wiby  
Settings



http://www.catb.org/jargon/oldversions/jarg262.txt

http://www.catb.org/jargon/oldversions/jarg262.txt

else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,

Extra Ordinary | D. Griffin Jones

https://www.dgriffinjones.com/

humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.

Ayham's Online Website | A Practical Guide to GnuPG

https://ayham.xyz/posts/a-practical-guide-to-gpg/

keys to other computers and using online services like Github and Codeberg. Generating GnuPG Master-keys GnuPG uses asymmetric encryption, which means that you would use 2 keys. P

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Reaction to the DEC Spam of 1978

https://www.templetons.com/brad/spamreact.html

DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED FROM THE TENEX OPERATING SYSTEM AND THE DECSYSTEM-10 <PDP-10> COMPUTER ARCHITECTURE. BOTH THE DECSYSTEM-2060T AND 2020T OFFER FU

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

Windows Explorer Timeline | Gekk

http://gekk.info/articles/explorer.html

, where other computers live, and My Briefcase , which is literally a meta-representation of portable devices or storage media that exist outside of your computer. So in essence M
At a glance comparison of every major Explorer release

The Computer Underground, Inc

http://tcu-inc.com/

support. We do not sell computers, but will support Linux Servers and Workstations in the Bay Area of California. What we prefer to support Perl, PHP, Python, Javascript, HTML, SQ
The Computer Underground sells and supportsa variety of computer platforms and operating systems. Also, we provide consultants with networking, systemsadministration, and programmi

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

instruction set computers) is an example of unfettered research, in that IBM allowed him to work on whatever he chose. However, Cocke had already made valuable contributions to th

Home - skipster1337's Site

https://skipster1337.github.io/

things related to old computers, operating systems and software, and trying to keep them usable in modern times. Hope you enjoy your stay. Also, I tried my best to make this work

Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</

https://www.kermitproject.org/k95.html

and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector


Find more...