Abusive Appliance Interfaces http://toastytech.com/guis/abuse.html OS BeOS QNX OS/2 Apple Linux/Unix Windows Win Shells Misc GUIs GUI Timeline GUI Sites Location: GUIs > Misc GUIs > Abusive Appliance Interfaces Abusive Appliance Interfaces ... |
|
AROS Research Operating System http://www.aros.org/ ARM builds (RasPI, linux-arm and linux-armhf targets). Updated GCC patches to GCC 15, and fixed the core/contrib & ports to build with it. Fixed x86_64 stack call alias macros... |
|
FortuneD http://xwindows.in.th/fortuned/ under Unix or GNU/Linux environment. Features Displays a random quote from quote database(s) specified on the command line More than one quote database file could be specified Bla... |
|
Order Without the State: Theory, Evidence, and the Possible Future Of http://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm software such as the Linux operating system. In each case, even though individuals are not in a position to appropriate the full value of what they do, they are in a position to g... |
|
Eric Radman : OpenBSD Workstation Notes http://eradman.com/posts/openbsd-workstation.html switched from Arch Linux in 2005. This is a collection of customizations I have used for over the years, as well as some hints for using some more modern features. Terminal By def... |
|
Working Big Dogs - Front Page http://workingbigdogs.com/ OS4 & Classic, Linux, Apple Macintosh Classic & OSX, MorphOS and Microsoft Windows ... |
|
Namazu: Security Considerations http://www.namazu.org/security.html C:\foo is not exist. Linux system can't access any file with non-existence directory, but we didn't recognize other Unix-like systems, but almost systems would be not effected. Th... |
|
HN: the good parts http://danluu.com/hn-comments/ effort into making the Linux Chrome build fast. Some examples are multiple new implementations of the build system ( http://neugierig.org/software/chromium/notes/2011/02/ninja.h..... |
|
breakin-without-remote-vulnerability http://linuxmafia.com/faq/Security/breakin-without-remote-vulnerability.html 08:48:53 -0700 To: ilug@linux.ie Subject: Re: [ILUG] Possible hack? Quoting Barry O'Donovan (barry.odonovan@ucd.ie): > Included in this are all instances of USER and PASS sent ... |
|