wiby  
Settings



The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo

Applying Minilanguages

http://www.catb.org/esr/writings/taoup/html/ch08s02.html

associated with Apple computers. It was cloned under license terms very close to open-source in 1988, and has since become the de-facto standard for printer control under Unix. A

Linux

https://www.billdietrich.me/Linux.html

to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths

NetHack 3.6.0: Guidebook for NetHack 3.6

http://www.nethack.org/v360/Guidebook.html

of your hardware and software, and whether various compile-time options were enabled when your executable was created. The three possible display options are: a monochrome charact

Brendan Gregg's Homepage

https://www.brendangregg.com/

mostly my work with computers. While I currently work on large scale cloud computing performance at Intel (previously Netflix), this site reflects my own opinions and work from ov
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell


Find more...