http://www.catb.org/jargon/oldversions/jarg262.txthttp://www.catb.org/jargon/oldversions/jarg262.txt
else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,
Extra Ordinary | D. Griffin Joneshttps://www.dgriffinjones.com/
humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.
Ayham's Online Website | A Practical Guide to GnuPGhttps://ayham.xyz/posts/a-practical-guide-to-gpg/
keys to other computers and using online services like Github and Codeberg. Generating GnuPG Master-keys GnuPG uses asymmetric encryption, which means that you would use 2 keys. P
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Reaction to the DEC Spam of 1978https://www.templetons.com/brad/spamreact.html
DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX OPERATING SYSTEM AND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE. BOTH THE DECSYSTEM-2060T AND 2020T OFFER FU
Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
Windows Explorer Timeline | Gekkhttp://gekk.info/articles/explorer.html
, where other computers live, and My Briefcase , which is literally a meta-representation of portable devices or storage media that exist outside of your computer. So in essence M
At a glance comparison of every major Explorer release
The Computer Underground, Inchttp://tcu-inc.com/
support. We do not sell computers, but will support Linux Servers and Workstations in the Bay Area of California. What we prefer to support Perl, PHP, Python, Javascript, HTML, SQ
The Computer Underground sells and supportsa variety of computer platforms and operating systems. Also, we provide consultants with networking, systemsadministration, and programmi
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
https://www-users.cse.umn.edu/~odlyzko/doc/decline.txthttps://www-users.cse.umn.edu/~odlyzko/doc/decline.txt
instruction set computers) is an example of unfettered research, in that IBM allowed him to work on whatever he chose. However, Cocke had already made valuable contributions to th
Home - skipster1337's Sitehttps://skipster1337.github.io/
things related to old computers, operating systems and software, and trying to keep them usable in modern times. Hope you enjoy your stay. Also, I tried my best to make this work
Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</https://www.kermitproject.org/k95.html
and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector
Find more...