Home - ratfactorhttp://ratfactor.com/
to release our Learning Management System project under an open-source license. I think it’s a pretty great piece of software: single-page application based on mithril.js wi
CLI Club: Command-line Interface Tools & Alternativeshttps://cli.club/
automatic contact-list management, custom code insertion via a Ruby hook system, and more. If you’re the type of person who treats email as an extension of your long-term memory,
A collection of the best CLI
Solene'%https://dataswamp.org/~solene/index-full.html
to do cyber risk management the way they want, which is unique. A quick word about it if you are not familiar with risk management: for instance, when running software at differen
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writing Documentation, Part III: DocBook/XML , by Chris
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
in the Java Management Extensions (JMX) MBean components, unprivileged Java code can access restricted classes. By using that vulnerability in conjunction with a second vulnerabil
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
Esoteric Operating Systemshttps://sgfault.com/post/2018/05/2018-05-31-esoteric-os/
scheduling, memory management, device drivers and little else. Everything else such as the network stack, input handling, the filesystem and every other component you may think of
Managing EFI Boot Loaders for Linux: Dealing with Secure Boothttp://www.rodsbooks.com/efi-bootloaders/secureboot.html
label of Shim UEFI key management . This is the MokManager program, which Shim launched when your boot loader failed verification because its key is not yet enrolled. This is wher
Vita :: James Lyle Petersonhttp://www.jklp.org/profession/vita/vita.html
these classes of memory management algorithms, first to the weighted buddy system and then to more general buddy systems. The general algorithms, based on powers-of-two, Fibonacci
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
overhead and a key-management problem. Jack Masters <jackm.abc(at)starplace(dot)com> wrote: Rick Moen wrote: > test <test(at)example(dot)com> wrote: > ^^^^^^^^^^
Find more...