wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl

Linux Enterprise Computing

http://linas.org/linux/index.shtml

on large networks of computers. The venerable RCS, CVS and rdist systems can do a fraction of these tasks, but there are other tools as well, often better suited to particular tas
A survey of Linux software useful in a corporate, commercial, enterprise setting. Reviews SQL databases and related tools, project management tools, data availability a

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random

the Scanner Tarpit HOWTO: Planning

http://www.impsec.org/linux/security/scanner-tarpit-3.html

to misconfigure their computers, inbound NetBIOS-over-TCP traffic should not be considered hostile - but don't forget to block it at the firewall! Second, that most traffic destin

Sniffin' the Ether v2.0

http://unixgeeks.org/security/newbie/security/sniffer/sniffer.html

to physically connect computers together) into what is known as promiscuous mode. Once the network card is set to this mode, it will give the sniffer program the ability to captur


Find more...