The unix programming environmenthttp://www.talisman.org/unix/burgess-guide.html
well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres
C-Kermit Unix Hints and Tipshttps://www.kermitproject.org/ckubwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
Applying Minilanguageshttp://www.catb.org/esr/writings/taoup/html/ch08s02.html
associated with Apple computers. It was cloned under license terms very close to open-source in 1988, and has since become the de-facto standard for printer control under Unix. A
Linuxhttps://www.billdietrich.me/Linux.html
to servers to supercomputers. Same is not true of Windows and Mac, although you do find Windows in ATMs and vending machines and other odd places. Miscellaneous Standards / projec
Linux operating system basics, parts, myths, and truths
NetHack 3.6.0: Guidebook for NetHack 3.6http://www.nethack.org/v360/Guidebook.html
of your hardware and software, and whether various compile-time options were enabled when your executable was created. The three possible display options are: a monochrome charact
Brendan Gregg's Homepagehttps://www.brendangregg.com/
mostly my work with computers. While I currently work on large scale cloud computing performance at Intel (previously Netflix), this site reflects my own opinions and work from ov
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.
POSIX Shell Tutorialhttps://www.grymoire.com/Unix/Sh.html
you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell
Find more...