Archivehttps://jxself.org/archive.shtml
digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software
Kernel Planethttps://planet.kernel.org/
with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu
System Administration Bits of Knowledgehttp://www.toad.com/gnu/sysadmin/
my computer despite it. Computers are very programmable and one of the joys of free software is that if you don't like what the software does, you can change it yourself. I didn't
Cocaine Inchttps://www.cocaine.wiki/cokecrime/
feet high, and 15 to 20 computers networked with servers and a small mainframe. The same kind of state-of-the-art setup existed in communications centers at Urrego's ranch in Mede
My Sailboat 'Magnolia'https://www.billdietrich.me/Magnolia.html
and other public computers in the USA. Yes, theoretically it is possible that an ISP or internet cafe could capture your info. Probably most likely threat is that a computer in an
My sailboat 'Magnolia', a 1973 Gulfstar 44 motor-sailer pilothouse ketch in the Caribbean
Ron Horii's San Francisco Bay Area Parks, Recreation and Travelhttp://rhorii.com/
hiking, biking, computers, geocaching, travel, and travel writing. I've created a number of Web pages on travel and recreation in the San Francisco Bay Area and California. Here y
How to start with CP/Mhttp://www.retrotechnology.com/dri/howto_cpm.html
CP/M-68K on 68000 based computers.) 8080/8085/Z80 computers of the 1970's and 80's can be found; check this part of my document about old and new CP/M computers. A popular option
The unix programming environmenthttp://www.talisman.org/unix/burgess-guide.html
well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
25 Years of Linux — so far [LWN.net]https://lwn.net/Articles/698042/
in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre
Apollo Archivehttps://jim.rees.org/apollo-archive/
Apollo Page Retrocomputers Apollo Collection Typewritten Software - Retrotechnology Research Laboratory These sites were up at one time but were down last time I checked. Apollo D
Find more...