wiby  
Settings



qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

Telegram FAQ

https://telegram.org/faq

your phones, tablets or computers. Telegram is one of the top 5 most downloaded apps in the world with over 1 billion active users. With Telegram, you can send messages, photos, v
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

fpgacpu.org - FPGA CPU News

http://www.fpgacpu.org/

of an afficianado of computers ... If you're looking for tips on how to break into someone else's computer, you won't find them here." -- Preface Sunday, November 10, 2002 The old

On Hacking - Richard Stallman

http://stallman.org/articles/on-hacking.html

from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33" (****) , is more o

Ed Bott: Bought by Microsoft

http://techrights.org/o/2008/11/09/ed-bott-laptop-bribe/

companies give out computers on long term loan, etc, but that’s not the same thing. It’s their product for a start (Microsoft doesn’t make computers) and they’re loaners, not keep
Microsoft faithfuls receive free gifts from Microsoft as well

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

How to start with CP/M

http://www.retrotechnology.com/dri/howto_cpm.html

CP/M-68K on 68000 based computers.) 8080/8085/Z80 computers of the 1970's and 80's can be found; check this part of my document about old and new CP/M computers. A popular option

Windows XP

https://www.lehigh.edu/~skr5/winxpseminar.html

is an Operating System? Computers use an application called an Operating System to coordinate the operations of your computer. The diagram below illustrates that the Operating Sys

History of the WWW Subdomain

http://shystudios.us/blog/subdomain/history.html

registry for arpanet. Computers would download this list via FTP to get addresses for each host on the network. The hostnames were things like "BRL", "UCB", and "UCLA-CCn". Eventu
The real history of the www subdomain, and why we don't use it

Go beyond work with Linus Lee, Daniela Petruzalek, & Sebastian Spaink (Go Time #212)

https://changelog.com/gotime/212

TV programming about computers - computer programs that were coming out in the mid ’80s, early ‘90s - and it’s kind of astonishing how all those programs sort of expect the user t
Our final installment from GopherCon 2021 is an awesome panel conversation led by Natalie & Angelica with guests Linus Lee, Daniela Patruzalek, and Sebastian Spank. All three o

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is


Find more...