Linuxhttps://www.billdietrich.me/Linux.html
Linux" page My "Linux Networking" page My "Linux Storage" page My "Linux Problems" page My "Linux Network and Security Controls" page My "Linux GUI" page My "VMs and Containers" p
Linux operating system basics, parts, myths, and truths
Prof. Dr. Guido Salvaneschi | Programming Grouphttps://programming-group.com/members/salvaneschi
to the domain of networking. Unfortunately, the main abstraction used to represent packet data in P4, namely header types, lacks basic safety guarantees. Over the last few years,
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.
It looks like a product but is secretly a subscriptionhttps://calpaterson.com/printers.html
a subscription is networking: if it connects to the internet, and thus to some server, it is likely to be a subscription rather than a product - even if the "product" itself claim
The mental minefield of capex and opex
TCB13.comhttps://tcb13.com/
Linux Virtual Networking DNSCrypt vs DoT vs DoH IPv6 prefix delegation using systemd-networkd Online Tools Mozilla Web Server SSL Configuration Generator crt.sh - SSL Certificate
Henning Brauer Consultinghttps://henningbrauer.com/
technology: networking, mail, dns, webservers - and before it became fashionable, security. The interest in doing things properly and securely soon brought me to OpenBSD , initial
Henning Brauer Consulting
Scientology v. the Internethttps://www.discord.org/lippard/skeptic/03.3.jl-jj-scientology.html
technology of computer networking that worry many people. Anonymous and private communication can be used by terrorists, drug smugglers, and child pornographers, which the U.S. go
The computer built to last 50 yearshttps://ploum.net/the-computer-built-to-last-50-years/
the keyboard, the networking unit, the sound unit and the storage unit. All of this come in a case. Of course, each block could be made of separate components that could be fixed
The computer built to last 50 years par Ploum - Lionel Dricot.
Rantshttp://toastytech.com/evil/rants.html
such as the WININET.DLL networking library will also remain, so that programs that stupidly used them will still operate. Because of how Microsoft tried to make IE an "Integrated
Julia Evanshttps://jvns.ca/
your terminal? Computer networking Sep 2022 How to send raw network packets in Python with tun/tap Jul 2022 A toy remote login server Jan 2022 Reasons for servers to support IPv6
Julia Evans
CK10TUTOR - C-Kermit 10.0 Tutorialhttps://www.kermitproject.org/ckututor.html
built-in TCP/IP networking methods (Telnet, Rlogin, IKSD, FTP, and HTTP) can be secured by one or more of the following IETF-approved methods: MIT Kerberos IV MIT Kerberos V SSL/T
RFC 1480: The US Domainhttps://www.rfc-editor.org/rfc/rfc1480
and the Federal Networking Council (FNC)) to direct these school registrations to the US domain using the naming structure described here. There is a need for competent, experienc
Continuous-integration testing for Intel graphics [LWN.net]https://lwn.net/Articles/735468/
stuff keeps working, networking people try to keep networking in working order and so on. Of course you can't cover everything, and the occasional regression on an odd combo of hw
Two separate talks, at two different venues, give us a look into the kinds of testing that the [...]
Find more...