qmail: Second most popular MTA on the Internethttp://www.usenix.org.uk/mirrors/qmail/top.html
makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f
DistroWatch.com: Put the fun back into computing. Use Linux, BSD.https://distrowatch.com/
Pi single-board computers. The new version, besides bringing the usual range of bug fixes and improvements, also disables the passwordless sudo: " Today we are releasing version 6
News and feature lists of Linux and BSD distributions.
C++ Applicationshttps://www.stroustrup.com/applications.html
both Mac OS and Windows computers. Mentor Graphics : Since the 1980s Mentor Graphics has built most of its applications using C++, including: Calibre: software for IC physical ver
Loper OS » "Pest" v. 0xFB.http://www.loper-os.org/?p=4003
Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr
Telegram FAQhttps://telegram.org/faq
your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…
Fuck Big Tech: A Privacy Guidehttps://fuckbigtech.neocities.org/
If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional, you best start believing in cyberpunk dystopias, you are in one.
Fake privacy / security initiativeshttp://digdeeper.love/articles/fake_initiatives.xhtml
will be stored on their computers, its purpose, as well as the need to get consent from users before storing anything. There were also guidelines for the duration of the cookie's
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
The Dockhttp://koshka.love/links.html
designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0
4K Associates : Standards Strategy Consultantshttps://XeNT.com/4K-Associates/Press.html
on close to 10000 computers throughout the Internet. The challenge, called ECC2K-108, was set by Canadian cryptographic company Certicom in 1997 to encourage researchers to test t
The unix programming environmenthttp://www.talisman.org/unix/burgess-guide.html
well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2004/
left for home. Unpacked computers onto new table - can actually sit in front of any 1 of 3 concurrently - brilliant. Lunch, played with H. on the BBC cbeebies page; caught Miguel
Find more...