wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random

GRC | Steve Gibson's WebZone:  

https://www.grc.com/stevegibson.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !!   &nb
Steve Gibson's Little Corner of the Web.

GRC | Gibson Research Corporation Home Page  

https://www.grc.com/default.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !! Since 1988. It
Steve Gibson's and Gibson Research Corporation's Homepage.

About Daniel

https://daniel.haxx.se/about.html

and handcrafts. Before computers At the age of seven, I started playing football ( soccer as Americans would say) in a team. I enjoyed it properly and kept playing in that team qu
Documentation and ramblings of Daniel Stenberg, founder and lead developer of curl.

Classic Mac Networking

http://www.applefool.com/se30/

other, and to modern computers and networks. Most of this guide was written with the "somewhat computer literate" user in mind, as to make it as accessible to the broadest span of

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl

UNIX Review - Net Worth - Desktop TCP/IP At Middle Age

http://people.ece.ubc.ca/gillies/pages/9802net.html

evolution of desktop computers for more years than I care to mention. I started using the CP/M operating system on 8-bit 8080 and Z80 machines. During those times early in the evo

Interesting DOS programs - Full Index

http://dosprograms.info.tt/indexall.htm

to connect multiple computers via serial cable EZ-NOS 2 a http web server with Server Side Includes support, secure FTP Server with md5 authenication, DNS server and a TCP/IP acce


Find more...