FreeBSD is an amazing operating systemhttps://unixdigest.com/articles/freebsd-is-an-amazing-operating-system.html
on FreeBSD. The only computers that didn't run FreeBSD was the computers at the office where the sales people and secretaries worked, those ran Microsoft Windows 98. When I asked
MorphOS - Frequently Asked Questionshttps://www.morphos-team.net/faq
Ax00 series of computers. A few parts of MorphOS were originally derived from work made for the open source AROS project. What hardware do I need to run MorphOS? MorphOS is curren
Joseph Campbell with Bill Moyers "The Power of Myth"https://carljung.ru/Library/CampMoye.htm
going to save us. Our computers, our tools, our machines are not enough. We have to rely on our intuition, our true being." "Isn't that an affront to
WAI-ARIA 1.0 User Agent Implementation Guidehttps://www.w3.org/TR/wai-aria-implementation/
defined in a way that computers can process a representation of an object , such as elements and attributes , and reliably represent the object in a way that various humans will a
How to Build a Low-tech Website? | LOW←TECH MAGAZINEhttps://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/
shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
This is a solar-powered website, which means it sometimes goes offline
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
CRN / Unixhttp://crn.hopto.org/unix.html
into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.
https://www.rogerarrick.com/osiris/burgett.txthttps://www.rogerarrick.com/osiris/burgett.txt
DEBUG instruction. Many computers have a single byte instruction, called DEBUG, which when executed, would do an indirect call through a fixed address. This allows people who writ
Quote Anthologyhttps://quotes.pouyakary.org/
to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people
Todos los enlaces @ cidoku.nethttp://cidoku.net/links/all
browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m
Smartphonehttps://www.billdietrich.me/Smartphone.html
my Android page Home Computers Smartphone Basics Combinations [Ignores Apple.] Android phone with stock OS, run Android apps. Android phone with AOSP-compatible third-party OS ( L
Smartphone types, security, privacy, use
Find more...