October 1999 - The Axis of Jewish Powerhttps://www.eaec.org/newsletters/1999/NL1999Oct.htm
system on people and organizations which they deem to be anti-Semitic. The JDL encountered some criminal charges in the city of San Francisco, when they themselves had broken the
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
annoy IT staff in large organizations anyway because they mean some poor sap has to walk around physically from desk to desk. So I bet the thing ends up scriptable across all mach
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Network Protocols and Standardshttps://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm
between an organizations LAN and the telco. A T1 line uses two pairs of wire one to transmit, and one to receive. and time division multiplexing (TDM) to interleave 24 64-Kbps voi
Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!https://dwheeler.com/oss_fs_why.html
are somewhat dated). Organizations can transition to FLOSS in part or in stages , which for many is a more practical transition approach. I’ll emphasize the operating system
This paper provides quantitative data that, in many cases, open source software
VC&G | » The PC is Dead: It’s Time to Bring Back Personal Computinghttp://www.vintagecomputing.com/index.php/archives/3292/the-pc-is-dead-its-time-to-make-computing-personal-again
other large, faceless organizations to grant us privacy out of their beneficence” and “We must defend our own privacy if we expect to have any” cypherpunk is the
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.
Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Interhttps://cryptome.org/wipo-imp99-3.htm
individuals or organizations. Rather, they can serve basically just "to keep honest people honest"—to facilitate respect of rights in works—and to pose an obstacle to th
Managing EFI Boot Loaders for Linux: Dealing with Secure Boothttp://www.rodsbooks.com/efi-bootloaders/secureboot.html
be reserved to trusted organizations.) The initial public discussion of these matters was sparked by a blog post by Matthew J. Garrett, then a Red Hat developer, in September of 2
Find more...