wiby  
Settings



ObjectDBX Wrapper | Lee Mac Programming

https://lee-mac.com/odbxbase.html

Home Programs Tutorials Contact About ObjectDBX Wrapper Function Syntax (LM:ODBX <fun> [lst] [sav]) Current Version 1.2 Download ObjectDBXWrapperV1-2.lsp View HTML Version O
Evaluates a function or program on all drawings in a supplied list or selected directory.

C-Kermit 9.0 Unix Installation Instructions

https://www.kermitproject.org/ckuins.html

The Kermit Project   |   Now hosted by Panix.com New York City USA   •   kermit@kermitproject.org …since 1981 Home C-Kermit E-K

Our projects : Tomaz Amon's VRML Biology Page

https://www.bioanim.com/OurProjectsInfo/ourProjects.html

www.bioanim.com     www.eduanim.com      www.radiationgames.net     www.cisci.net    www.lefo.net     ww
educational software for biology and medicine in high and secondary schools.

Computer Hacking and Ethics

http://people.eecs.berkeley.edu/~bh/hackers.html

Computer Hacking and Ethics Brian Harvey University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Associ

RFC 3552: Guidelines for Writing RFC Text on Security Considerations

https://www.rfc-editor.org/rfc/rfc3552.html

[ RFC Home ] [ TEXT | PDF | HTML ] [ Tracker ] [ IPR ] [ Errata ] [ Info page ] BEST CURRENT PRACTICE Updated by: 8996 , 9416 Errata Exist Network Working Group E. Rescorla Reques

Russian Fialka M-125-MN and M-125-3MN Cold War era Cipher Machines

http://w1tp.com/enigma/mf3dis.htm

DISASSEMBLY OF THE MODEL M-125-3MN/-3MP3 FIALKA Russian Cold War Era M-125 and M-125-3MN Fialka Cipher Machines: The www.w1tp.com/enigma museum Copyright (c) 2005 Prof. Tom Perera

Blog | [bobulate]

https://euroquis.nl/bobulate/

[bobulate] Business About Blog Presentations Blog This year's posts 03 Feb GPG Update 2026 29 Jan Ooo, what does this disk do? 24 Jan In praise of memory-leak-detection 14 Jan Deb
My personal site of programming, C++, baking, KDE and FreeBSD things.

Man-Computer Symbiosis

https://groups.csail.mit.edu/medg/people/psz/Licklider.html

Man-Computer Symbiosis J. C. R. Licklider IRE Transactions on Human Factors in Electronics, volume HFE-1, pages 4-11, March 1960 Summary Man-computer symbiosis is an expected deve

UTS #39: Unicode Security Mechanisms

http://www.unicode.org/reports/tr39/#moderately_restrictive

Technical Reports   Unicode® Technical Standard #39 Unicode Security Mechanisms Version 17.0.0 Editors Mark Davis ( markdavis@google.com ), Michel Suignard ( michel@suignard.

Macros: Standard Control Constructs

https://gigamonkeys.com/book/macros-standard-control-constructs.html

Copyright © 2003-2005, Peter Seibel 7. Macros: Standard Control Constructs While many of the ideas that originated in Lisp, from the conditional expression to garbage collect

Safely Creating And Using Temporary Files

https://www.netmeister.org/blog/mktemp.html

Signs of Triviality Opinions, mostly my own, on the importance of being and other things. [ homepage ] [ index ] [ jschauma@netmeister.org ] [ @jschauma ] [ RS
Too manytools and scripts create temporary files in an unsafemanner. Here's what could go wrong when you don'tmktemp.

BCHS: BSD, C, httpd, SQLite

https://learnbchs.org/

bchs stack tools example BSD, C, httpd, SQLite. BCHS is an open source software stack for web applications. To prepare a BCHS environment, install OpenBSD , start your editor of c
BSD, C, httpd, SQLite: an open software stack for web applications


Find more...