wiby  
Settings



Linux FAQ

https://www.linfo.org/faq_linux.html

Linux on as many computers as desired. Q: I have a book about Red Hat Linux 8 which contains the installation CDROMs. Would it be better to buy a new book for a more recent versio

IRC: #boycottnovell @ FreeNode: November 14th, 2008

http://techrights.org/o/2008/11/15/irc-log-14112008/

MinceR well, crApple "computers" are usually bought as room ornaments for gay people Nov 14 17:36 PetoKraus well nice... is there anything he could do? Nov 14 17:36 schestowitz Th
IRC Log for November 14th, 2008

#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

Chris Koehnke's Webpage

http://chriskoehnke.com/

2002, tinkering with computers since I don't know when. Enjoyer of music , beer, and humor jokes . I used to be cool and did things like solve Rubik's Cubes and be in a rock band

WA8LMF Useful Links Page

http://wa8lmf.net/links/

anything (radios, GPS, computers, etc) into virtually any vehicle. G7toWin    Home of an extremely useful FREEWARE utility for downloading/uploading waypoints and tracks

Beej's Guide to Network Programming

https://beej.us/guide/bgnet/html/

in the world of computers: Donald Knuth, Bruce Schneier, W. Richard Stevens, and The Woz, my Readership, and the entire Free and Open Source Software Community. 1.11 Publishing In

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox


Find more...