#youbroketheinternet (YBTI)https://youbroketheinternet.org/
obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet
qmail: Second most popular MTA on the Internethttp://www.usenix.org.uk/mirrors/qmail/top.html
makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f
How You Are Reading This Pagehttps://sheep.horse/2017/10/how_you_are_reading_this_page.html
these devices are just computers in disguise. displays the new page for you to read. But how does that work? What happens to get a web page from wherever they are stored to your e
We use the Internet every day and most of us take it for granted that you click on a link and your computer displays the new page for you to...
Netsukuku - P2P mesh routinghttp://netsukuku.freaknet.org/
a net is composed by computers linked physically each other, therefore it isn't build upon any existing network. Netsukuku builds only the routes which connects all the computers
Mesh routing protocol designed to handle a massive amount of nodes with very low resource consumption.
NLnet; 55 New Projects Awarded NGI0 Grantshttps://nlnet.nl/news/2023/20231123-announcing-projects.html
for smartphones, computers, and servers alike. For more details see : https://nlnet.nl/project/WillowSync Layer 8 Data and AI AI Horde — Collaborative infrastructure for running g
Linuxhttps://www.billdietrich.me/Linux.html
to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths
Athena's blog - Athena's Sitehttps://www.alm.website/blog/
How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard
Ian! D. Allen - Personal Home Pagehttp://www.idallen.com/
language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
A Security Curriculumhttps://learnaifromscratch.github.io/theabsolutestateofsoftware.html
secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've
the djb way: the djb why?http://thedjbway.b0llix.net/djbwhy.html
Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why
Lakes' Bloghttps://lakesnet.nekoweb.org/blog-2025.html
probably because their internet is getting cut out. I'm still gonna keep my other stuff on the links section and contact page. I might even add some obscure forum accounts. 9/6/20
Find more...