Home page of Blaze the Maintainer (Son of a Series of Dudes, thus a SubDude)http://subdude-site.com/
free and/or open-source software conferences) COMPUTER - LINUX SOFTWARE Websites (in categories) COMPUTER - 3D MODELLING Websites COMPUTER - Tech-BLOG Websites COMPUTER - GEAR Web
subdude-site.com provides four main typesof web pages : 1) links, 2) reference-info, 3) blog, 4) pictures ---in sub-categories such as- computers (linux, tcl-tk, web development)-
CipherSaber Home Pagehttps://ciphersaber.gurus.org/
come with all DOS based computers, is suitable. It can still be found on the Microsoft Windows '95 CD-ROM in the OTHER\OLDMSDOS directory, and on the Microsoft Windows '98 CD-ROM
Fight the crypto ban by learning how to write your own strong encryption program.
C-Kermit Unix Hints and Tipshttps://www.kermitproject.org/ckubwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they
World Wide Waste | Gerry McGovernhttp://gerrymcgovern.com/books/world-wide-waste/
packed full of computers hungry for energy. It seems invisible. It seems cheap and free. It’s not. Digital costs the Earth. One of the most difficult challenges with digital is t
Anshul Gandhihttp://www3.cs.stonybrook.edu/~anshul/
IEEE Transactions on Computers, IEEE Transactions on Cloud Computing, ACM/IEEE Transactions on Networking, Performance Evaluation, Annals of Operations Research, Operations Resear
Debian -- About Debianhttps://www.debian.org/intro/about
on thousands of computers as easily as installing a single application. All of it free . It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools
Greg A. Woodshttp://www.weird.com/~woods/
name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it
Tips - Al Jazeera Englishhttps://webapps.aljazeera.net/aje/tips/
or work phones or computers to contact us. - Encrypt any sensitive information you have stored locally. Find out how and why here . - Use strong passwords on your phone and compu
Sniffin' the Ether v2.0http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html
to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur
Vulonkaaz's linkshttps://vulonkaaz.zip/links.html
be useful for school computers or whatever) Eaglercraft : Minecraft Java ported to web browser, lower performance than native java of course but it's crazy it even works, even hav
DX LISTENING DIGEST AUGUST 2003 ARCHIVEhttp://www.w4uvh.net/dxldtd3h.html
such as the number of computers in the two Koreas. Many South Koreans are unaware of the program. But for decades, North Korea has considered it a propaganda tool aimed at destabi
C-Kermit 9.0 General Hints and Tipshttps://www.kermitproject.org/ckcbwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl
Find more...