A Security Curriculumhttps://learnaifromscratch.github.io/theabsolutestateofsoftware.html
secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've
The Biggest Mythshttp://0pointer.de/blog/projects/the-biggest-myths.html
truth in that. Modern computers are complex beasts, and the OS running on it will hence have to be complex too. However, systemd is certainly not more complex than prior implement
Posts and writings by Lennart Poettering
Loper OS » Seven Laws of Sane Personal Computinghttp://www.loper-os.org/?p=284
with such things on our computers is a broken one: see the Seventh Law. Obfuscated code destroys my ability to usefully interrogate the machine about its activity at all times, an
Brendan Gregg's Homepagehttps://www.brendangregg.com/
mostly my work with computers. While I currently work on datacenter performance for ChatGPT at OpenAI (previously Netflix), this site reflects my own opinions and work from over t
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.
Michael Orlitzky { Motherfuckers need package management }https://michael.orlitzky.com/articles/motherfuckers_need_package_management.xhtml
slow.” Well, computers don't get slow—Windows gets slow. And it gets slow because you install a bunch of garbage on it and never track what that garbage is or where it
How to Build a Low-tech Website? | LOW←TECH MAGAZINEhttps://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/
shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
This is a solar-powered website, which means it sometimes goes offline
Classic Mac Networkinghttp://www.applefool.com/se30/
other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of
missing the point of webassembly — wingologhttp://wingolog.org/archives/2024/01/08/missing-the-point-of-webassembly
america bdw compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme s
Develop an Applicationhttps://www.billdietrich.me/DevelopApplication.html
"How to Release Great Software Using these 12 Types of Testing" Andrej Acevski's "What They Don't Tell You About Maintaining an Open Source Project" Build Systems Shell scripts :
Strategies, tools, and languages for developing applications for personal computers and smartphones
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
Canoeboot – Free, Libre BIOS/UEFI boot firmwarehttps://canoeboot.org/
laptop and desktop computers. It initialises the hardware (e.g. memory controller, CPU, peripherals) and starts a bootloader for your operating system (OS). Linux and BSD are well
Canoeboot is a free
Find more...