wiby  
Settings



Linux

https://www.billdietrich.me/Linux.html

Linux" page My "Linux Networking" page My "Linux Storage" page My "Linux Problems" page My "Linux Network and Security Controls" page My "Linux GUI" page My "VMs and Containers" p
Linux operating system basics, parts, myths, and truths

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

to the domain of networking. Unfortunately, the main abstraction used to represent packet data in P4, namely header types, lacks basic safety guarantees. Over the last few years,
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

It looks like a product but is secretly a subscription

https://calpaterson.com/printers.html

a subscription is networking: if it connects to the internet, and thus to some server, it is likely to be a subscription rather than a product - even if the "product" itself claim
The mental minefield of capex and opex

TCB13.com

https://tcb13.com/

Linux Virtual Networking DNSCrypt vs DoT vs DoH IPv6 prefix delegation using systemd-networkd Online Tools Mozilla Web Server SSL Configuration Generator crt.sh - SSL Certificate

Henning Brauer Consulting

https://henningbrauer.com/

technology: networking, mail, dns, webservers - and before it became fashionable, security. The interest in doing things properly and securely soon brought me to OpenBSD , initial
Henning Brauer Consulting

Scientology v. the Internet

https://www.discord.org/lippard/skeptic/03.3.jl-jj-scientology.html

technology of computer networking that worry many people. Anonymous and private communication can be used by terrorists, drug smugglers, and child pornographers, which the U.S. go

The computer built to last 50 years

https://ploum.net/the-computer-built-to-last-50-years/

the keyboard, the networking unit, the sound unit and the storage unit. All of this come in a case. Of course, each block could be made of separate components that could be fixed
The computer built to last 50 years par Ploum - Lionel Dricot.

Rants

http://toastytech.com/evil/rants.html

such as the WININET.DLL networking library will also remain, so that programs that stupidly used them will still operate. Because of how Microsoft tried to make IE an "Integrated

Julia Evans

https://jvns.ca/

your terminal? Computer networking Sep 2022 How to send raw network packets in Python with tun/tap Jul 2022 A toy remote login server Jan 2022 Reasons for servers to support IPv6
Julia Evans

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

built-in TCP/IP networking methods (Telnet, Rlogin, IKSD, FTP, and HTTP) can be secured by one or more of the following IETF-approved methods: MIT Kerberos IV MIT Kerberos V SSL/T

RFC 1480: The US Domain

https://www.rfc-editor.org/rfc/rfc1480

and the Federal Networking Council (FNC)) to direct these school registrations to the US domain using the naming structure described here. There is a need for competent, experienc

Continuous-integration testing for Intel graphics [LWN.net]

https://lwn.net/Articles/735468/

stuff keeps working, networking people try to keep networking in working order and so on. Of course you can't cover everything, and the occasional regression on an odd combo of hw
Two separate talks, at two different venues, give us a look into the kinds of testing that the [...]


Find more...