wiby  
Settings



Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software

S.U.P.E.R. - The Largest 200LX Software Archive

http://mizj.com/

use on PC-compatible computers. It emulates 8080/8085/Z80 processors and provides terminal emulation for most CP/M machines. CP/M programs are fully integrated into the DOS enviro
The Palmtop Network's SUPER Site is the largest collection of Hewlett-Packard 200LX palmtop computer software on the Internet.

Unix philosophy description by The Linux Information Project (LINFO)

https://www.linfo.org/unix_philosophy.html

on a wide variety of computers; rather, each computer manufacturer developed a separate operating system for its own hardware. Another important factor in Thompson's desire for ma

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell

"Do It Better: SSH" by Colin Cogle

http://colincogle.name/blog/do-it-better/ssh/

connect. But if all our computers are using, let's say, OpenSSH 8, why bother supporting older versions? You can run the ssh -Q kex command to see all key exchanges supported by y
SSH is easy to secure, but that doesn't mean there isn't more work to be done.

CLI Club: Command-line Interface Tools & Alternatives

https://cli.club/

Send files between computers. shbin Turn a Github repo into a pastebin. sharing Send and receive files on your mobile device. ncp Transfer files and folders, to and from NFS serve
A collection of the best CLI

Emergent Technologies Inc. -- Security Kernel</TITLE

http://mumble.net/~jar/pubs/secureos/secureos.html

available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR

BiMAVs; Bipedal Mechanized Assault Vehicles

http://www.bimavs.com/CellularDiamondArmor.html

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

Linux commands and files

http://webarchive.me/geocities/SiliconValley/2072/linux.htm

It stores the names of computers on the LAN. This works sort of like DNS, except that instead of running a dedicated name server, it's just a table of addresses and corresponding

The TTY demystified

http://linusakesson.net/programming/tty/index.php

Chipophone Commodordion Computers Craft Craverly Heights in Dialog Dial-a-SID Dialog Elements of Chip Music Faking Fissile Material Fratres

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/archive/activity.html

the answer is laptop computers. , most amusing. Tried to re-build lzma-alpha-devel and deltarpm on my old server system to make an applydeltaiso that can operate on the new openSU


Find more...