wiby  
Settings



Kermit Software Source Code Archive

https://www.kermitproject.org/archive.html

] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ END MATTER ] Welcome to what might be the biggest collection on earth of software source code for

Gothic Charm School

https://gothic-charm-school.com/charm/

library and use their computers when you can. And let the Lady of the Manners assure you that your gothiness will not vanish just because you aren’t able to indulge in dark shades

Quoth the Raven, "Welcome!"

http://linuxmafia.com/

old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System

Post-OCSP certificate revocation in the Web PKI - Seirdy

https://seirdy.one/posts/2024/09/25/post-ocsp-revocation/

distros, note 17 retro computers, etc. won’t constantly update an evergreen multi-megabyte revocation filter. Getting a live-updating compressed summarized CRL on short-lived spin
OCSP, including OCSP Stapling, is leaving the Web PKI. Here's a complete look at revocation beyond OCSP: its past, present, and possible futures.

Old Cavebear Blog

https://www.cavebear.com/old_cbblog/

was accepted by their computers) has been lost. What kind of crazy game is this? Not only does the ALAC fail to live up to its promise of public publication, but it can't even fin

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t


Find more...