Engineering Entertainment Environment
Latest News - Read news before it's news

Go beyond work with Linus Lee, Daniela Petruzalek, & Sebastian Spaink (Go Time #212)

https://changelog.com/gotime/212

TV programming about computers - computer programs that were coming out in the mid ’80s, early β€˜90s - and it’s kind of astonishing how all those programs sort of expect the user t
Our final installment from GopherCon 2021 is an awesome panel conversation led by Natalie & Angelica with guests Linus Lee, Daniela Patruzalek, and Sebastian Spank. All three o

Recommendations β€” The Privacy Raccoon

https://an_g6.codeberg.page/

just other people computers. Or even worse, mega corporation's computers. Do not trust anyone with your personal data and host your "cloud" storage yourself. If you don't have the

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/how_it_works.html

spam bots or hacked computers. This allows admins to be alerted early and take action to shut down spam at the source. We feel that the best way to block spam is to eliminate the
Junk Email Filter - Front End Spam

NLnet; Current projects

https://nlnet.nl/project/current.html

ARM-based single board computers AtomicServer Local-First AtomicServer Local-First Headless CMS Authlib Reliable OAuth and OIDC handling in Python Automated clearing of source cod

Bill Thompson's Bookmarks

http://thompsonian.info/webmark.html

World by Tom Tomorrow Computers _ Digital Media Games & Arcade Game Emulators WebPacMan - Play Free Pacman Game Online free, download Ms pacman MAME - The official Multiple Ar

NLnet; All projects

https://nlnet.nl/project/

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent


Find more...