An interview with Joey Hess [LWN.net]https://lwn.net/Articles/672352/
cars. People are using computers in increasingly constrained ways, so they are cut off from understanding how things work and become increasingly dis-empowered. These are worrying
Two of the earliest figures in the Linux community were Lars Wirzenius and Joey Hess. So when [...]
Linuxhttps://www.billdietrich.me/Linux.html
to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths
Telegram FAQhttps://telegram.org/faq
your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…
fpgacpu.org - FPGA CPU Newshttp://www.fpgacpu.org/
of an afficianado of computers ... If you're looking for tips on how to break into someone else's computer, you won't find them here." -- Preface Sunday, November 10, 2002 The old
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
the djb way: the djb why?http://thedjbway.b0llix.net/djbwhy.html
Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why
Virus Fightershttp://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm
per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2
PTBSync Desktop Organizerhttps://netcult.ch/elmue/Desktop-Organizer/
5.7b : Bugfix: On some computers version 5.7 produced elevated CPU load. New in Version 5.7 : Adapted to run on Windows 8. Bugfix JavaScript Error: ";" expected. Improved Internet
CELF Embedded Linux Conferencehttps://www.embeddedlinuxconference.com/elc_2009/sessions.html
ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni
Kicks Condorhttps://www.kickscondor.com/
the whole are on home computers, that has implications. For me, Beaker DOES pay attention to the original good part: view source. It brings view source to the modern ‘ye-app-web’
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
25 Years of Linux — so far [LWN.net]https://lwn.net/Articles/698042/
in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]
Find more...