wiby  
Settings



World Wide Web (in)Security

http://pages.swcp.com/~mccurley/danger/danger.html

Now that personal computers are becoming networked to the Internet (rather than just UNIX machines), there will be even better targets for them in the future. As a demonstration,

Career Guide for Engineers and Computer Scientists

http://philip.greenspun.com/careers/

meant Man to program computers, He wouldn't have given him C. Thou Shalt Remember that If God had meant Man to use computers, He wouldn't have given him UNIX and MS/DOS. Serious S

selectparks

http://ljudmila.org/~selectparks/index.php

for use on desktop computers with build the PS3 as a build target (it seems). We have no idea of what license this will come under but wow.. a big step by Sony. Read more about it
art defining games

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

draft-klyne-conneg-feature-match-02.txt from Luu Tran on 2003-04-17 (www-archive@w3.org from April 2003)

https://lists.w3.org/Archives/Public/www-archive/2003Apr/0047.html

Ellis Horwood Series: Computers and their Applications ISBN 0-85312-709-3/0-85312-803-3 (Ellis Horwood Ltd) ISBN 0-470-20103-7/0-470-20259-9 (Halstead Press) 1984. [12] "Logi

Chris Koehnke's Webpage

http://chriskoehnke.com/

2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

Learn All About Web Browser Cookies | Know Cookies

https://knowcookies.com/

website. This is how computers and mobile devices keep track of and store your login information, language and contrast preferences, bookmarks and more. Persistent cookies are als
Learn about cookies with our very accessible and informative website. Have questions or concerns regarding cookie usage? Find out more about cookies today.

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

NLnet; All projects

https://nlnet.nl/project/

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.


Find more...