SPLAT! A Terrestrial RF Path Analysis Application For Linux/Unixhttps://www.qsl.net/kd2bd/splat.html
communications, computers, intelligence, surveillance, and reconnaissance) solutions to a wide range of customers. Utility companies who employ wireless SCADA (Supervisory Control
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random
NLnet; Current projectshttps://nlnet.nl/project/current.html
ARM-based single board computers AtomicServer Local-First AtomicServer Local-First Headless CMS Authlib Reliable OAuth and OIDC handling in Python Automated clearing of source cod
Kermit - What is it?https://kermitproject.org/kermit.html
for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a
Awesome-Warez | All your base are belong to us!https://lkrjangid1.github.io/Awesome-Warez/
between multiple computers. Pritunl - Enterprise Distributed OpenVPN and IPsec Server. Shadowsocks Secure SOCKS proxy used in China for bypassing the Great Firewall. SoftEther VPN
All your base are belong to us!
Getting started with Retro Assembly... Basic conceptshttps://www.chibiakumas.com/z80/basics.php
of Assembly and retro computers... This is for you! This episode will go over the concepts of computing, and what assembly assembly language is, and what it can do for you! What i
Books by Michael and Melody Covingtonhttps://www.covingtoninnovations.com/books.html
Ethics and Risks (Computers and AI) Electronics Computers Artificial Intelligence and Linguistics Astronomy and Astrophotography Our books can be ordered through any bookseller. &
Books by Michael and Melody Covington
Online BYTE Archivehttps://halfhill.com/bytelink.html
the most crash-prone computers ever built is that reliability has never been a high priority — either for the industry or for users. [Cover story: April 1998] Why Mainframes
https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txthttps://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt
speeds, about NSA supercomputers. There's just no reason for people to worry about "weak IDEA keys" when so many more pressing matters exist. (Let the experts worry.) Little of th
public voit - Homepage of Karl Voithttps://karl-voit.at/
of tasks I do on my computers and the software I am using for accomplishing these tasks. The first column also links corresponding workflow descriptions with further information o
Using the MM email client in the Modern Worldhttps://kermitproject.org/mm/
email even on Unix computers that no longer support mailspool delivery by using secure POP3 (Post Office Protocol) to fetch your new mail; you can send and receive mail in ISO 885
Old, but Interesting Programshttps://invisible-island.net/personal/oldprogs.html
But I could see that computers could do more than compute. I tried writing a program to generate anagrams. That did not go well. Larry Tessler (a less-known Tesler ). advised me t
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.
Find more...