Linux FAQhttps://www.linfo.org/faq_linux.html
Linux on as many computers as desired. Q: I have a book about Red Hat Linux 8 which contains the installation CDROMs. Would it be better to buy a new book for a more recent versio
Kermit Security Referencehttps://www.kermitproject.org/security.html
mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,
Gnutella and Freenet Represent True Technological Innovationhttp://www.praxagora.com/andyo/professional/gnutella_freenet_technological_innovation.html
People with large computers and high bandwidth will encourage many others to connect to them. You will communicate directly only with the handful of sites you’ve agreed to c
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to
What is a "Version" in a Program? - Virtual Curiositieshttps://www.virtualcuriosities.com/articles/1124/version
complex and essential computers, I decided to use my technical expertise in hardware, desktop applications, and web technologies to create an informative resource to make PC's eas
A way to identify a program that has one name but changed over time or has multiple editions.
Find more...