Unix Virus Bibliographyhttps://bruceediger.com/virefs.html
VAX running 4BSD Unix. Computers Under Attack: Intruders, Worms, and Viruses edited by Peter J. Denning ACM Press, 1990 ISBN 0-201-53067-8 See especially Part III - Worms . This s
book and article bibliography on Unix computer viruses
CRN / Unixhttp://crn.hopto.org/unix.html
into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.
The Art of Unix Programminghttp://www.catb.org/esr/writings/taoup/html/
are trademarks of Apple Computers, Inc. ClearCase is a trademark of Rational Software, Inc. Ethernet is a trademark of 3COM, Inc. Excel, MS-DOS, Microsoft Windows and PowerPoint a
The Word on The Streetshttp://www.shoestring-graphics.com/CP2020/slang/
heavy, fast mainframe computers. Big (color) Wall: ph. (Net) Any set of instruction manuals so large they take up more than ten feet of shelf space. Big Red Switch: ph. (Net) Orig
The Canonical Glossary of Slang for Cyberpunk 2.0.2.0.
Kermit - What is it?https://kermitproject.org/kermit.html
for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a
SGI Technical Advice and Information...http://www.sgidepot.co.uk/sgi.html
Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati
Looking at Windows Vista | Peter Torpeyhttps://petertorpey.com/articles/windows_vista.html
familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A
Trends and the Future of Computing and the Internethttp://mrp3.com/trends.net.html
of the art. But today's computers often have multiple cores and operate at speeds far in excess of 2Ghz, have gigabytes of RAM, terabytes of disk storage, and video resolution bet
Quote Anthologyhttps://quotes.pouyakary.org/
to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</https://www.kermitproject.org/k95.html
and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector
Ye Olde Blogroll - Because blogs are the soul of the webhttps://blogroll.org/
grew up obsessed with computers, video games, and running pretend businesses. so1o.xyz A oddly strange personal blog A Calm In the Chaos A personal website by someone called Skoob
Find more...