wiby  
Settings



OpenBSD/sparc64

http://www.openbsd.org/sparc64.html

Themis T2BC Force Computers CPU-50/CPU-50G Force Computers CPU-56/CPU-56T Force Computers CPCI-520 Force Computers CPSB-560 Most of these machines will almost certainly just work.
the OpenBSD

Sniffin' the Ether v2.0

http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html

to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

Chernobyl happened, Computers were still mostly 8-bit, Asbestos was still being used, and, despite the numbers declining already, cigaretts were still way more common. All that as
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

Flatpak Is Not the Future

https://ludocode.com/blog/flatpak-is-not-the-future

root devices of modern computers. Built-in storage has in fact been shrinking. Software has gotten so much slower and more bloated that operating systems no longer run acceptably

BeOS.jp.ax BeOS Fansite and Archive

https://beos.jp.ax/

designed for personal computers. It offers a unique user interface and advanced multimedia capabilities. Be OS was first developed in the early 1990s by Be Inc. and gained attenti

Bit permutations

http://programming.sirrida.de/bit_perm.html

as was done on ancient computers. Today only base 2 (i.e. bits) is used, and this is what is crucially needed for all bit operations. If signed numbers are present, it is assumed
An essay about bit permutations in software

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Apple 1 Registry

http://www.willegal.net/appleii/apple1-originals.htm

of Original Apple 1 Computers 66 Apple 1s Currently Listed this version of registry last updated June, 2015 (This page will not be updated in the foreseeable future) Maintenance o

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys/pdf/DEBUG.TXT

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

Ye Olde Blogroll - Because blogs are the soul of the web

https://blogroll.org/

grew up obsessed with computers, video games, and running pretend businesses. Nintil To estimate, compare, distinguish, discuss, and trace to its principal sources everything. The

Unix philosophy description by The Linux Information Project (LINFO)

https://www.linfo.org/unix_philosophy.html

on a wide variety of computers; rather, each computer manufacturer developed a separate operating system for its own hardware. Another important factor in Thompson's desire for ma

Offsite Backup - Orange County

http://www.onsitetechnicians.com/backup.php

documents on our computers. But do you have a backup plan to save your digital life in case of hardware or server failure? Millennium Systems offers offsite data backup so you’ll
Millennium Systems On-Site Technicians come to your home of office and help you with all your computer repair needs. Local to Orange County we have fast response times to help you


Find more...