ObjectDBX Wrapper | Lee Mac Programminghttps://lee-mac.com/odbxbase.html
Home Programs Tutorials Contact About ObjectDBX Wrapper Function Syntax (LM:ODBX <fun> [lst] [sav]) Current Version 1.2 Download ObjectDBXWrapperV1-2.lsp View HTML Version O
Evaluates a function or program on all drawings in a supplied list or selected directory.
C-Kermit 9.0 Unix Installation Instructionshttps://www.kermitproject.org/ckuins.html
The Kermit Project | Now hosted by Panix.com New York City USA • kermit@kermitproject.org …since 1981 Home C-Kermit E-K
Our projects : Tomaz Amon's VRML Biology Pagehttps://www.bioanim.com/OurProjectsInfo/ourProjects.html
www.bioanim.com www.eduanim.com www.radiationgames.net www.cisci.net www.lefo.net ww
educational software for biology and medicine in high and secondary schools.
Computer Hacking and Ethicshttp://people.eecs.berkeley.edu/~bh/hackers.html
Computer Hacking and Ethics Brian Harvey University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Associ
RFC 3552: Guidelines for Writing RFC Text on Security Considerationshttps://www.rfc-editor.org/rfc/rfc3552.html
[ RFC Home ] [ TEXT | PDF | HTML ] [ Tracker ] [ IPR ] [ Errata ] [ Info page ] BEST CURRENT PRACTICE Updated by: 8996 , 9416 Errata Exist Network Working Group E. Rescorla Reques
Russian Fialka M-125-MN and M-125-3MN Cold War era Cipher Machineshttp://w1tp.com/enigma/mf3dis.htm
DISASSEMBLY OF THE MODEL M-125-3MN/-3MP3 FIALKA Russian Cold War Era M-125 and M-125-3MN Fialka Cipher Machines: The www.w1tp.com/enigma museum Copyright (c) 2005 Prof. Tom Perera
Blog | [bobulate]https://euroquis.nl/bobulate/
[bobulate] Business About Blog Presentations Blog This year's posts 03 Feb GPG Update 2026 29 Jan Ooo, what does this disk do? 24 Jan In praise of memory-leak-detection 14 Jan Deb
My personal site of programming, C++, baking, KDE and FreeBSD things.
Man-Computer Symbiosishttps://groups.csail.mit.edu/medg/people/psz/Licklider.html
Man-Computer Symbiosis J. C. R. Licklider IRE Transactions on Human Factors in Electronics, volume HFE-1, pages 4-11, March 1960 Summary Man-computer symbiosis is an expected deve
UTS #39: Unicode Security Mechanismshttp://www.unicode.org/reports/tr39/#moderately_restrictive
Technical Reports Unicode® Technical Standard #39 Unicode Security Mechanisms Version 17.0.0 Editors Mark Davis ( markdavis@google.com ), Michel Suignard ( michel@suignard.
Macros: Standard Control Constructshttps://gigamonkeys.com/book/macros-standard-control-constructs.html
Copyright © 2003-2005, Peter Seibel 7. Macros: Standard Control Constructs While many of the ideas that originated in Lisp, from the conditional expression to garbage collect
Safely Creating And Using Temporary Fileshttps://www.netmeister.org/blog/mktemp.html
Signs of Triviality Opinions, mostly my own, on the importance of being and other things. [ homepage ] [ index ] [ jschauma@netmeister.org ] [ @jschauma ] [ RS
Too manytools and scripts create temporary files in an unsafemanner. Here's what could go wrong when you don'tmktemp.
BCHS: BSD, C, httpd, SQLitehttps://learnbchs.org/
bchs stack tools example BSD, C, httpd, SQLite. BCHS is an open source software stack for web applications. To prepare a BCHS environment, install OpenBSD , start your editor of c
BSD, C, httpd, SQLite: an open software stack for web applications
Find more...