BTTR Software | Back to the roots of software engineeringhttps://www.bttr-software.de/
for 80x86-based computers running DOS-compatible operating systems. Most of our products are free by the meanings of the three-clause BSD license or the GNU General Public License
Command Line Interface Guidelineshttps://clig.dev/
Forty years later, computers have become so much more accessible to everyone, often at the expense of low-level end user control. On many devices, there is no command-line access
An open-source guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.
A Constructive Look At TempleOShttp://www.codersnotes.com/notes/a-constructive-look-at-templeos/
I complain loudly about computers. Very Sleepy A C++ CPU profiler I helped make. Follow me: Subscribe (Fiction) Subscribe (Technical) Follow me at @grumpygiant Recent posts: Why B
Quoth the Raven, "Welcome!"http://linuxmafia.com/
old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System
Tom Van Vleck home pagehttps://multicians.org/thvv/tvv-home.html
How I got started in computers .. in a suburban basement in the 1950s (1995) 1401s I have known . Includes HELLO WORLD (2002) The IBM 7070 . An interesting and little-known machin
Personal home page of Tom Van Vleck.
Byte August 1980 What is FORTH?http://jupiter-ace.co.uk/Forth_general_byte8008_100.html
on most common personal computers (eg: Apple, TRS-80) and all major microprocessors (eg: 8080, 6800, 6809, 6502, PACE, LSI-11, and 9900). An international FORTH Standards Team exi
Jupiter Ace Resource site Byte August issue 1980 What is FORTH
Resume -- Chip Morningstarhttp://www.fudco.com/chip/resume.html
devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
Lotus 1-2-3 For Linuxhttp://lock.cmpxchg8b.com/linux123.html
on alt.folklore.computers if they had seen this before and why this might have happened. The answer was that this is probably deliberate - dlopen() was not widely available on UNI
retawq Home Pagehttps://retawq.sourceforge.net/
) for text terminals on computers with Unix-like operating systems. It is written in C, fast, small, nicely configurable, and comfortable; e.g. the low-level network communication
retawq - a multi-threaded web browser fortext terminals
Jeff Duntemann's Wardriving FAQhttp://www.drivebywifiguide.com/wardrivingfaq.htm
The kid was looking for computers supporting online games and had no strong intent to "break into" anything—the problems that developed lay with an essentially unde
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i
Find more...