wiby  
Settings



A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

The Biggest Myths

http://0pointer.de/blog/projects/the-biggest-myths.html

truth in that. Modern computers are complex beasts, and the OS running on it will hence have to be complex too. However, systemd is certainly not more complex than prior implement
Posts and writings by Lennart Poettering

Loper OS » Seven Laws of Sane Personal Computing

http://www.loper-os.org/?p=284

with such things on our computers is a broken one: see the Seventh Law. Obfuscated code destroys my ability to usefully interrogate the machine about its activity at all times, an

Brendan Gregg's Homepage

https://www.brendangregg.com/

mostly my work with computers. While I currently work on datacenter performance for ChatGPT at OpenAI (previously Netflix), this site reflects my own opinions and work from over t
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.

Michael Orlitzky { Motherfuckers need package management }

https://michael.orlitzky.com/articles/motherfuckers_need_package_management.xhtml

slow.” Well, computers don't get slow—Windows gets slow. And it gets slow because you install a bunch of garbage on it and never track what that garbage is or where it

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
This is a solar-powered website, which means it sometimes goes offline

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

missing the point of webassembly — wingolog

http://wingolog.org/archives/2024/01/08/missing-the-point-of-webassembly

america bdw compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme s

Develop an Application

https://www.billdietrich.me/DevelopApplication.html

"How to Release Great Software Using these 12 Types of Testing" Andrej Acevski's "What They Don't Tell You About Maintaining an Open Source Project" Build Systems Shell scripts :
Strategies, tools, and languages for developing applications for personal computers and smartphones

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

Canoeboot – Free, Libre BIOS/UEFI boot firmware

https://canoeboot.org/

laptop and desktop computers. It initialises the hardware (e.g. memory controller, CPU, peripherals) and starts a bootloader for your operating system (OS). Linux and BSD are well
Canoeboot is a free


Find more...