Welcome to Matthieu Benoit electrical engineering home pagehttp://matthieu.benoit.free.fr/
microprocessors microcomputers memories interfaces Competitive Cross ref. Data sheets Selection cross/data_sheets/ Devices resources by part number pn Parts and Electronic
John Hardin's Home Pagehttp://www.impsec.org/~jhardin/
Internet from several computers at the same time through only one IP address and telephone line or ISDN/DSL/Cable Modem. Great for homes where two (or more) people want to surf at
Introduction: Why Lisp?https://gigamonkeys.com/book/introduction-why-lisp.html
father got his start in computers writing an operating system in assembly for the machine he used to gather data for his doctoral dissertation in physics. After running computer s
Quote Anthologyhttps://quotes.pouyakary.org/
to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people
Should I Block Ads?https://shouldiblockads.com/
Pi-hole for embedded computers This one is the best option if you have lots of computers. You install Pi-hole on your network, reconfigure a router setting, and every device in yo
Yes, you should use an ad blocker.
CASsette IO Utilities - Readmehttp://www.mvcsys.de/doc/casioutil.html
from vintage pocket computers Download Generations of Casio pockets. The PB-100 series The FX-702P The PB-700, PB-770 and FX-750P The FX-850P, FX-870P, FX-880P, FX-890P, VX-1 to 4
Ken Silverman's Build Engine Pagehttp://www.advsys.net/ken/build.htm
this. I don't install computers for a living. I usually have to resort to good old trial and error to get stuff like this to work. About the sound patches: They only fix a crashin
The rEFInd Boot Manager: Getting rEFIndhttp://www.rodsbooks.com/refind/getting.html
or 32-bit ( x 86) EFI computers. I've included an open source EFI shell program on this disc that's not included in the binary zip file, so that you can access an EFI shell from a
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/archive/activity.html
the answer is laptop computers. , most amusing. Tried to re-build lzma-alpha-devel and deltarpm on my old server system to make an applydeltaiso that can operate on the new openSU
Unix/Linux Commands, Syntax, And Noteshttps://zerocontradictions.net/programming/linux-commands-notes
user (usually other computers) If you want to respond to someone that is trying to talk to you, you must exit to the shell (if you are in the middle of a text editor or other prog
This webpage features a summary of commands and information from the Unix Programming Environment, and other commands and information compiled from other sources.
Faces Archivehttps://kinzler.com/ftp/faces/
for PalmOS handheld computers to include an X-Face in Address Book entries. Includes software for X-Face image conversion under Windows. Mirrored occasionally from <URL:http://
Collected and mirrored sources for software that can use picons databases containing personal icons of users, domains and newsgroups on the net.
Find more...