wiby  
Settings



Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</

https://www.kermitproject.org/k95.html

and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector

S.U.P.E.R. - The Largest 200LX Software Archive

http://mizj.com/

use on PC-compatible computers. It emulates 8080/8085/Z80 processors and provides terminal emulation for most CP/M machines. CP/M programs are fully integrated into the DOS enviro
The Palmtop Network's SUPER Site is the largest collection of Hewlett-Packard 200LX palmtop computer software on the Internet.

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Web Hosting: Dedicated Servers (thefreecountry.com)

https://www.thefreecountry.com/webhosting/dedicated-servers.shtml

servers are basically computers that have a single function: to host and run the websites you place on them. Unlike shared web hosting where you have to share your disk space, CPU
Reviews of web hosts providing dedicated servers, where your website does not share a computer with other customers.

"Do It Better: SSH" by Colin Cogle

http://colincogle.name/blog/do-it-better/ssh/

connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.

Solene'%

https://dataswamp.org/~solene/index-full.html

switched to different computers: two in Bluetooth, one for the dongle. The first profile is always the dongle. This allows you to connect the mouse to two different computers with

intro

https://srobb.net/

us who have dealt with computers and the internet for awhile have all had this experience--our friend calls, and says, 'Guess what? I'm finally hooked up to the internet and got 5

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Kermit Security Reference

https://www.kermitproject.org/security.html

mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,

MUCK Info

http://transform.to/~starling/stuff/muckinfo.html

run on individual's computers, not the server, and allow the client computers to communicate with a server running Fuzzball in the language of Telnet. You don't need a server to p


Find more...