wiby  
Settings



Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Piet Beertema's website

https://godfatherof.nl/

a wild variety of computers worldwide, speaking the same "language" to communicate: the Internet Protocol, or in short IP. And ' www ', CERN's first and in fact sort of 'prehistor

http://galileo.phys.virginia.edu/classes/551.jvn.fall01/primer.htm

http://galileo.phys.virginia.edu/classes/551.jvn.fall01/primer.htm

be 64 bits on 32-bit computers). Hence we shall use doubles so the program will run on any ANS-compatible Forth. A double-length integer is entered from the keyboard by including

100R — weathering software winter

https://100r.co/site/weathering_software_winter.html

software, you need slow computers, and we've tried to espouse this as much as we could. We spend our time sailing around, and doing experiments with resilience, that covers comput

https://www.kermitproject.org/ftp/kermit/ckermit/makefile

https://www.kermitproject.org/ftp/kermit/ckermit/makefile

version of Linux on any hardware. # + "make linux+ssl" ditto, with OpenSSL security added. # + "make linux+krb5" ditto, with Kerberos 5 security added. # + "make linux+krb5+ssl" L

Unix Virus Bibliography

https://bruceediger.com/virefs.html

VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses

Big Ball of Mud

https://www.laputan.org/mud/mud.html

generation ago was that computers and business requirements changed at a more leisurely pace. Hardware was very expensive, often dwarfing the salaries of the programmers hired to
While much attention has been focused on high-level software architectural patterns,what is, in effect, the de-facto standard software architecture is seldom discussed. Thispaper e

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell

Thomas Tempelmann | Who Is Thomas Tempelmann?

http://www.tempel.org/AboutThomasTempelmann

At the time, Windows computers used the Joliet extension to record long file names on Data-CDs, whereas Apple's Mac OS did not support this extension, so that a Mac would show onl

Digital History | Promises and Perils of Digital History

https://chnm.gmu.edu/digitalhistory/introduction/

will be scanned into computers and made available to anyone, anywhere, almost instantly, over high-speed networks.” Not to be outdone by his authors, Wired publisher Louis R

The Back Page LG #65

https://www.linuxdoc.org/LDP/LG/issue65/lg_backpage65.html

and working with computers since the Elder Days (anybody remember the Elf II?), and isn't about to stop any time soon. Pradeep Padala I am a software engineer at Hughes Software S

https://ed-thelen.org/comp-hist/amdahl-bio-core-1-4.html

https://ed-thelen.org/comp-hist/amdahl-bio-core-1-4.html

he began designing computers on his own time. When the Electrical Engineering department heard about this "other" work, Amdahl was encouraged to build a computer that could be use


Find more...