wiby  
Settings



Use of Cookies Considered Safe

https://www.tomsarazac.com/tom/opinions/cookies.html

Auth and Finger Many computers run a network service called auth. Auth is used to ask a computer the name of the user that initiated a connection. When you connect to a web server

The Republic of Cascadia

https://zapatopi.net/cascadia/

on 97% of the world's computers, and that figure will continue to rise. (Although it has not yet achieved sheep-cloning technology, it is close -- watch out Scotland!) The Republi
Independence Now! Help us liberate our nation from the tryanical forces of the Amero-Canadian despots!

One Terabyte of Kilobyte Age | Digging through the Geocities Torrent

https://blog.geocities.institute/

to know something about computers, at least this is how I interpret the “I hate Bill Gates” label of the link he pointed to microsoft.com … continue reading → Leave a comment

The Old Computer Challenge: a week on OpenBSD with a Centrino and half a gig of RAM

http://www.k58.uk/old-computer.html

people interact with computers and other kinds of programmable electronic devices. Hint: not by command line. I've noticed that some of the other participants in this project of S

HK Interview

http://www.konaka.com/alice6/lain/hkint_e.html

Although I didn't use computers for my jobs, I began to interest in the MS-DOS about ten years ago, then I read some books (about computers) because I liked its closing worlds. I

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

generates 350 Linux computers for schools (March 19, 2008) Fioretti, Marco A look at free software in Ecuador (December 3, 2008) Fleming, Matt The bootstrap process on EFI systems


Find more...