wiby  
Settings



Linux FAQ

https://www.linfo.org/faq_linux.html

Linux on as many computers as desired. Q: I have a book about Red Hat Linux 8 which contains the installation CDROMs. Would it be better to buy a new book for a more recent versio

Kermit Security Reference

https://www.kermitproject.org/security.html

mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,

Gnutella and Freenet Represent True Technological Innovation

http://www.praxagora.com/andyo/professional/gnutella_freenet_technological_innovation.html

People with large computers and high bandwidth will encourage many others to connect to them. You will communicate directly only with the handful of sites you’ve agreed to c

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

What is a "Version" in a Program? - Virtual Curiosities

https://www.virtualcuriosities.com/articles/1124/version

complex and essential computers, I decided to use my technical expertise in hardware, desktop applications, and web technologies to create an informative resource to make PC's eas
A way to identify a program that has one name but changed over time or has multiple editions.


Find more...