wiby  
Settings



Internet Kermit Service

https://www.kermitproject.org/uiksd.html

any number of different computers that share the same file system on the same network. The database can be monitored by the sysadmin with a simple "systat"-like display program, w

#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

makes it into your computers. It is completely open source and uses other open source components. Very efficient and written in C. Dovecot is an open source IMAP and POP3 server f

Linux

https://www.billdietrich.me/Linux.html

to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

The Dock

http://koshka.love/links.html

designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

The Design and Implementation of the Tor Browser [DRAFT]

https://2019.www.torproject.org/projects/torbrowser/design/

such as seizing the computers of all Tor users in an area (especially after narrowing the field by the above two pieces of information). History records and cache data are the pri

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is

Windows XP Guide

http://www.prints.pink/unlisted/windowsxp.html

(or using two separate computers, if you prefer). You might also want to look into the One Core API for Windows XP, although I won't be discussing it here as I know nothing about

Kermit - What is it?

https://kermitproject.org/kermit.html

for many types of computers that implements that protocol as well as other communication functions ranging from terminal emulation to automation of communications tasks through a

GRC | Steve Gibson's WebZone:  

https://www.grc.com/stevegibson.htm

 SQRL  PDP-8 Computers  TrueCrypt Repository  Big Number Calculator  The Quiet Canine Click Here – for GRC's new DNS Benchmark v2 !!   &nb
Steve Gibson's Little Corner of the Web.


Find more...