wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

How You Are Reading This Page

https://sheep.horse/2017/10/how_you_are_reading_this_page.html

these devices are just computers in disguise. displays the new page for you to read. But how does that work? What happens to get a web page from wherever they are stored to your e
We use the Internet every day and most of us take it for granted that you click on a link and your computer displays the new page for you to...

Netsukuku - P2P mesh routing

http://netsukuku.freaknet.org/

a net is composed by computers linked physically each other, therefore it isn't build upon any existing network. Netsukuku builds only the routes which connects all the computers
Mesh routing protocol designed to handle a massive amount of nodes with very low resource consumption.

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

for smartphones, computers, and servers alike. For more details see : https://nlnet.nl/project/WillowSync Layer 8 Data and AI AI Horde — Collaborative infrastructure for running g

Linux

https://www.billdietrich.me/Linux.html

to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths

Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why

Lakes' Blog

https://lakesnet.nekoweb.org/blog-2025.html

probably because their internet is getting cut out. I'm still gonna keep my other stuff on the links section and contact page. I might even add some obscure forum accounts. 9/6/20


Find more...