computing retrocomputing classiccomputing
computing geek history museum programming cards punchcards
One of the most interesting sites dealing with hacking, cracking, and phreaking not hosted at Tripod or Geocities.
A permalink to a post at the Global Nerdy blog explaining the Laws of Software Development.
articles blogs computers computing development engineering funny geek humor internet laws lists management philosophy programming quotes weblog
A list of all of the interrupts in the 32-bit x86 CPU architecture. Deep magick lies beyond this link...
assembly computing development documentation ebook hacking hardware programming reference x86 interrupts bios assembler magick
Information about hardware SATA RAID pertinent to F/OSS operating systems.
Plug in the MAC address of a network card and it&039;ll tell you who manufactured it.
bluetooth cisco community computing database ethernet forensics hardware lookup networking reference search security service sysadmin tools utilities wifi wireless mac address
A good explanation of why /etc/shadow on Ubuntu Linux boxen is owned by group &039;shadow&039; and is set 0640 rather than 0600.
computing sysadmin ubuntu linux shadow authentication
Eucalyptus is a virtualization management stack which mimics the AWS web API, so infrastructure automation packages can use the EC2 protocol stack with it. Five functional components: Cloud Controller (web and API interface), Cluster Controller (manages virtual machines), Storage Controller (EBS workalike), Node Controller (manages the VMs and virtual networks), and Walrus (S3 workalike). Can be used on top of KVM so it requires the libvirt package. Written primarily in Java with some C.
A grid computing project to help find new anti-malarial drugs. Download, install, and crunch numbers in your spare time to help save lives.