wiby  
Settings



Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

Wii U Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/wiiu/

yet, three independent computers: Firstly, we’ve got DRC-WUP which is a System-on-Chip (SoC) hiding yet-another ARM926EJ-S (the same one from the Wii , how many of these do they h
An in-depth analysis that explains how this console works internally

Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

UFies.org - Geek News, Links, & Technology On A Daily Basis

https://www.ufies.org/

with my first cat. Computers were boxes with PS/2 connectors on the back, and cellphones aren't really a thing, much less smartphones. So the site stays up. Please feel free to ex

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni

Kicks Condor

https://www.kickscondor.com/

the whole are on home computers, that has implications. For me, Beaker DOES pay attention to the original good part: view source. It brings view source to the modern ‘ye-app-web’
LEECHING AND LINKING IN THE HYPERTEXT KINGDOM

Publishing and Linking on the Web

https://www.w3.org/2001/tag/doc/publishingAndLinkingOnTheWeb-2011-10-27.html

for both humans and computers. Reusers that do not change the information from the origin server may be used to simplify access to the origin server (by mapping simple URLs to a m

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

25 Years of Linux — so far [LWN.net]

https://lwn.net/Articles/698042/

in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]

Junk Email Filter Spam Blocking Service

http://www.junkemailfilter.com/spam/terms_and_conditions.html

very few people had computers. It was a UNIX standard an ran on computers that people accessed from serial terminals. SMTP sent messages directly from the senders computer to the
Junk Email Filter - Front End Spam


Find more...