wiby  
Settings



Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

poindexter, WHO?

http://tilde.club/~poindexter/

data from my family's computers. This "homelab" isn't one of those half-racks full of industrial-grade servers in closets you see on YouTube. I assembled mine over the years from

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

"Do It Better: SSH" by Colin Cogle

http://colincogle.name/blog/do-it-better/ssh/

connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.

Solene'%

https://dataswamp.org/~solene/index-full.html

switched to different computers: two in Bluetooth, one for the dongle. The first profile is always the dongle. This allows you to connect the mouse to two different computers with

intro

https://srobb.net/

us who have dealt with computers and the internet for awhile have all had this experience--our friend calls, and says, 'Guess what? I'm finally hooked up to the internet and got 5

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin

Kermit Security Reference

https://www.kermitproject.org/security.html

mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,

MUCK Info

http://transform.to/~starling/stuff/muckinfo.html

run on individual's computers, not the server, and allow the client computers to communicate with a server running Fuzzball in the language of Telnet. You don't need a server to p


Find more...