wiby  
Settings



FreeBSD is an amazing operating system

https://unixdigest.com/articles/freebsd-is-an-amazing-operating-system.html

on FreeBSD. The only computers that didn't run FreeBSD was the computers at the office where the sales people and secretaries worked, those ran Microsoft Windows 98. When I asked

MorphOS - Frequently Asked Questions

https://www.morphos-team.net/faq

Ax00 series of computers. A few parts of MorphOS were originally derived from work made for the open source AROS project. What hardware do I need to run MorphOS? MorphOS is curren

Joseph Campbell with Bill Moyers "The Power of Myth"

https://carljung.ru/Library/CampMoye.htm

going to save us. Our computers, our tools, our machines are not enough. We have to rely on our intuition, our true being."      "Isn't that an affront to

WAI-ARIA 1.0 User Agent Implementation Guide

https://www.w3.org/TR/wai-aria-implementation/

defined in a way that computers can process a representation of an object , such as elements and attributes , and reliably represent the object in a way that various humans will a

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
This is a solar-powered website, which means it sometimes goes offline

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

https://www.rogerarrick.com/osiris/burgett.txt

https://www.rogerarrick.com/osiris/burgett.txt

DEBUG instruction. Many computers have a single byte instruction, called DEBUG, which when executed, would do an indirect call through a fixed address. This allows people who writ

Quote Anthology

https://quotes.pouyakary.org/

to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people

Todos los enlaces @ cidoku.net

http://cidoku.net/links/all

browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m

Smartphone

https://www.billdietrich.me/Smartphone.html

my Android page Home Computers Smartphone Basics Combinations [Ignores Apple.] Android phone with stock OS, run Android apps. Android phone with AOSP-compatible third-party OS ( L
Smartphone types, security, privacy, use


Find more...