Newest Stories by trn
Home
Recent
Comments
Search
Login
3
Why I Use Open DCL Lite
practices
release
jonesrh.info
via
trn
1 year ago
|
cached
|
no comments
0
1
NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations, Draft 5.
☶
pdf
practices
privacy
security
csrc.nist.gov
via
trn
1 year ago
|
cached
|
no comments
0
2
Case studies illustrating benefits of PVC cables and pitfalls of substitution
☶
pdf
slides
hardware
practices
pvc4cables.org
via
trn
1 year ago
|
cached
|
no comments
0
29
The Pen Is Mightier Than the Keyboard: Advantages of Longhand Over Laptop Note Taking
☶
pdf
philosophy
practices
sites.udel.edu
via
trn
1 year ago
|
cached
|
13 comments
13
5
The IBM PC BIOS and Intel ISIS-II
assembly
historical
reversing
os2museum.com
via
trn
1 year ago
|
cached
|
1 comment
1
-1
The Ghost of Invention: A Visit to Bell Labs
culture
practices
wired.com
via
trn
1 year ago
|
cached
|
no comments
0
4
Introduction To The uNIX Operating System by S. M. Walters (January 1982) [Z-80]
pdf
historical
unix
bitsavers.trailing-edge.com
via
trn
1 year ago
|
cached
|
4 comments
4
8
Ultibo - An ARM unikernel for Raspberry Pi written in Free Pascal
☶
programming
ultibo.org
via
trn
1 year ago
|
cached
|
5 comments
5
3
The Edited Truth
pdf
crypto
eprint.iacr.org
via
trn
1 year ago
|
cached
|
no comments
0
7
stealth/opmsg: A gpg alternative
crypto
privacy
release
security
github.com
via
trn
1 year ago
|
cached
|
1 comment
1
3
hoc7 — (high-order calculator) [interactive floating-point language]
pdf
math
programming
release
unix
ftp.math.utah.edu
via
trn
1 year ago
|
cached
|
3 comments
3
4
A Systematic Analysis of the Juniper Dual EC Incident
pdf
crypto
practices
reversing
security
cs.uic.edu
via
trn
1 year ago
|
cached
|
no comments
0
8
Unearthing The PDP-15’s Operating Systems
pdf
assembly
historical
unix
simh.trailing-edge.com
via
trn
1 year ago
|
cached
|
1 comment
1
22
The Return of the Hipster PDA
practices
agilesysadmin.net
via
trn
1 year ago
|
cached
|
19 comments
19
7
Morrow Micronix Operating System User's Manual (1983)
pdf
historical
unix
ia801902.us.archive.org
via
trn
1 year ago
|
cached
|
8 comments
8
8
Raptor Engineering::Talos™ II Secure Workstation
hardware
raptorcs.com
via
trn
1 year ago
|
cached
|
4 comments
4
2
ArcaOS 5.0.1 now available
☶
release
arcanoae.com
via
trn
1 year ago
|
cached
|
no comments
0
4
Power vs. Adventure - PL/I and C (1994)
c
compilers
historical
programming
eberhard-sturm.de
via
trn
1 year ago
|
cached
|
no comments
0
5
Some Thoughts About the Social Implications of Accessible Computing (1965)
pdf
culture
historical
privacy
computer.org
via
trn
1 year ago
|
cached
|
no comments
0
5
Observations about Software Maintenance (1984)
historical
practices
programming
multicians.org
via
trn
1 year ago
|
cached
|
3 comments
3
1
RFC 4042 - UTF-9 and UTF-18 Efficient Transformation Formats of Unicode
historical
practices
satire
tools.ietf.org
via
trn
1 year ago
|
cached
|
1 comment
1
1
Classic-Tools
historical
programming
release
github.com
via
trn
1 year ago
|
cached
|
no comments
0
1
Finding the Necessity for Invention
historical
computerconservationsociety.or
g
via
trn
1 year ago
|
cached
|
no comments
0
41
This 70-Year-Old Programmer Is Preserving an Ancient Coding Language on GitHub
☶
compilers
historical
person
programming
motherboard.vice.com
via
trn
1 year ago
|
cached
|
3 comments
3
1
Information Age Terrorism: Towards Cyberterror - Littleton - 1995.
pdf
historical
security
hsdl.org
via
trn
1 year ago
|
cached
|
no comments
0
<< Page 3
|
Page 5 >>