wiby  
Settings



BTTR Software | Back to the roots of software engineering

https://www.bttr-software.de/

for 80x86-based computers running DOS-compatible operating systems. Most of our products are free by the meanings of the three-clause BSD license or the GNU General Public License

Command Line Interface Guidelines

https://clig.dev/

Forty years later, computers have become so much more accessible to everyone, often at the expense of low-level end user control. On many devices, there is no command-line access
An open-source guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.

A Constructive Look At TempleOS

http://www.codersnotes.com/notes/a-constructive-look-at-templeos/

I complain loudly about computers. Very Sleepy A C++ CPU profiler I helped make. Follow me: Subscribe (Fiction) Subscribe (Technical) Follow me at @grumpygiant Recent posts: Why B

Quoth the Raven, "Welcome!"

http://linuxmafia.com/

old fellow's shoulder. Computers are like that, aren't they? Large, brooding, and inclined to raucously utter noises of ill omen. Welcome to "hugin" . . . but be caw-tious. System

Tom Van Vleck home page

https://multicians.org/thvv/tvv-home.html

How I got started in computers .. in a suburban basement in the 1950s (1995) 1401s I have known . Includes HELLO WORLD (2002) The IBM 7070 . An interesting and little-known machin
Personal home page of Tom Van Vleck.

Byte August 1980 What is FORTH?

http://jupiter-ace.co.uk/Forth_general_byte8008_100.html

on most common personal computers (eg: Apple, TRS-80) and all major microprocessors (eg: 8080, 6800, 6809, 6502, PACE, LSI-11, and 9900). An international FORTH Standards Team exi
Jupiter Ace Resource site Byte August issue 1980 What is FORTH

Resume -- Chip Morningstar

http://www.fudco.com/chip/resume.html

devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

Lotus 1-2-3 For Linux

http://lock.cmpxchg8b.com/linux123.html

on alt.folklore.computers if they had seen this before and why this might have happened. The answer was that this is probably deliberate - dlopen() was not widely available on UNI

retawq Home Page

https://retawq.sourceforge.net/

) for text terminals on computers with Unix-like operating systems. It is written in C, fast, small, nicely configurable, and comfortable; e.g. the low-level network communication
retawq - a multi-threaded web browser fortext terminals

Jeff Duntemann's Wardriving FAQ

http://www.drivebywifiguide.com/wardrivingfaq.htm

The kid was looking for computers supporting online games and had no strong intent to "break into" anything—the problems that developed lay with an essentially unde
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i


Find more...