"Do It Better: SSH" by Colin Coglehttp://colincogle.name/blog/do-it-better/ssh/
connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.
The evolution of C64 games 1982–2023http://linusakesson.net/games/evolution/c64.php
Chipophone Commodordion Computers Craft Craverly Heights in Dialog Dial-a-SID Dialog Elements of Chip Music Faking Fissile Material Fratres
CLI Club: Command-line Interface Tools & Alternativeshttps://cli.club/
Send files between computers. shbin Turn a Github repo into a pastebin. sharing Send and receive files on your mobile device. ncp Transfer files and folders, to and from NFS serve
A collection of the best CLI
Resume -- Chip Morningstarhttp://www.fudco.com/chip/resume.html
devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev
https://www.ietf.org/rfc/rfc6763.txthttps://www.ietf.org/rfc/rfc6763.txt
offload, so that computers can sleep and still be discoverable on the network. Early versions of such chipsets were sometimes quite limited: for example, some were Cheshire & Kroc
Installing Windows 95 & 98http://www.nickh.org/computer/instlwin9x.html
v2.5 around for older computers. IF you aren't using TCP/IP networking, you may want to customize your setup, and tell the client software to use IPX only. Yet More Update:
Old Cavebear Bloghttps://www.cavebear.com/old_cbblog/
was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin
Obsolyte - Obsolete and Elyte!http://www.obsolyte.com/
after when 'personal computers' were mere 8-bit clunkers. Obsolyte.com is hosted on a Sparc IPX, running RedHat Linux 6.0 for Sparc ( UltraLinux ) and the Apache Web Server. This
A website about the old workstations, focusing on unix systems. The only known archive of material.
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
Find more...