wiby  
Settings



DistroWatch.com: Put the fun back into computing. Use Linux, BSD.

https://distrowatch.com/

necessary, to refurbish computers based on a 32-bit architecture. Based on the Debian 12.13; improved Italian translation; assignment of sound volume to 50% by default; added Wine
News and feature lists of Linux and BSD distributions.

Doom as an Interface for Process Management

https://www.cs.unm.edu/~dlchao/flake/doom/chi/chi.html

our relationship with computers. The application relies on a computer game vernacular rather than the simulations of physical reality found in typical navigable virtual environmen
Doom as an Interface for Process Management

Using the KVM API [LWN.net]

https://lwn.net/Articles/658511/

In some respects computers can be quite depressing: mostly re-inventing the old https://en.wikipedia.org/wiki/Hardware-assisted_virtualiz... Sure, they're now much faster... to cr
Many developers, users, and entire industries rely on virtualization, as provided by software l [...]

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

Kernel Planet

https://planet.kernel.org/

There are far more computers in the world than performance engineers to tune them, leaving most running untuned and wasting resources. In future there will be AI performance agent

Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

((lambda (x) (create x)) '(knowledge))

https://lambdacreate.com/posts/26

using only their oldest computers. For most this meant something with a gig of ram (which was then software limited down to 1/2gb), and some sort of 2000's CPU on old 5400rpm hdds

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

How to read and write old floppy disks

http://www.retrotechnology.com/herbs_stuff/s_drives_howto.html

which was available on computers and devices either vintage (20th century), or into the early 2010 years. On another Web page, I have a lot of information about original floppy dr

Loper OS ยป Bitcoin, or How to Hammer in Nails with a Microscope.

http://www.loper-os.org/?p=939

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

What Unix Gets Right

http://www.catb.org/esr/writings/taoup/html/ch01s05.html

a heterogeneous mix of computers, vendors, and special-purpose hardware. It is the only operating system that can scale from embedded chips and handhelds, up through desktop machi


Find more...