wiby  
Settings



systemd for Administrators, Part VI

http://0pointer.de/blog/projects/changing-roots

or even a different architecture (Example: host x86_64, guest i386). The full hierarchy of the host OS it cannot see. On a classic System-V-based operating system it is relatively
Posts and writings by Lennart Poettering

Pleroma | LandChad.net

https://landchad.net/pleroma/

have a different CPU architecture, replace that with whatever your architecture is. mv /tmp/release/* /opt/pleroma rmdir /tmp/release rm /tmp/pleroma.zip ./bin/pleroma_ctl instanc
Hopefully by now you won't have to be sold on the invasive practices that social media companies conduct. Websites such as Facebook and Twitter aquire so much data on users tha

The little book about OS development

http://littleosbook.github.io/

is the result. The x86 architecture is, and has been for a long time, one of the most common hardware architectures. It was not a difficult choice to use the x86 architecture as t

Plan 9 — The Documents (Volume 2)

http://9p.io/sys/doc/index.html

of the security architecture. Programming How to Use the Plan 9 C Compiler ( html | ps | pdf ) Rob Pike The starting point for C programming under Plan 9. Changes to the Programmi

The Obsessively Complete Infocom Catalog

https://eblong.com/infocom/

presumably in Sun architecture (the directory was labelled "sun"). From this historical repo (previously here ). (A handful of other utilities are included, including zsplit , zgl
Every known version of every Infocom game, including source code and compiled game files.

redbean

http://redbean.dev/

host instruction set architecture. This can return: "X86_64" for Intel and AMD systems "AARCH64" for ARM64, M1, and Raspberry Pi systems "POWERPC64" for OpenPOWER Raptor Computing
single file distributable web server

🚲 alden.page

https://alden.page/blog/how-to-politely-crawl-and-analyze-half-a-billion-images/

A basic queue-worker architecture will do the job: when we want to crawl an image, we can dispatch the URL to an inbound images queue, and a worker eventually pops that task out a

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

with no real internal architecture design, and many are rather language-specific or nonportable. In addition none of them appear to provide any coherent security model, and some l

The Difference Engine Home Page

https://www.gamers.org/dEngine/

info on the Quake3 architecture, Quake 3 Suggestions , the archive of the May 1998 Q3suggest process at OpenQuake, and The id Files , a Java package intended for use with Q2/Q3 an

Release Notes for Kerberos for Windows 2.6

http://web.mit.edu/kerberos/kfw-2.6/kfw-2.6/relnotes.html

please read the krbcc32 Architecture documentation. (krbcc32 Architecture link works only if this is the source package.) Leashw32 API The list of functions exported from Leashw32

NLnet; Current projects

https://nlnet.nl/project/current.html

Server Improve the architecture of CryptPad DANCE4All Implement DANCE specification in GnuTLS and MbedTLS DAVx⁵ WebDAV Push Share Contacts, Calendars, Tasks, Notes & Journals

Kermit Software: Frequently Asked Questions

https://www.kermitproject.org/faq.html

centralized security architecture is essential. [ Contents ] [ Kermit Home ] [ Kermit Security Reference ] [ The Kermit FTP Client ] Licensing Kermit software licensing is explain


Find more...