wiby  
Settings



Kermit Security Reference

https://www.kermitproject.org/security.html

mere act of putting two computers in touch with each other was quite amazing. To connect multiple diverse computers to a common network, allowing any pair of them to communicate,

UNIX Review - Net Worth - Desktop TCP/IP At Middle Age

http://people.ece.ubc.ca/gillies/pages/9802net.html

evolution of desktop computers for more years than I care to mention. I started using the CP/M operating system on 8-bit 8080 and Z80 machines. During those times early in the evo

Censorship in the world

https://the-stewardship.org/watch-cen.htm

― A hundred computers belonging to cadets at the US Naval Academy have been confiscated due to the use of file-sharing software. ― Prisoners in South African jails are

https://www.ietf.org/rfc/rfc6763.txt

https://www.ietf.org/rfc/rfc6763.txt

offload, so that computers can sleep and still be discoverable on the network. Early versions of such chipsets were sometimes quite limited: for example, some were Cheshire & Kroc

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

Draft-leach-cifs-v1-spec-02

http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html

in use by personal computers and workstations running a wide variety of operating systems. Table Of Contents STATUS OF THIS MEMO...................................................


Find more...