systemd for Administrators, Part VIhttp://0pointer.de/blog/projects/changing-roots
or even a different architecture (Example: host x86_64, guest i386). The full hierarchy of the host OS it cannot see. On a classic System-V-based operating system it is relatively
Posts and writings by Lennart Poettering
Pleroma | LandChad.nethttps://landchad.net/pleroma/
have a different CPU architecture, replace that with whatever your architecture is. mv /tmp/release/* /opt/pleroma rmdir /tmp/release rm /tmp/pleroma.zip ./bin/pleroma_ctl instanc
Hopefully by now you won't have to be sold on the invasive practices that social media companies conduct. Websites such as Facebook and Twitter aquire so much data on users tha
The little book about OS developmenthttp://littleosbook.github.io/
is the result. The x86 architecture is, and has been for a long time, one of the most common hardware architectures. It was not a difficult choice to use the x86 architecture as t
Plan 9 — The Documents (Volume 2)http://9p.io/sys/doc/index.html
of the security architecture. Programming How to Use the Plan 9 C Compiler ( html | ps | pdf ) Rob Pike The starting point for C programming under Plan 9. Changes to the Programmi
The Obsessively Complete Infocom Cataloghttps://eblong.com/infocom/
presumably in Sun architecture (the directory was labelled "sun"). From this historical repo (previously here ). (A handful of other utilities are included, including zsplit , zgl
Every known version of every Infocom game, including source code and compiled game files.
redbeanhttp://redbean.dev/
host instruction set architecture. This can return: "X86_64" for Intel and AMD systems "AARCH64" for ARM64, M1, and Raspberry Pi systems "POWERPC64" for OpenPOWER Raptor Computing
single file distributable web server
🚲 alden.pagehttps://alden.page/blog/how-to-politely-crawl-and-analyze-half-a-billion-images/
A basic queue-worker architecture will do the job: when we want to crawl an image, we can dispatch the URL to an inbound images queue, and a worker eventually pops that task out a
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
with no real internal architecture design, and many are rather language-specific or nonportable. In addition none of them appear to provide any coherent security model, and some l
The Difference Engine Home Pagehttps://www.gamers.org/dEngine/
info on the Quake3 architecture, Quake 3 Suggestions , the archive of the May 1998 Q3suggest process at OpenQuake, and The id Files , a Java package intended for use with Q2/Q3 an
Release Notes for Kerberos for Windows 2.6http://web.mit.edu/kerberos/kfw-2.6/kfw-2.6/relnotes.html
please read the krbcc32 Architecture documentation. (krbcc32 Architecture link works only if this is the source package.) Leashw32 API The list of functions exported from Leashw32
NLnet; Current projectshttps://nlnet.nl/project/current.html
Server Improve the architecture of CryptPad DANCE4All Implement DANCE specification in GnuTLS and MbedTLS DAVx⁵ WebDAV Push Share Contacts, Calendars, Tasks, Notes & Journals
Kermit Software: Frequently Asked Questionshttps://www.kermitproject.org/faq.html
centralized security architecture is essential. [ Contents ] [ Kermit Home ] [ Kermit Security Reference ] [ The Kermit FTP Client ] Licensing Kermit software licensing is explain
Find more...