mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-01-22 23:00:57 +08:00
Merge branch 'master' of https://github.com/LCTT/TranslateProject
This commit is contained in:
commit
5702fbd285
@ -1,26 +1,27 @@
|
||||
向女士延伸项目为Linux内核寻找新的女性实习生
|
||||
===
|
||||
这个夏季作为[FOSS针对女性的延伸项目][1]的一部分,在Linux基金会工作的实习生们背景不同,水平也高低不等,但是她们至少有一件事情是相同的(除去性别之外),就是她们可以在自己的履历中添加一项“Linux内核工作者”。
|
||||
Linux编程女神计划招募新的内核级MM实习生
|
||||
=====
|
||||
|
||||
作为[FOSS的Linux编程女神计划(Outreach Program for Women)][1]的一部分,这个夏季在Linux基金会工作的实习生们背景不同,水平也高低不等,但是她们至少有一件事情是相同的(除去性别之外),就是她们可以在自己的履历中添加一项“Linux内核黑客”。(译注:Outreach Program for Women,OPW此处译作“Linux编程女神计划”带有调侃意味,Just joke,没有恶意。)
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/OPW-kernel-contributions-9.jpg)
|
||||
|
||||
*针对女性的延伸项目在对Linux内核3.12的贡献已经名列前茅。来源:LWN.net*
|
||||
*针对女性的招募项目在对Linux内核3.12的贡献已经名列前茅。来源:LWN.net*
|
||||
|
||||
在Linux基金会资助的第一批每人5000美元薪水的申请人中,Lisa Nguyen, Xenia Ragiadakou, Elena Ufimtseva, Laura Vasilescu 和Tulin Izer是41申请者中的7名女性女性获得者。她们与Intel、Oracle和Citrix的内核开发者一起全职工作了三个月,处理包括x86启动进程和XNUMA拓扑等项目。她们还利用500美元的旅行奖学金,出席在新奥尔良或者爱丁堡举行的LinuxCon会议并做了演讲。
|
||||
在Linux基金会资助的第一批每人5000美元酬金的申请人中,Lisa Nguyen, Xenia Ragiadakou, Elena Ufimtseva, Laura Vasilescu 和Tulin Izer是41申请者中的7名女性女性获得者。她们与Intel、Oracle和Citrix的内核开发者一起全职工作了三个月,处理包括x86启动进程和XNUMA拓扑等项目。她们还利用500美元的旅行奖学金,出席了在新奥尔良或者爱丁堡举行的LinuxCon会议并做了演讲。
|
||||
|
||||
“我要说能有我这样的机会并不多哦,在LinuxCon北美会议上做志愿者,在LinuxCon北美会议上发表演讲,而且与Linux Torvalds交流了三天!”Nguyen说,她是一个Linux内核实习生,与Orcale的Konrad Rzeszutek Wilk一起解决Xen block 驱动问题。
|
||||
|
||||
除了学习如何创建和提交内核补丁,这些实习生们通过结交新朋友和同事,克服了她们的恐惧心理,为Linux内核的发展作出了明显的贡献。
|
||||
除了学习如何创建和提交内核补丁,这些实习生们通过结交新朋友和同事,克服了她们的恐惧心理,为Linux内核的发展作出了显著的贡献。
|
||||
|
||||
“我不再害怕碰内核代码了”Izer这样说道,她和来自Intel的Peter P. Waskiewicz Jr.一起工作,解决x86的启动进程并行化问题。“这是我第一次对开源项目作出贡献,我以此为自豪。我将接着做下去”。
|
||||
|
||||
###内核贡献着排行榜
|
||||
|
||||
依据[LWN 8月内核报告][2],作为一个组织,OPW被列为对Linux3.11内核的主要贡献者之一,提交了230个变更,总体位于第13位。其中,实习生Xenia Ragiadakou给3.11内核贡献了100个补丁,在最活跃的开发者中位列前10。
|
||||
据[LWN 8月内核报告][2],作为一个组织,OPW被列为对Linux3.11内核的主要贡献者之一,提交了230个变更,总体位于第13位。其中,实习生Xenia Ragiadakou给3.11内核贡献了100个补丁,在最活跃的开发者中位列前10!
|
||||
|
||||
“我的主要工作就是添加追踪事件,然后写trace-cmd插件,以便于人们阅读的格式分析这些痕迹,以方便xhci(驱动)找出问题。” ”Ragiadakou说,她和Intel的内核开发者Sarah Sharp一起做这项工作。“我学习了如何使用git,如何使用静态代码分析工具,以及如何发送补丁,如何查看debug日志,usb子系统是如何组成的,xhci驱动又是如何实现的。”
|
||||
|
||||
根据[LWN 10月分析报告][3],在内核3.12上,OPW再次排在了贡献最大的团队或公司之中,这次是排行第11行,有19,649行代码的改动。那代表了在过去最新的一次开发周期中接近2.7%的改动量。
|
||||
据[LWN 10月分析报告][3],在内核3.12上,OPW再次排在了贡献最大的团队或公司之中,这次是排行第11行,有19,649行代码的改动。那代表了在过去最新的一次开发周期中接近2.7%的改动量。
|
||||
|
||||
在她们的实习计划在9月份结束时,她们中的大多数仍然持续做该项目并打算继续做下去。
|
||||
|
||||
@ -28,7 +29,7 @@
|
||||
|
||||
“我甚至需要学习如何才能停下来。有时候,好吧,是常常,我无法停下来,”Ufimtseva说,她和Citrix的Stefano Stabellini、Dario Fargiolli、George Dunlap一起工作,以解决针对与工作在xen上的并行虚拟机的vNUMA拓扑问题。“我一直努力,最终我贡献的补丁被提交到了高质量代码库里,这真的是很鼓舞人心哇!”
|
||||
|
||||
下一轮Liux内核实习生的截止日期是11月。申请者应有c或c++的基本知识,布尔代数,对Linux/Unix操作系统有一定的经验,了解Git更好不过不是硬性要求。想了解有关项目以及如何申请的更详细信息,可浏览[ Kernel Newbies上的OPW 页面][4]。
|
||||
下一轮Linux内核实习生的截止日期是11月。申请者应有c或c++和布尔代数的基本知识,对Linux/Unix操作系统有一定的经验,了解Git更好,不过不是硬性要求。想了解有关项目以及如何申请的更详细信息,可浏览[ Kernel Newbies上的OPW 页面][4]。
|
||||
|
||||
###Lisa Nguyen
|
||||
|
||||
@ -40,7 +41,7 @@
|
||||
|
||||
**你为什么申请同OPW一起为Linux内核工作**
|
||||
|
||||
我想要一个挑战,想要跳离自己的舒服区域。我要给自己一个软件开发的机会,因为过去我一直面临自信心问题。一天,我决定要寻求一个有关Linux的职业来而不是数字分析工作。当我看到OPW项目出现在Linux基金会在Google+上的博文时,我觉得这是一个再合适不过的机会咯,于是,我想“我为什么不去尝试一下呢?”
|
||||
我想要一个挑战,想要跳离自己的小窝。我要给自己一个软件开发的机会,因为过去我一直面临自信心问题。一天,我决定要寻求一个有关Linux的职业来而不是数字分析工作。当我看到OPW项目出现在Linux基金会在Google+上的博文时,我觉得这是一个再合适不过的机会咯,于是,我想“我为什么不去尝试一下呢?”
|
||||
|
||||
###Elena Ufimtseva
|
||||
|
||||
@ -52,7 +53,7 @@
|
||||
|
||||
**你为什么申请同OPW一起为Linux内核工作**
|
||||
|
||||
我觉得我需要在低层创建软件,例如系统软件,而不是用java。我有一种感觉,我能应对复杂的问题并解决他们。我经常阅读最新的Linux新闻,我觉得最吸引我注意的是Greg在一年前在Google做的关于Linux内核开发着社区以及补丁递交程序等的报告。我觉得“哇,这好好玩哇!”
|
||||
我觉得我想在底层开发软件,例如系统软件,而不是用java。我有一种感觉,我能应对复杂的问题并解决他们。我经常阅读最新的Linux新闻,我觉得最吸引我注意的是Greg在一年前在Google做的“关于Linux内核开发者社区以及补丁递交程序”等的报告。我觉得“哇,这好好玩哇!”
|
||||
|
||||
### Laura Vasilescu ###
|
||||
|
||||
@ -60,7 +61,7 @@
|
||||
|
||||
**Laura Vasilescu 和 Carolyn Wyborny以及Anjali Singhai共同去解决igb驱动的ethtool属性。**
|
||||
|
||||
我认为自己就是一个极客,我对改善教育系统(尤其是罗马尼亚的)有着非常浓厚的兴趣。作为一名学生,我志愿做我所在大学的教师助理,还是罗马尼亚开源教育协会的成员。我的技术专长是网络,操作系统和低级编程语言。
|
||||
我认为自己就是一个极客,我对改善教育系统(尤其是罗马尼亚的)有着非常浓厚的兴趣。作为一名学生,我志愿做我所在大学的教师助理,还是罗马尼亚开源教育协会的成员。我的技术专长是网络,操作系统和底层编程语言。
|
||||
|
||||
**你为什么申请同OPW一起为Linux内核工作**
|
||||
|
||||
@ -72,7 +73,7 @@
|
||||
|
||||
**Tulin Izer和来自Intel的Peter Waskiewicz一起去解决x86系统的启动进成并行化问题。**
|
||||
|
||||
我来自与土耳其。我是一名来自于伊斯坦布尔的Galatasaray大学的计算机工程专业的学生。今年我大四。
|
||||
我来自于土耳其。我是一名来自于伊斯坦布尔的Galatasaray大学的计算机工程专业的学生。今年我大四。
|
||||
|
||||
**为什么你申请同OPW一起为Linux内核工作**
|
||||
|
||||
@ -86,11 +87,15 @@
|
||||
|
||||
想加入开源项目的想法已经在我的脑海中存在很久了,但我一直认为我还没有足够的能力加入开源项目中去。这次有三个因素促使我去申请。1)OPW针对女性这一目标是我感到更加舒坦。2)有Linux核心方面的项目。3)被引入Linux内核的开发过程非常平顺,会在应用开发的早期加入进去。
|
||||
|
||||
作者:[Libby Clark][5]
|
||||
|
||||
![img](http://www.linux.com/component/ninjaboard/avatar/41373/catid/200-libby-clark/thumbnail/large/cache/1331753338)
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linux.com/news/featured-blogs/200-libby-clark/746687-outreach-program-for-women-seeks-new-linux-kernel-interns/
|
||||
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[jasmiepeng](https://github.com/jasminepeng)
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[jasmiepeng](https://github.com/jasminepeng),[wxy](https://github.com/wxy)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
@ -98,3 +103,4 @@ via: http://www.linux.com/news/featured-blogs/200-libby-clark/746687-outreach-pr
|
||||
[2]:http://lwn.net/Articles/563977/
|
||||
[3]:http://lwn.net/Articles/570483/
|
||||
[4]:http://kernelnewbies.org/OPWIntro
|
||||
[5]:http://www.linux.com/community/forums/person/41373/catid/200-libby-clark
|
@ -0,0 +1,210 @@
|
||||
13 Linux Cat Command Examples To Manage (Display,Sort,Create etc) Files
|
||||
================================================================================
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/linux-cat-command.png)
|
||||
|
||||
In Linux operating system most of configuration files, logs even shell scripts are in text file format. There is why we have numbers of text editors in Linux. When you just need to see the content of those files, you can use a simple command named cat.
|
||||
|
||||
From cat manual page it says
|
||||
|
||||
> cat is a command that concatenate files and print on the standard output
|
||||
|
||||
Cat is built-in command in Linux. I believe that all of Linux distribution has this Cat command by default. Let’s start to use how to use it.
|
||||
|
||||
### 1. View the content of file ###
|
||||
|
||||
The easiest way to use cat is just type ‘cat file_name’.
|
||||
|
||||
# cat /etc/issue
|
||||
|
||||
CentOS release 5.10 (Final)
|
||||
Kernel \r on an \m
|
||||
|
||||
### 2. Put the line number on the fly ###
|
||||
|
||||
When reading a configuration file it may that you have a long configuration file. It will be easier to if you can put line numbers on the fly. Use -n parameter to fulfill this purpose.
|
||||
|
||||
# cat -n /etc/ntp.conf
|
||||
|
||||
1 # Permit time synchronization our time resource but do not
|
||||
2 # permit the source to query or modify the service on this system
|
||||
3 restrict default kod nomodify notrap nopeer noquery
|
||||
4 restrict -6 default kod nomodify notrap nopeer noquery
|
||||
5
|
||||
6 # Permit all access over the loopback interface. This could be
|
||||
7 # tightened as well, but to do so would effect some of the
|
||||
8 # administration functions
|
||||
9 restrict 127.0.0.1
|
||||
10 restrict -6 ::1
|
||||
|
||||
### 3. Number non-blank output lines ###
|
||||
|
||||
Similar with -n parameter, -b parameter will give you numbers **on the fly**. The difference is -b parameter will only number non-blank lines.
|
||||
|
||||
#cat -n /etc/ntp.conf
|
||||
|
||||
1 # Permit time synchronization our time resource but do not
|
||||
2 # permit the source to query or modify the service on this system
|
||||
3 restrict default kod nomodify notrap nopeer noquery
|
||||
4 restrict -6 default kod nomodify notrap nopeer noquery
|
||||
|
||||
5 # Permit all access over the loopback interface. This could be
|
||||
6 # tightened as well, but to do so would effect some of the
|
||||
7 # administration functions
|
||||
8 restrict 127.0.0.1
|
||||
9 restrict -6 ::1
|
||||
|
||||
### 4. Show tabs ###
|
||||
|
||||
You may need to know where are the tabs on your text file. If you do, you can use -T parameter. Tab will be represented by **^I** characters.
|
||||
|
||||
# cat -T /etc/hosts
|
||||
|
||||
# Do not remove the following line, or various programs
|
||||
# that require network functionality will fail.
|
||||
127.0.0.1^I^Ilocalhost.localdomain localhost
|
||||
::1^I^Ilocalhost6.localdomain6 localhost6
|
||||
|
||||
### 5. Show the end of lines ###
|
||||
|
||||
-E parameter will display **$** at end of each line. Here’s the example :
|
||||
|
||||
# cat -E /etc/hosts
|
||||
|
||||
# Do not remove the following line, or various programs$
|
||||
# that require network functionality will fail.$
|
||||
127.0.0.1 localhost.localdomain localhost$
|
||||
::1 localhost6.localdomain6 localhost6$
|
||||
|
||||
### 6. Show All ###
|
||||
|
||||
If you want to combine between -T and -E, you can use -A parameter.
|
||||
|
||||
# cat -A /etc/hosts
|
||||
|
||||
# Do not remove the following line, or various programs$
|
||||
# that require network functionality will fail.$
|
||||
127.0.0.1^I^Ilocalhost.localdomain localhost$
|
||||
::1^I^Ilocalhost6.localdomain6 localhost6$
|
||||
|
||||
### 7. View the content per page ###
|
||||
|
||||
When your file can not fit in your screen, you can **combine** cat with another command to make it displayed per page. Use the pipe ( | ) sign to combine it.
|
||||
|
||||
# cat /proc/meminfo | less
|
||||
|
||||
# cat /proc/meminfo | more
|
||||
|
||||
The difference between less and more is that you can do scroll up **and** scroll down **on less command** using PageUp and PageDown buttons. While you can **only** do scroll down **on more command** using spacebar.
|
||||
|
||||
### 8. View the contents of 2 files ###
|
||||
|
||||
Let’s say we have 2 text files named linux and desktop located in /root folder. Each of files contains :
|
||||
**Linux** : ubuntu, centos, redhat, mint and slackware
|
||||
**Desktop** : gnome kde, xfce, enlightment, and cinnamon
|
||||
When you want to view more than 1 file simultaneously, you do like this :
|
||||
|
||||
# cat /root/linux /root/desktop
|
||||
|
||||
ubuntu
|
||||
centos
|
||||
redhat
|
||||
mint
|
||||
slackware
|
||||
gnome
|
||||
kde
|
||||
xfce
|
||||
enlightment
|
||||
cinnamon
|
||||
|
||||
### 9. Sorting file ###
|
||||
|
||||
Again, you can combine cat using another command to make a custom output. If you want to sort it, you can combine it with **sort** command. Here’s the example :
|
||||
|
||||
# cat /root/linux | sort
|
||||
|
||||
centos
|
||||
mint
|
||||
redhat
|
||||
slackware
|
||||
Ubuntu
|
||||
|
||||
### 10. Redirect standard output ###
|
||||
|
||||
You can also redirect the output to screen or to another file. Just use > sign (greater-than symbol) if you want to redirect the output into a file.
|
||||
|
||||
# cat /root/linux > /root/linuxdistro
|
||||
|
||||
The above command will **create** a linuxdistro file that has the same content with /root/linux file.
|
||||
|
||||
### 11. Creating a new file ###
|
||||
|
||||
There are some ways to create a text file in Linux. One of them is using cat command.
|
||||
|
||||
# cat > operating_system
|
||||
|
||||
Unix
|
||||
Linux
|
||||
Windows
|
||||
MacOS
|
||||
|
||||
When you type cat > operating system, it will create a file which named operating_system. Then you will see a blank line below the cat command. You can type the content that you want. We typed Unix, Linux, Windows and MacOS for example. When you’re done, **press Ctrl-D** to save the content and exit from cat command. You will see **a file named operating_system** is created in the current folder with the content that you add before.
|
||||
|
||||
### 12. Append the content of file ###
|
||||
|
||||
If you use the > sign twice, it means that the content of the first file will be added to the second file. Let’s see the example :
|
||||
|
||||
# cat /root/linux >> /root/desktop
|
||||
|
||||
# cat /root/desktop
|
||||
|
||||
The first cat command will add the content of /root/linux to /root/desktop file
|
||||
The second command will show you this output :
|
||||
|
||||
ubuntu
|
||||
centos
|
||||
redhat
|
||||
mint
|
||||
slackware
|
||||
gnome
|
||||
kde
|
||||
xfce
|
||||
enlightment
|
||||
cinnamon
|
||||
|
||||
### 13. Redirect standard input ###
|
||||
|
||||
You can also redirect standard input using **<** sign (less-than symbol).
|
||||
|
||||
# cat < /root/linux
|
||||
|
||||
The above command means that /root/linux will be an input for cat command. The output will be like this :
|
||||
|
||||
ubuntu
|
||||
centos
|
||||
redhat
|
||||
mint
|
||||
slackware
|
||||
|
||||
To make it clearer, let’s see another example :
|
||||
|
||||
# cat < /root/linux | sort > linux-sort
|
||||
|
||||
That command will be read : **sort content from /root/linux file then print the output to linux-sort file**
|
||||
|
||||
So the output of linux-sort file will be like this :
|
||||
|
||||
centos
|
||||
mint
|
||||
redhat
|
||||
slackware
|
||||
ubuntu
|
||||
|
||||
That’s some examples of cat command on day-to-day operation. Of course you can explore more detail from cat manual page and experiment with Input-Output redirection operator.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://linoxide.com/linux-command/13-cat-command-examples/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
22
sources/GCC 4.9 Is Now In Bug-Fixes-Only Stage 3 Mode.md
Normal file
22
sources/GCC 4.9 Is Now In Bug-Fixes-Only Stage 3 Mode.md
Normal file
@ -0,0 +1,22 @@
|
||||
GCC 4.9 Is Now In Bug-Fixes-Only Stage 3 Mode
|
||||
================================================================================
|
||||
[GCC 4.9][1] with [its many new features][2] is aiming for a release in the first half of 2014. As of this morning the GCC code-base will not accept new features as it's under a big-fixing-only flag.
|
||||
|
||||
Richard Biener announced this morning that trunk is now in stage three, so that after eight months of allowing features into GCC for the 4.9 release, nothing new will be permitted unless an exception is granted by the release managers. Stage 3 allows for general bug-fixing work to be completed while in about two months it will go into the Stage 4 mode of only allowing documentation and regression fixes.
|
||||
|
||||
At the moment there are 63 P1 regressions (the most severe regression) for GCC 4.9 followed by 136 P2 regressions, 14 P3 regressions, 88 P4 regressions, and 60 P5 regressions. Not until the 63 regressions of the P1 state have been zeroed out will GCC 4.9 move closer to being released. The GCC 4.9.0 release will likely come some time around Q2'2014.
|
||||
|
||||
This morning's GCC 4.9.0 status report can be found on the [GCC mailing list][3]. GCC 4.9 will be a very nice compiler update and competition to next month's release of [LLVM 3.4][4].
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.phoronix.com/scan.php?page=news_item&px=MTUyMjk
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.phoronix.com/scan.php?page=search&q=GCC+4.9
|
||||
[2]:http://www.phoronix.com/scan.php?page=news_item&px=MTUxNzQ
|
||||
[3]:http://gcc.gnu.org/ml/gcc/2013-11/msg00435.html
|
||||
[4]:http://www.phoronix.com/scan.php?page=search&q=LLVM+3.4
|
@ -0,0 +1,72 @@
|
||||
How to convert video to animated gif image on Linux
|
||||
================================================================================
|
||||
Once thought of as outdated art forms, animated GIF images have now come back. If you haven't noticed, quite a few online sharing and social networking sites are now supporting animated GIF images, for example, on [Tumblr][1], [Flickr][2], [Google+][3], and [partly on Facebook][4]. Due to their ease of consumption and sharing, GIF-ed animations are now part of mainstream Internet culture.
|
||||
|
||||
So some of you may wonder how you can create such animated GIF images. There are various online or offline tools dedicated to create animated GIF images. Another option is to create an animated GIF image off of an existing video clip. In this tutorial, I will describe **how to convert a video file to an animated GIF image on Linux**.
|
||||
|
||||
As a more useful example, let me demonstrate how to **convert a YouTube video to an animated GIF image**.
|
||||
|
||||
### Step 1: Download a YouTube Video ###
|
||||
|
||||
First, download a YouTube video that you would like to convert. You can use [youtube-dl][5] tool to save a YouTube video as an MP3 file. Suppose you saved your favorite YouTube video as "funny.mp3".
|
||||
|
||||
### Step 2: Extract Video Frames from a Video ###
|
||||
|
||||
Next, [install FFmpeg][5] on your Linux system, which I will use to extract video frames from the video.
|
||||
|
||||
The following command will extract individual video frames, and save them as GIF images. Make sure to use the output file format ("out%04d.gif") as is. That way, individual frames will be named and saved properly.
|
||||
|
||||
ffmpeg -t <duration> -ss <starting position in hh:mm:ss format> -i <input_video> out%04d.gif
|
||||
|
||||
For example, if you want to extract the video frames of input video, for 5 seconds, starting at 10 seconds from the beginning, run the following command.
|
||||
|
||||
$ ffmpeg -t 5 -ss 00:00:10 -i funny.mp4 out%04d.gif
|
||||
|
||||
After FFmpeg is completed, you will see a list of GIF files created, which are named as "out[\d+].gif".
|
||||
|
||||
### Step 3: Merge Video Frames into an Animated GIF ###
|
||||
|
||||
The next step is to merge individual GIF files into one animated GIF image. For that, you can use ImageMagick.
|
||||
|
||||
First, [install ImageMagick][7] on your Linux system if you haven't done so.
|
||||
|
||||
Then, run the following command to merge created GIF images into a single animated GIF file.
|
||||
|
||||
convert -delay <ticks>x<ticks-per-second> -loop 0 out*gif <output-gif-file>
|
||||
|
||||
In the command, "-delay" is an option that controls the animation speed. This option indicates that [ticks/ticks-per-second] seconds must elapse before the display of the next frame. The "-loop 0" option indicates infinite loops of animation. If you want, you can specify "-loop N", in which case the animation will repeat itself N times.
|
||||
|
||||
For example, to create an animated GIF image with 20 frames-per-second and infinite loop, use the following command.
|
||||
|
||||
$ convert -delay 1x20 -loop 0 out*.gif animation.gif
|
||||
|
||||
### Step 4 (Optional): Reduce the Size of an Animated GIF ###
|
||||
|
||||
The last (optional) step is to reduce the size of the created GIF file, by using ImageMagick's GIF optimizer.
|
||||
|
||||
Use the following command to reduce the GIF size.
|
||||
|
||||
convert -layers Optimize animation.gif animation_small.gif
|
||||
|
||||
Now you are ready to share the GIF image on your social networks. The following shows a sample GIF image that I created from a cute YouTube video.
|
||||
|
||||
Enjoy. :-)
|
||||
|
||||
[![](http://farm8.staticflickr.com/7372/10988763123_4e89a18085_o.gif)][8]
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://xmodulo.com/2013/11/convert-video-animated-gif-image-linux.html
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://staff.tumblr.com/post/15623140287/1mb-gifs
|
||||
[2]:http://www.flickr.com/photos/markus-weldon-imagebank/4439159924/sizes/o/in/photostream/
|
||||
[3]:https://plus.google.com/communities/110524851358723545415
|
||||
[4]:http://mashable.com/2013/08/29/gifs-return-to-facebook/
|
||||
[5]:http://xmodulo.com/2013/03/how-to-save-youtube-videos-on-linux.html
|
||||
[6]:http://xmodulo.com/2013/06/how-to-install-ffmpeg-on-linux.html
|
||||
[7]:http://ask.xmodulo.com/install-imagemagick-linux.html
|
||||
[8]:http://www.flickr.com/photos/xmodulo/10988763123/
|
@ -0,0 +1,51 @@
|
||||
Linux Uptime Command – Find How Long Your System Been Running
|
||||
================================================================================
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/linux-uptime-command.png)
|
||||
|
||||
Information about how long the system has been running may not critical for some people. But for server administrators, it is critical. Servers which running mission critical application must be running as long as possible. Sometimes it must be zero-downtime. So, how can we know information about it?
|
||||
|
||||
On Linux operating system, we can use uptime command. You don’t need root privileges to run this command. This command also already installed on Linux system by default.
|
||||
|
||||
The syntax is like this :
|
||||
|
||||
$ uptime
|
||||
|
||||
You may see an output like this :
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime.png)
|
||||
|
||||
This information is provided in **/proc/uptime** file. Even the file is text based, but it’s a raw information which is not directly human-readable. That’s why we need uptime command to translate it.
|
||||
|
||||
Here’s how to read the information provided by uptime :
|
||||
|
||||
### System Time ###
|
||||
|
||||
You see at the Figure 1 above, the first information on the left side is **14:04:39**. It shows you the system time in 24 hours format.
|
||||
|
||||
### System Uptime ###
|
||||
|
||||
The second information is **Up 1004 days, 12:20.** It give you a timeframe how long the system has been running. From the Figure 1, it shows you that the system has been running for 1004 days and 12 hours – 20 minutes. If the system has not pass 24 hours then it will show you only hours and / or minutes timeframe. Take a look at Figure 2 and Figure 3 below. When the system is restarted then the counter will be reset to zero.
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime_minutes.png)
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime_hours1.png)
|
||||
|
||||
### Numbers of Users Logged In ###
|
||||
|
||||
The third information is uptime shows you numbers of users logged in. Figure 1 show you that there is **1 user** logged at that time. When there is multiple user logged in, uptime will tell you the numbers.
|
||||
|
||||
### Load Average ###
|
||||
|
||||
The last information is about the average load of the system. From the Figure 1 again you see numbers **0.25, 0.25, 0.19**. The two decimal point is translated as a percentage. 0.25 means 25% and 0.19 means 19%.
|
||||
|
||||
While the sequence 0.25, 0.25, 0.19 represent for the past 1 minutes, 5 minutes and 15 minutes. The lower numbers you get mean the better your system will perform.
|
||||
|
||||
That’s the usage of the **uptime** command in daily used. For more detailed information, please refer to uptime manual page by typing **man uptime** in your Linux console.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://linoxide.com/linux-command/linux-uptime-command/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -1,42 +0,0 @@
|
||||
翻译中 by小眼儿
|
||||
|
||||
NSA Asked Linus Torvalds To Give Them Backdoor Access In Linux, Says MEP
|
||||
================================================================================
|
||||
![](http://www.omgubuntu.co.uk/wp-content/uploads/2011/01/DSC01782.jpg)
|
||||
|
||||
*Linus and OMG! Back in 2011*
|
||||
|
||||
The United States’ National Security Agency ([**NSA**][1]) are alleged to have asked the creator of Linux, Linus Torvalds, to create ‘backdoors’ into GNU/Linux through which they could access.
|
||||
|
||||
Far from being a rumour, word of the approach comes via Linus’ father, Nils Torvalds.
|
||||
|
||||
As a Member of the European Parliament (MEP), Nils was present at recent committee inquiry held on the “Mass Surveillance of EU Citizens”. Here, representatives from a number of companies named in documents leaked by NSA whistleblower Edward Snowden were questioned about their own (alleged) involvement.
|
||||
|
||||
Following a question put to a Microsoft spokeswoman by Pirate Party MEP Christian Engström on whether the company willingly include “backdoors” for the NSA in their system, Nils Torvalds MEP [said][2]:
|
||||
|
||||
> When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer …everybody understood that the NSA had approached him.
|
||||
|
||||
If that sounds familiar to you then you might have [seen the snippet on YouTube][3]. Linus went on to insist that he was joking, and that [the NSA had not approached him][4].
|
||||
|
||||
**But, speaking at November 11th’s inquiry, his father seems to think otherwise. **
|
||||
|
||||
Following on from allegations that Google, [Yahoo!][5], Facebook [and, indeed, Microsoft][6] are among the many companies wilfully cooperating with the agency to provide “backdoor” access to their systems, this revelation is far from earth-shattering. In fact, is makes sense in the grand scheme of things. After all, why wouldn’t the NSA ask Linus to do this?
|
||||
|
||||
While Nils doesn’t explain how Linus responded – I’d like to think it involved two fingers – we can be sure that it, at the very least, involved an explanation of how open source prevents something like that being possible.
|
||||
|
||||
If any holes were left around for the NSA’s overly-long tentacles to creep into, you can bet your bottom dollar that they’d have been found, exposed and rooted out long before now.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/nsa-ask-linus-torvalds-include-backdoors-linux-father-says-yes
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.nsa.gov/
|
||||
[2]:http://youtu.be/EkpIddQ8m2s?t=3h09m06s
|
||||
[3]:http://www.youtube.com/watch?v=7gRsgkdfYJ8
|
||||
[4]:http://mashable.com/2013/09/19/linus-torvalds-backdoor-linux/
|
||||
[5]:http://www.telegraph.co.uk/technology/internet-security/10459081/Yahoo-to-encrypt-internal-traffic-following-NSA-revelations.html
|
||||
[6]:http://www.bbc.co.uk/news/technology-23285642
|
219
sources/Setup a jailed shell with jailkit on ubuntu.md
Normal file
219
sources/Setup a jailed shell with jailkit on ubuntu.md
Normal file
@ -0,0 +1,219 @@
|
||||
Setup a jailed shell with jailkit on ubuntu
|
||||
================================================================================
|
||||
### Jailed Shell and Jailkit ###
|
||||
|
||||
A jailed shell is a kind of limited shell that provides the user with a very real looking shell but does not allow him to mess with/view/modify any parts of the real file systems. The file system inside the shell is different from the actual file system of the underlying system. Such a functionality is achived through chroot and finds many kinds of applications. For example to setup a linux shell for users to just "play with". Or run some program with full functionality but in a limited environment and so on.
|
||||
|
||||
In this tutorial we are going to talk about setting up a jailed shell quickly with jailkit on ubuntu. Jailkit is helper program that allows to quickly setup a jailed shell, jail users inside it, and configure programs to run from the jailed environment.
|
||||
|
||||
Jailkit can be downloaded from [http://olivier.sessink.nl/jailkit/][1]
|
||||
|
||||
We have already discussed about installing jailkit on ubuntu so check out that post.
|
||||
|
||||
### Setup jailed shell ###
|
||||
|
||||
#### 1. Setup the jail environment ####
|
||||
|
||||
There needs to be a directory where the whole jail environment will be setup. Lets do it in /opt/jail. This can be whatever.
|
||||
|
||||
$ sudo mkdir /opt/jail
|
||||
|
||||
Root should own this directory. So chown it out.
|
||||
|
||||
$ sudo chown root:root /opt/jail
|
||||
|
||||
#### 2. Setup the programs to make available inside the jail ####
|
||||
|
||||
All the programs that need to be available in the jail need to be copied inside it using the jk_init command.
|
||||
|
||||
Example
|
||||
|
||||
$ sudo jk_init -v /jail basicshell
|
||||
$ sudo jk_init -v /jail editors
|
||||
$ sudo jk_init -v /jail extendedshell
|
||||
$ sudo jk_init -v /jail netutils
|
||||
$ sudo jk_init -v /jail ssh
|
||||
$ sudo jk_init -v /jail sftp
|
||||
$ sudo jk_init -v /jail jk_lsh
|
||||
|
||||
Or at one go
|
||||
|
||||
$ sudo jk_init -v /opt/jail netutils basicshell jk_lsh openvpn ssh sftp
|
||||
|
||||
The names like basicshell , editors , netutils are groups that contain multiple programs. Each group is a set of executable files, libraries etc to be copied into the shell. For example, the section **basicshell** provides many programs like bash, ls, cat, chmod, mkdir, cp, cpio, date, dd, echo, egrep etc in the jail.
|
||||
|
||||
For a complete list of sections that can be setup, have a look at /etc/jailkit/jk_init.ini.
|
||||
|
||||
jk_lsh (Jailkit limited shell) - is an important section, and must be added.
|
||||
|
||||
#### 3. Create the user who will be jailed ####
|
||||
|
||||
Need a user to put inside the jail. Lets create one
|
||||
|
||||
$ sudo adduser robber
|
||||
Adding user `robber' ...
|
||||
Adding new group `robber' (1005) ...
|
||||
Adding new user `robber' (1006) with group `robber' ...
|
||||
Creating home directory `/home/robber' ...
|
||||
Copying files from `/etc/skel' ...
|
||||
Enter new UNIX password:
|
||||
Retype new UNIX password:
|
||||
passwd: password updated successfully
|
||||
Changing the user information for robber
|
||||
Enter the new value, or press ENTER for the default
|
||||
Full Name []:
|
||||
Room Number []:
|
||||
Work Phone []:
|
||||
Home Phone []:
|
||||
Other []:
|
||||
Is the information correct? [Y/n] y
|
||||
|
||||
Note that this is a normal user who is created in the actual filesystem and not inside the jail.
|
||||
In the next step this user shall be imprisoned inside the jail.
|
||||
|
||||
At this point if you take a look at /etc/passwd you get to see an entry at the end that looks like this
|
||||
|
||||
robber:x:1006:1005:,,,:/home/robber:/bin/bash
|
||||
|
||||
This is our new user and the last part /bin/bash indicates that the user has a normal shell access on the system, if he logs in.
|
||||
|
||||
#### 4. Jail the user ####
|
||||
|
||||
Now its time to put the user inside the jail.
|
||||
|
||||
$ sudo jk_jailuser -m -j /opt/jail/ robber
|
||||
|
||||
By doing this the user robber has now been jailed.
|
||||
|
||||
Now if you take a look at /etc/passwd the last entry would look like this
|
||||
|
||||
robber:x:1006:1005:,,,:/opt/jail/./home/robber:/usr/sbin/jk_chrootsh
|
||||
|
||||
Note that the last 2 parts that indicate the home user and the shell type have changed. The home directory of the user is now inside the jail environment at /opt/jail. The shell of the user is now a special program called jk_chrootsh that will provide the jailed shell.
|
||||
|
||||
It is this particular shell called jk_chrootsh that takes the user inside the jail, everytime he logs onto the system.
|
||||
|
||||
The jail setup by now is nearly done. But if you try to connect to id from ssh, it will fail like this :
|
||||
|
||||
$ ssh robber@localhost
|
||||
robber@localhost's password:
|
||||
Welcome to Ubuntu 12.04 LTS (GNU/Linux 3.2.0-25-generic x86_64)
|
||||
|
||||
* Documentation: https://help.ubuntu.com/
|
||||
|
||||
13 packages can be updated.
|
||||
0 updates are security updates.
|
||||
|
||||
*** /dev/sda7 will be checked for errors at next reboot ***
|
||||
*** /dev/sda8 will be checked for errors at next reboot ***
|
||||
|
||||
Last login: Sat Jun 23 12:45:13 2012 from localhost
|
||||
Connection to localhost closed.
|
||||
$
|
||||
|
||||
The connection shall close. This happens because the user actually has a limited shell.
|
||||
|
||||
#### 5. Give bash shell to user inside the jail ####
|
||||
|
||||
The next important thing to do is to give the user a proper bash shell, but inside the jail.
|
||||
Open the following file
|
||||
|
||||
/opt/jail/etc/passwd
|
||||
|
||||
Its the password file inside the jail. It would look somewhat like this
|
||||
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
robber:x:1006:1005:,,,:/home/robber:/usr/sbin/jk_lsh
|
||||
|
||||
Change the /usr/sbin/jk_lsh to /bin/bash
|
||||
|
||||
root:x:0:0:root:/root:/bin/bash
|
||||
robber:x:1006:1005:,,,:/home/robber:/bin/bash
|
||||
|
||||
Save the file and exit.
|
||||
|
||||
#### 6. Login to the jail ####
|
||||
|
||||
So now its time to login into the jail again
|
||||
|
||||
$ ssh robber@localhost
|
||||
robber@localhost's password:
|
||||
Welcome to Ubuntu 12.04 LTS (GNU/Linux 3.2.0-25-generic x86_64)
|
||||
|
||||
* Documentation: https://help.ubuntu.com/
|
||||
|
||||
13 packages can be updated.
|
||||
0 updates are security updates.
|
||||
|
||||
*** /dev/sda7 will be checked for errors at next reboot ***
|
||||
*** /dev/sda8 will be checked for errors at next reboot ***
|
||||
|
||||
Last login: Sat Jun 23 12:46:01 2012 from localhost
|
||||
bash: groups: command not found
|
||||
I have no name!@desktop:~$
|
||||
|
||||
The jail says 'I have no name!' , ha ha. Now we have a fully functional bash shell but inside the jail.
|
||||
|
||||
Now check the environment by moving around. The root / of the jailed environment is /opt/jail of the real file system. But its only we who knows that, not the jailed user.
|
||||
|
||||
I have no name!@desktop:~$ cd /
|
||||
I have no name!@desktop:/$ ls
|
||||
bin dev etc home lib lib64 run usr var
|
||||
I have no name!@desktop:/$
|
||||
|
||||
Also only the commands that were copied via jk_cp sections will be available in this jail.
|
||||
|
||||
If the login fails, then check /var/log/auth.log for error messages.
|
||||
|
||||
Now try running some network command like wget or anything similar.
|
||||
|
||||
$ wget http://www.google.com/
|
||||
|
||||
If you get an error like this :
|
||||
|
||||
$ wget http://www.google.com/
|
||||
--2012-06-23 12:56:43-- http://www.google.com/
|
||||
Resolving www.google.com (www.google.com)... failed: Name or service not known.
|
||||
wget: unable to resolve host address `www.google.com'
|
||||
|
||||
Fix it by running the following 2 commands :
|
||||
|
||||
$ sudo jk_cp -v -j /opt/jail /lib/x86_64-linux-gnu/libnss_files.so.2
|
||||
$ sudo jk_cp -v -j /opt/jail /lib/x86_64-linux-gnu/libnss_dns.so.2
|
||||
|
||||
The exact location of the libnss_files.so and libnss_dns.so can vary so check.
|
||||
|
||||
### Running programs or services in the jail ###
|
||||
|
||||
Now the setup is complete. Jails are useful to run programs or services in a restricted/secure environments. To launch a program or daemon inside the jail use the **jk_chrootlaunch** command.
|
||||
|
||||
$ sudo jk_chrootlaunch -j /opt/jail -u robber -x /some/command/in/jail
|
||||
|
||||
The jk_chrootlaunch utility can be used to launch a particular process inside the jail environment with privileges of the specified user. If the daemon fails to start, check /var/log/syslog for error messages.
|
||||
|
||||
To run the program inside the jail, the program must first be fully copied inside the jail using the jk_cp command.
|
||||
|
||||
jk_cp - a utility to copy files including permissions and libraries into a jail
|
||||
|
||||
For further reading about various jailkit commands, check the documentation at [http://olivier.sessink.nl/jailkit/][1]
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.binarytides.com/setup-jailed-shell-jailkit-ubuntu/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://olivier.sessink.nl/jailkit/
|
||||
[2]:
|
||||
[3]:
|
||||
[4]:
|
||||
[5]:
|
||||
[6]:
|
||||
[7]:
|
||||
[8]:
|
||||
[9]:
|
||||
[10]:
|
||||
[11]:
|
||||
[12]:
|
@ -0,0 +1,24 @@
|
||||
Test your reflexes with Briquolo, fast breakout game
|
||||
================================================================================
|
||||
[Briquolo][2] is a fast captivating breakout game that adopts the classic enjoyable game of dealing with a ball, in order to destroy various objects.
|
||||
|
||||
Briquolo comes with an agile nature, therefore, the gamer is to be attentive while reflecting back the ball, a second of inattention and the ball is lost.
|
||||
|
||||
Launching the game, the user is to notice its 3D look, the brave board is moved on top of a colorful environment featuring 3D objects, game arena where power-ups prove themselves vital, not succeeding to get the board-increasing goodies, the gamer decreases one's ability to complete the stage against the sprint-like attribute of the ball.
|
||||
|
||||
Pleasant effects, according-to music and tweakable options (including the ability to set the game in fullscreen mode with high resolutions,--including 1920x1080--) present Briquolo as entertaining and challenging.
|
||||
|
||||
![](http://iloveubuntu.net/pictures_me/Briquolo%20usc.jpg)
|
||||
|
||||
Briquolo 0.5.7 is freely [available][2] for installation via Ubuntu Software Center (Ubuntu 12.04, Ubuntu 12.10, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04).
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://iloveubuntu.net/test-your-reflexes-briquolo-fast-breakout-game
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://briquolo.free.fr/en/
|
||||
[2]:apt://briquolo
|
@ -0,0 +1,112 @@
|
||||
22 The Linux Kernel: Configuring the Kernel Part 18
|
||||
================================================================================
|
||||
![](http://www.linux.org/attachments/slide-jpg.616/)
|
||||
|
||||
Aloha! Ready for the next article? In this article, we will discuss the auxiliary-screen. The auxiliary displays are small LCD screens; most are equal to or less than 128x64. Then, we will discuss Userspace IO drivers, some virtual drivers, Hyper-V, staging drivers, IOMMU, and other kernel features.
|
||||
|
||||
The first driver to configure for the auxiliary display is the "KS0108 LCD Controller" driver. The KS0108 LCD Controller is a graphics controller made by Samsung.
|
||||
|
||||
Next, the parallel port address for the LCD can be set (Parallel port where the LCD is connected). The first port address is 0x378, the next is 0x278 and the third is 0x3BC. These are not the only choices of addresses. The majority of people will not need to change this. The shell command "cat /proc/ioports" will list the available parallel ports and the addresses.
|
||||
|
||||
The kernel developer can set the writing delay of the KS0108 LCD Controller to the parallel port (Delay between each control writing (microseconds)). The default value is almost always correct, so this typically does not need to be changed.
|
||||
|
||||
The "CFAG12864B LCD" screen is a 128x64, two-color LCD screen. This screen relies on the KS0108 LCD Controller.
|
||||
|
||||
The refresh rate of these LCD screens can be changed (Refresh rate (hertz)). Generally, a higher refresh rate causes more CPU activity. This means slower systems will need a smaller refresh rate.
|
||||
|
||||
After the auxiliary displays are configured, the "Userspace I/O drivers" are then set. The userspace system allows the user's applications and processes to access kernel interrupts and memory addresses. With this enabled, some drivers will be placed in the userspace.
|
||||
|
||||
The "generic Hilscher CIF Card driver" is a userspace driver for Profibus cards and Hilscher CIF Cards.
|
||||
|
||||
The "Userspace I/O platform driver" creates a general system for drivers to be in the userspace.
|
||||
|
||||
The next driver is the same as above, but adds IRQ handling (Userspace I/O platform driver with generic IRQ handling).
|
||||
|
||||
The following driver is again like the one before, but with dynamic memory abilities added (Userspace platform driver with generic irq and dynamic memory).
|
||||
|
||||
Next, some vendor/device specific drivers are available.
|
||||
|
||||
Then, there is a generic PCI/PCIe card driver (Generic driver for PCI 2.3 and PCI Express cards).
|
||||
|
||||
The following driver is for "VFIO support for PCI devices". VFIO stands for Virtual Function Input/Output. VFIO allows devices to directly access userspace in a secure fashion.
|
||||
|
||||
The "VFIO PCI support for VGA devices" allows VGA to be supported by PCI through VFIO.
|
||||
|
||||
Next, are virtio drivers. Virtio is a IO virtualization platform. This virtual software is for operating system virtualization. This is required for running an operating system in a virtual machine on the Linux system.
|
||||
|
||||
The first virtio driver we can configure is the "PCI driver for virtio devices". This allows virtual access to PCI.
|
||||
|
||||
The "Virtio balloon driver" allows the memory owned by a virtual system to be expanded or decreased as needed. Generally, no one wants a virtual system to reserve memory it may never use when the host operating system needs the memory.
|
||||
|
||||
The following driver supports memory mapped virtio devices (Platform bus driver for memory mapped virtio devices).
|
||||
|
||||
If the Linux kernel being configured is intended to run on a Microsoft Hyper-V system, then enable this driver (Microsoft Hyper-V client drivers). This would allow Linux to be the guest/client system on Hyper-V.
|
||||
|
||||
![](http://www.linux.org/attachments/kernel_18-png.617/)
|
||||
|
||||
Next, we have the staging drivers. These are drivers that are under development, may change soon, or are not up to the standard quality for the Linux kernel. The only group of drivers in this category (in this kernel version 3.9.4) are the Android drivers. Yes, Android uses the Linux kernel which would make Android a Linux system. However, this is still debated. If the kernel is intended for Android, then it may be wise to enable all of the drivers.
|
||||
|
||||
The "Android Binder IPC Driver" provides support for Binder which is a system that allows processes to communicate with each other on Android systems.
|
||||
|
||||
The ashmem driver can be enabled next (Enable the Anonymous Shared Memory Subsystem). Ashmem stands for "Anonymous SHared MEMory" or "Android SHared MEMory". This supports a file-based memory system for userspace.
|
||||
|
||||
The "Android log driver" offers the complete Android logging system.
|
||||
|
||||
The "Timed output class driver" and "Android timed gpio driver" allow the Android system to manipulate GPIO pins and undo the manipulations after the timeout.
|
||||
|
||||
The "Android Low Memory Killer" closes processes when more memory is needed. This feature kills the tasks that are not used or inactive.
|
||||
|
||||
The "Android alarm driver" makes the kernel wakeup at set intervals.
|
||||
|
||||
After the staging drivers are configured, the next set of drivers are for the X86 platform. These drivers are vendor/device specific for X86 (32-bit) hardware.
|
||||
|
||||
The next driver is for "Mailbox Hardware Support". This framework controls mailbox queues and interrupt signals for hardware mailbox systems.
|
||||
|
||||
"IOMMU Hardware Support" links the memory to devices that are able to use DMA. IOMMU enhances DMA. The IOMMU maps addresses and blocks faulty devices from accessing the memory. IOMMU also allows hardware to access more memory than it could without IOMMU.
|
||||
|
||||
The "AMD IOMMU support" driver offers better IOMMU support for AMD devices.
|
||||
|
||||
Debugging abilities exist for the AMD IOMMU support (Export AMD IOMMU statistics to debugfs).
|
||||
|
||||
A newer version of the IOMMU driver exists for AMD hardware (AMD IOMMU Version 2 driver).
|
||||
|
||||
The Linux kernel also provides an IOMMU driver specifically for Intel devices (Support for Intel IOMMU using DMA Remapping Devices).
|
||||
|
||||
Some devices may be able to accept a variety of voltages and clock frequencies. This driver allows the operating system to control the device's voltage output and clock rate (Generic Dynamic Voltage and Frequency Scaling (DVFS) support). With this driver enabled, other kernel features can be enabled for power/performance management as seen below.
|
||||
|
||||
"Simple Ondemand" is like above, but specifically changes the clock rate based on the device's activity. Generally, more activity means the device needs a faster clock speed to accommodate for the larger resource demand.
|
||||
|
||||
|
||||
"Performance" allows the system to set the clock speed to the maximum supported amount for best performance. This increases power consumption.
|
||||
|
||||
"Powersave" sets the clock rate to the lowest value to save power.
|
||||
|
||||
"Userspace" allows the userspace to set the clock speed.
|
||||
|
||||
"External Connector Class (extcon) support" provides the userspace with a way to watch external connectors like USB and AC ports. This allows applications to know if a cable was plugged into a port. Users will almost always want this enabled. If anyone has purposely disabled this for a legitimate reason, please share with us why that would be needed.
|
||||
|
||||
The "GPIO extcon support" driver is just like the above driver, but is made specifically for GPIO pins.
|
||||
|
||||
Next, there is a list of various vendor/device specific controllers for memory (Memory Controller drivers). Memory chip controllers may be separate devices or built inside the memory chips. These controllers manage the incoming and outgoing data flow.
|
||||
|
||||
The "Industrial I/O support" driver provides a standard interface for sensors despite the bus type they are on (that is, PCIe, spi, GPIO, etc.). IIO is a common abbreviation for Industrial Input/Output.
|
||||
|
||||
The Linux kernel offers support for a large variety of accelerometers, amplifiers, analog to digital converters, inertial measurement units, light sensors, magnetometer sensors, and many other sensors and converters.
|
||||
|
||||
The "Intel Non-Transparent Bridge support" driver supports PCIe hardware bridges which connect to systems. All writes to mapped memory will be mirrored on both systems.
|
||||
|
||||
"VME bridge support" is the same as above except the bridge uses VME which is a different bus standard.
|
||||
|
||||
"Pulse-Width Modulation (PWM) Support" controls the back-light and fan speed by regulating the average power received by such devices.
|
||||
|
||||
"IndustryPack bus support" offers drivers for the IndustryPack bus standards.
|
||||
|
||||
In the next article, we will configure the firmware drivers. Mahalo!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linux.org/threads/the-linux-kernel-configuring-the-kernel-part-18.4896/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,127 @@
|
||||
23 The Linux Kernel: Configuring the Kernel Part 19
|
||||
================================================================================
|
||||
![](http://www.linux.org/attachments/slide-jpg.626/)
|
||||
|
||||
Aloha and welcome to the next article of the Linux kernel series! We are getting closer to the end of the configuration process. In this article, we will discuss firmware drivers and then the filesystem drivers.
|
||||
|
||||
The first driver in this category is for finding the boot-disk (BIOS Enhanced Disk Drive calls determine boot disk). Sometimes, Linux does not know which drive is the bootable drive. This driver allows the kernel to ask the BIOS. Linux then stores the information on sysfs. Linux needs to know this for setting up bootloaders.
|
||||
|
||||
Even if BIOS EDD services are compiled in the kernel, this option can set such services to be inactive by default (Sets default behavior for EDD detection to off ). EDD stands for Enhanced Disk Drive.
|
||||
|
||||
When using kexec to load a different kernel, performance can be increased by having the firmware provide a memory map (Add firmware-provided memory map to sysfs).
|
||||
|
||||
The "Dell Systems Management Base Driver" gives the Linux kernel better control of the Dell hardware via the sysfs interface.
|
||||
|
||||
The hardware's information can be accessed by the software via /sys/class/dmi/id/ with this driver enabled (Export DMI identification via sysfs to userspace). DMI stands for Desktop Management Interface. The DMI manages the components of the hardware and can access the hardware's data. The structure of the data in the BIOS and hardware is regulated by the System Management BIOS (SMBIOS) specification.
|
||||
|
||||
The raw data tables from the DMI can be accessed with this driver (DMI table support in sysfs).
|
||||
|
||||
To boot from an iSCSI driver, enable this driver (iSCSI Boot Firmware Table Attributes).
|
||||
|
||||
The last firmware driver is a set of "Google Firmware Drivers". These are drivers for Google-specific hardware. Do not enable this driver unless you work for Google and need to use Linux on such hardware or if you are making a Linux kernel for a computer you stole from Google.
|
||||
|
||||
Next, we can configure the file system support of the kernel.
|
||||
|
||||
The "Second extended fs support" driver provides the EXT2 filesystem. [http://www.linux.org/threads/ext-file-system.4365/][1]
|
||||
|
||||
![](http://www.linux.org/attachments/kernel_19-png.627/)
|
||||
|
||||
The "Ext2 extended attributes" offers the ability to use extra metadata not natively supported by the filesystem.
|
||||
|
||||
The "Ext2 POSIX Access Control Lists" driver adds additional permission schemes not native to EXT2.
|
||||
|
||||
The "Ext2 Security Labels" enhances the security provided by SElinux.
|
||||
|
||||
Enabling "Ext2 execute in place support" allows executables to be executed in the current location without being executed using the paged cache.
|
||||
|
||||
The EXT3 filesystem is offered by this driver (Ext3 journaling file system support). [http://www.linux.org/threads/ext-file-system.4365/][2]
|
||||
|
||||
The "Default to 'data=ordered' in ext3" driver sets the data ordering mode to "Ordered". This deals with the way the journaling and writing work. Data ordering is explained in this article - [http://www.linux.org/threads/journal-file-system.4136/][3]
|
||||
|
||||
The "Ext3 extended attributes" offers the ability to use extra metadata not natively supported by the filesystem. Again, the following EXT3 drivers/features are the same as for EXT2 - "Ext3 POSIX Access Control Lists" and "Ext3 Security Labels". Also, the same is true for the following EXT4 drivers/features - "Ext4 POSIX Access Control Lists", "Ext4 Security Labels", and "EXT4 debugging support".
|
||||
|
||||
Journal Block Device debugging is supported by EXT3 (JBD debugging support) and EXT4 (JBD2 debugging support).
|
||||
|
||||
The next driver offers the Reiser filesystem (Reiserfs support). [http://www.linux.org/threads/reiser-file-system-reiser3-and-reiser4.4403/][4]
|
||||
|
||||
Debugging exists for the Reiser filesystem (Enable reiserfs debug mode).
|
||||
|
||||
The kernel can store ReiserFS statistics in /proc/fs/reiserfs (Stats in /proc/fs/reiserfs).
|
||||
|
||||
The following Reiser drivers/features are the same as the ones for EXT2/3/4 - "ReiserFS extended attributes", "ReiserFS POSIX Access Control Lists", and "ReiserFS Security Labels".
|
||||
|
||||
JFS is also supported by the Linux kernel and includes various features - "JFS filesystem support", "JFS POSIX Access Control Lists", "JFS Security Labels", "JFS debugging", and "JFS statistics". [http://www.linux.org/threads/journaled-file-system-jfs.4404/][5]
|
||||
|
||||
Again, XFS is supported with drivers/features that can be enabled - "XFS filesystem support", "XFS Quota support", "XFS POSIX ACL support", "XFS Realtime subvolume support", and "XFS Debugging support". [http://www.linux.org/threads/xfs-file-system.4364/][6]
|
||||
|
||||
The Global FileSystem 2 is supported by the Linux kernel (GFS2 file system support). This filesystem is used to share storage in a cluster.
|
||||
|
||||
The "GFS2 DLM locking" driver offers a distributed lock manager (DLM) for GFS2.
|
||||
|
||||
The Oracle Cluster FileSystem 2 is supported by the Linux kernel (OCFS2 file system support). This filesystem is used to share storage in a cluster.
|
||||
|
||||
The "O2CB Kernelspace Clustering" driver offers various services for the OCFS2 filesystem.
|
||||
|
||||
The "OCFS2 Userspace Clustering" driver allows the cluster stack to execute in userspace.
|
||||
|
||||
The "OCFS2 statistics" driver allows the user to get statistics concerning the filesystem.
|
||||
|
||||
Like with most of the Linux kernel, the OCFS2 offers logging (OCFS2 logging support). This may be used to watch for errors or for debugging purposes.
|
||||
|
||||
The "OCFS2 expensive checks" driver offers storage consistency checks at the cost of performance. Some Linux users recommend only enabling this feature for debugging purposes.
|
||||
|
||||
The kernel also contains the new B-Tree FileSystem; this driver offers the disk formatter (Btrfs filesystem Unstable disk format). BTRFS is still in development and is planned to one day become as popular or more popular than EXT4. [http://www.linux.org/threads/b-tree-file-system-btrfs.4430/][7]
|
||||
|
||||
The "Btrfs POSIX Access Control Lists" driver adds additional permission schemes not native to BTRFS.
|
||||
|
||||
Next, there is a BTRFS check tool (Btrfs with integrity check tool compiled in (DANGEROUS)). Since, BTRFS is a newly developing filesystem, most of the software associated with it are unstable.
|
||||
|
||||
The NIL-FileSystem is also supported by Linux (NILFS2 file system support). [http://www.linux.org/threads/new-implementation-of-a-log-structured-file-system-nilfs.4547/][8]
|
||||
|
||||
To support the flock() system call used by some filesystems, enable this driver (Enable POSIX file locking API). Disabling this driver will reduce the kernel size by about eleven kilobytes. The driver provides file-locking. File-locking is the process of allowing one process to read a file at a time. This is commonly used with network filesystems like NFS.
|
||||
|
||||
The "Dnotify support" driver is a legacy filesystem notification system that informs the userspace of events on the file system. One use of this and the successor notifications software is to monitor the filesystem for applications. Certain applications tell this daemon what events to watch. Otherwise, each userspace application would need to complete this task themselves.
|
||||
|
||||
Remember, Dnotify is a legacy system, so what is the new notification system? It is Inotify which is provided by this driver (Inotify support for userspace).
|
||||
|
||||
An alternative notification system is fanotify (Filesystem wide access notification). Fanotify is the same as Inotify, but fanotify relays more information to the userspace than Inotify.
|
||||
|
||||
Fanotify can check permissions with this driver enabled (fanotify permissions checking).
|
||||
|
||||
For systems that need to divide the storage space by user will want "Quota support". [http://www.linux.org/threads/atomic-disk-quotas.4277/][9]
|
||||
|
||||
The following driver allows disk quota warnings and messages to be reported through netlink (Report quota messages through netlink interface). Netlink is a socket interface on the userspace that communicates with the kernel.
|
||||
|
||||
Quota messages can also be sent to a console (Print quota warnings to console (OBSOLETE)).
|
||||
|
||||
This driver allows the quota system to perform extra sanity checks (Additional quota sanity checks). In computer technology, a sanity check is the process of checking for errors that may be due to poor programming. The files and output are inspected to ensure the data is what it should be and not structured in some odd fashion.
|
||||
|
||||
Some old system use the old quota system but want to retain the old quota system when upgrading to a newer kernel. This is easily solved by enabling this driver (Old quota format support). Many readers may be wondering why someone would want to keep the old quota system instead of upgrading. Well, imagine being the manager of the IT department of a very large corporation that has many servers running very important tasks. Would you want to create and configure a new (and possibly large) quota system when you can continue using the one that works well? Generally, with computers, follow the principle - If it is not broken or will not cause security issues, do not fix it.
|
||||
|
||||
The newer quota system supports 32-bit UIDs and GIDs with this driver (Quota format vfsv0 and vfsv1 support).
|
||||
|
||||
To automatically mount remote storage units, enable this driver (Kernel automounter version 4 support).
|
||||
|
||||
FUSE filesystems are supported by this driver (FUSE (Filesystem in Userspace) support). Filesystem in Userspace (FUSE) allows any user to create their own filesystem and utilize it in userspace.
|
||||
|
||||
A special extension for FUSE can be used to utilize character devices in userspace (Character device in Userspace support).
|
||||
|
||||
In the next article, we will discuss caches, optical disc filesystems, FAT32 on Linux, and other interesting filesystem topics. Mahalo!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linux.org/threads/the-linux-kernel-configuring-the-kernel-part-19.4929/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.linux.org/threads/ext-file-system.4365/
|
||||
[2]:http://www.linux.org/threads/ext-file-system.4365/
|
||||
[3]:http://www.linux.org/threads/journal-file-system.4136/
|
||||
[4]:http://www.linux.org/threads/reiser-file-system-reiser3-and-reiser4.4403/
|
||||
[5]:http://www.linux.org/threads/journaled-file-system-jfs.4404/
|
||||
[6]:http://www.linux.org/threads/xfs-file-system.4364/
|
||||
[7]:http://www.linux.org/threads/b-tree-file-system-btrfs.4430/
|
||||
[8]:http://www.linux.org/threads/new-implementation-of-a-log-structured-file-system-nilfs.4547/
|
||||
[9]:http://www.linux.org/threads/atomic-disk-quotas.4277/
|
@ -1,34 +1,34 @@
|
||||
九个用Linux uname 命令获取操作系统详情的实例
|
||||
九个简单实例教你用uname命令获取Linux操作系统详情
|
||||
|
||||
================================================================================
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/linux-uname-command.png)
|
||||
|
||||
当你在控制台模式下,无法通过‘右击 > About’给予你关于操作系统的信息.在Linux下,你可以用**uname**命令,帮助你完成. Uname是**unix name**的缩写.让我们先在控制台键入**uname**.
|
||||
当你在控制台模式下,无法通过“鼠标右键 > 关于”获取操作系统的信息。这时,在Linux下,你可以使用**uname**命令,帮助你完成这些工作。 Uname是**unix name**的缩写。在控制台中实际使用的时候只需键入**uname**。
|
||||
|
||||
当你输入uname不带参数时,它仅仅只显示你的操作系统的名字.
|
||||
当你输入uname不带参数时,它仅仅显示你的操作系统的名字。
|
||||
|
||||
# uname
|
||||
|
||||
Linux
|
||||
|
||||
也许它不能满足你的需要.所以你需要用一些参数使uname显示所需信息.
|
||||
也许这还不能满足你的需要。所以你需要加上一些参数,来使uname显示你所需要的信息。
|
||||
|
||||
以下是uname参数的列表:
|
||||
|
||||
### 1. 内核名称 ###
|
||||
|
||||
你可以用**-s**参数,显示内核名称.
|
||||
你可以用**-s**参数,显示内核名称。
|
||||
|
||||
# uname -s
|
||||
|
||||
Linux
|
||||
|
||||
输出信息会跟uname不带参数时输出的一样.
|
||||
输出信息会跟uname不带参数时输出的一样。
|
||||
|
||||
### 2. 内核发行版 ###
|
||||
|
||||
如果你想知道你正在使用那个内核版本,就可以用**-r**参数
|
||||
如果你想知道你正在使用哪个内核发行版,就可以用**-r**参数
|
||||
|
||||
# uname -r
|
||||
|
||||
@ -36,7 +36,7 @@
|
||||
|
||||
### 3. 内核版本 ###
|
||||
|
||||
除一些内核信息外,用**-v**参数uname也能获取更详细的内核信息.
|
||||
除一些内核信息外,用**-v**参数uname也能获取更详细的内核版本信息。
|
||||
|
||||
# uname -v
|
||||
|
||||
@ -44,19 +44,19 @@
|
||||
|
||||
### 4. 节点名 ###
|
||||
|
||||
参数 -n 会提供给你节点的主机名.举例来说,如果你的主机名是“dev-machine”,**-n**参数会打印用-n参数的输出.
|
||||
参数 -n 会提供给你节点的主机名。举例来说,如果你的主机名是“dev-machine”,**-n**参数就会把主机名打印出来。
|
||||
|
||||
# uname -n
|
||||
|
||||
dev-machine
|
||||
|
||||
对于RedHat和CentOS用户来说,你也可以通过**/etc/redhat_release**文件:
|
||||
对于RedHat和CentOS用户来说,你也可以通过**/etc/redhat_release**文件来查看:
|
||||
|
||||
# cat /etc/redhat_release
|
||||
|
||||
CentOS release 5.10 (Final)
|
||||
|
||||
如果不是基于RedHat的发行版,你可以用**/et/issue/**文件.类似如下:
|
||||
如果不是基于RedHat的发行版,你可以查看**/et/issue/**文件.类似如下:
|
||||
|
||||
# cat /etc/issue
|
||||
|
||||
@ -64,27 +64,27 @@
|
||||
|
||||
### 5.硬件名称 ###
|
||||
|
||||
如果你在疑惑用的是那类机器,你可以尝试**-m**参数.它将告诉你关于硬件的信息.
|
||||
如果你想知道用的是哪类机器,你可以尝试**-m**参数。它将告诉你关于硬件的信息。
|
||||
|
||||
# uname -m
|
||||
|
||||
i686
|
||||
|
||||
i686表明了你用的是32位的操作系统.如果是X86_64则表明你用的是64位的系统.
|
||||
i686表明了你用的是32位的操作系统,如果是X86_64则表明你用的是64位的系统。
|
||||
|
||||
### 6. 硬件平台 ###
|
||||
|
||||
类似与硬件名称, -i参数会显示你的硬件平台.
|
||||
与硬件名称类似,-i参数会显示你的硬件平台。
|
||||
|
||||
# uname -i
|
||||
|
||||
i386
|
||||
|
||||
i386意味这是正在运行一个32位的系统.如果输出的是X86_64则说明你正在运行一个64位的系统.
|
||||
同样,i386意味这是正在运行一个32位的系统,如果输出的是X86_64则说明你正在运行一个64位的系统。
|
||||
|
||||
### 7. 处理器类型 ###
|
||||
|
||||
你可以用**-p**参数查看处理器类型.如果uname无法识别,它会显示 ‘unknown’ 的输出.
|
||||
你可以用**-p**参数查看处理器类型。如果uname无法识别,它会显示 ‘unknown’ 作为输出。
|
||||
|
||||
# uname -p
|
||||
|
||||
@ -92,7 +92,7 @@ i386意味这是正在运行一个32位的系统.如果输出的是X86_64则说
|
||||
|
||||
### 8. 操作系统 ###
|
||||
|
||||
Uname也可以透露你在运行的操作系统.用**-o**参数可以实现这个目的.
|
||||
uname也可以透露你正在运行的操作系统信息,用**-o**参数可以实现这个目的。
|
||||
|
||||
# uname -o
|
||||
|
||||
@ -100,15 +100,15 @@ Uname也可以透露你在运行的操作系统.用**-o**参数可以实现这
|
||||
|
||||
### 9. 所有信息 ###
|
||||
|
||||
有一个参数可以展示所有的信息!.这就是**-a**参数.它会显示所有信息,如果**-i和-p**输出为unknown则默认会被省略.
|
||||
有一个参数可以展示所有的信息!这就是**-a**参数,它会显示所有信息。如果**-i和-p**输出为unknown则默认会被省略。
|
||||
|
||||
# uname -a
|
||||
|
||||
Linux dev-machine 2.6.18-371.1.2.el5 #1 SMP Tue Oct 22 12:57:43 EDT 2013 i686 i686 i386 GNU/Linux
|
||||
|
||||
以上就是关于uname命令的使用.请敬请期待更多的命令!
|
||||
以上就是关于uname命令的使用。请敬请期待更多的命令!
|
||||
|
||||
谢谢!
|
||||
谢谢!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
|
@ -1,12 +1,12 @@
|
||||
如何在Linux平台上安装Ghost博客平g
|
||||
如何在Linux平台上安装Ghost博客平台
|
||||
===
|
||||
[Ghost][1]是一个相对新的博客发布平台,它开始与在众筹平台kickstarter上的一个[£25,000的众筹项目][2]。尽管WordPress依然是网上主流的博客工具,但它现在已然是一个拥有众多第三方开发的功能的通用内容管理平台,发展到现在已经逐渐变得笨重、复杂以至于难以维护。但于此同时,仅仅诞生才几个月的Ghost承诺要做一个纯粹的博客平台,打造一个以用户为中心的精雕细琢的用户界面。
|
||||
[Ghost][1]是一个相对较新的博客发布平台,它开始于众筹平台kickstarter上一个[£25,000英镑的众筹项目][2]。尽管WordPress依然是网上主流的博客工具,但它现在已然是一个拥有众多第三方开发功能的通用内容管理平台,发展到现在已经逐渐变得笨重、复杂以至于难以维护。但于此同时,仅仅诞生才几个月的Ghost坚持以用户为中心,打造精雕细琢的用户界面,承诺要做一个纯粹的博客平台。
|
||||
|
||||
在本手册中,我将描述**如何在Linux平台设置Ghost博客平台**。
|
||||
在本教程中,我将描述**如何在Linux中设置Ghost博客平台**。
|
||||
|
||||
###在Linux上安装Ghost
|
||||
|
||||
Ghost是使用Node.js框架编写的。因此,首先你需要在你的Linux系统上[安装Node.js框架][3]。确保Node.js的版本为0.10或者更高。接下来,登录入[http://ghost.org][1](需要注册),然后下载Ghost的源代码。记者按照下面的步骤安装:
|
||||
Ghost是使用Node.js框架编写的。因此,首先你需要在你的Linux系统上[安装Node.js框架][3]。确保Node.js的版本为0.10或者更高。接下来,登录入[http://ghost.org][1](需要注册),然后下载Ghost的源代码。记着按照下面的步骤安装:
|
||||
|
||||
$ sudo mkdir -p /var/www/ghost
|
||||
$ sudo unzip ghost-0.3.3.zip -d /var/www/ghost
|
||||
@ -14,7 +14,7 @@ Ghost是使用Node.js框架编写的。因此,首先你需要在你的Linux系
|
||||
$ sudo npm install --production
|
||||
|
||||
###启动前先配置Ghost
|
||||
在你启动Ghost之前,按照下面的步骤在/var/www/ghost/config.js位置创建它的配置文件。使用你的主机的IP地址替换掉“YOUR_IP”。
|
||||
在你启动Ghost之前,按照下面的步骤在/var/www/ghost/config.js位置创建它的配置文件。使用你的主机IP地址替换掉“YOUR_IP”。
|
||||
|
||||
$ cd /var/www/ghost
|
||||
$ sudo cp config.example.js config.js
|
||||
@ -24,14 +24,14 @@ Ghost是使用Node.js框架编写的。因此,首先你需要在你的Linux系
|
||||
|
||||
搞到这一步,你就可以准备去启动Ghost咯。
|
||||
|
||||
要注意的是,Ghost可以以两种不同的模式运行:“开发者模式”和“用户模式”。为了安全起见,Ghost将两种模式的配置文件(/var/www/ghost/content/data)分开存放。例如,两种不同的模式使用不同的数据库文件(例如位于/var/www/content/data的ghostdev.db和ghost.db)。
|
||||
要注意的是,Ghost可以以两种不同的模式运行:“开发者模式”和“用户模式”。为了安全起见,Ghost将两种模式的配置文件(/var/www/ghost/config.js)分开存放。例如,两种不同的模式使用不同的数据库文件(例如位于/var/www/content/data的ghostdev.db和ghost.db)。
|
||||
|
||||
使用一下命令就可以启动Ghost。Ghost默认以开发者模式运行。
|
||||
使用以下命令就可以启动Ghost。Ghost默认以开发者模式运行。
|
||||
|
||||
$ cd /var/www/ghost
|
||||
$ sudo npm start
|
||||
|
||||
Ghost成功运行后,终端中会有以下输出信息,告诉你Ghost正运行在<YOUR_IP>:2368(译者注:端口号)。
|
||||
Ghost成功运行后,终端中会有以下输出信息,告诉你Ghost正运行在<YOUR_IP>:2368(译者注:2368为端口号)。
|
||||
|
||||
[![](http://farm8.staticflickr.com/7317/10881189204_d714f11321_z.jpg)][4]
|
||||
|
||||
@ -73,7 +73,7 @@ Ghost成功运行后,终端中会有以下输出信息,告诉你Ghost正运
|
||||
|
||||
via: http://xmodulo.com/2013/11/install-ghost-blogging-platform-linux.html
|
||||
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[Mr小眼儿](http://blog.csdn.net/tinyeyeser)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
|
@ -1,22 +1,24 @@
|
||||
Mark Shuttleworth后悔“茶党”的言论以及Canonical公司犯的错
|
||||
Mark Shuttleworth后悔“茶派”笔谈以及其他典型错误
|
||||
================================================================================
|
||||
**Mark Shuttleworth, Canonical公司的创始人,澄清了他“茶党”的言论和为个人言论而表示歉意。**
|
||||
**Mark Shuttleworth, Canonical公司的创始人,他澄清了他的“茶派”言论和为个人言论而表示歉意。**
|
||||
|
||||
![](http://i1-news.softpedia-static.com/images/news2/Mark-Shuttleworth-Regrets-the-quot-Tea-Party-quot-Remarks-and-Other-Canonical-Mistakes-398819-2.jpg)
|
||||
|
||||
我们不是每天能看到Mark Shuttleworth连续道歉两次, 很有可能这是他第一次发生这样的事情了。
|
||||
我们看到Mark Shuttleworth不是每天连续道歉两次, 很有可能这是他第一次发生这样的事情。
|
||||
|
||||
[第一个道歉][1] 来自fixubuntu.com的主人,他是一封来自Canonical公司legal团队的收件人。Micah F. Lee,该网站背后的家伙,写了一篇关于这些问题以及在许多论坛和网站对此事进行了长时间讨论。
|
||||
[第一个道歉][1] 来自fixubuntu.com的主人,他是Canonical公司法律团队邮件的收件人。Micah F. Lee,该网站背后的家伙,写了一篇关于这些问题以及在许多论坛和网站对此事进行了长时间讨论。
|
||||
|
||||
Mark Shuttleworth首先在Google+向他道歉,但是他同样在他的个人博客上写了很多正式文本,这通常是保留了有重要意义的事情。
|
||||
|
||||
既然他道歉了,他同样花了一些时间说他后悔[“茶党”][2]评论招惹了许多对Canonical公司的冲动,可能甚至更是如此超过原来的问题,他是疯了。
|
||||
由于他道歉,他同样花时间去说他后悔[“茶派”][2]解释惹来了许多压力对Canonical公司,他为可能甚至超过最初的问题生气。
|
||||
|
||||
“另一面,个人角度,我自己也犯了一个错误,当我使用标签‘open source tea party’指的是Canonical公司非技术性批评家的声音。这是不必要的并且的确可能一样冒犯真的茶党成员(嗨,这里!)以及人民非技术性工作的批评的声音(hello,这儿!)。”
|
||||
“另一面,个人角度,我自己也犯了一个错误,当我使用标签‘open source tea party’指的是工作的非技术的批评。这是不必要的并且的确可能一样冒犯真的茶派成员(嗨,这里!)以及人民非技术工作的批评(hello,这儿!)。”
|
||||
“On another, more personal note, I made a mistake myself when I used the label ‘open source tea party’ to refer to the vocal non-technical critics of work that Canonical does. That was unnecessary and quite possibly equally offensive to members of the real Tea Party (hi there!) and the people with vocal non-technical criticism of work that Canonical does (hello there!).”
|
||||
|
||||
“刚才我所说的建议里没有我不欢迎像这种技术反馈的意思,但是一些假定我拒绝了所有的反馈包括技术评论。我没有 – 我谈论软件的批评在软件本身没有中心, 而是一些动机的组合的人写的,或依据它所公布的特定的自由软件许可证,或公司的政策,或公司背后国家的政策,”Mark Shuttleworth说道。
|
||||
“没有什么我说的建议,我不欢迎像这样的技术反馈,但是一些假定我拒绝了所有的反馈包括技术评论。我没有 – 我谈论软件的批评在软件本身没有中心, 而是一些动机的组合的人写的,或依据它所公布的特定的自由软件许可证,或公司的政策,或公司背后国家的政策,”Mark Shuttleworth说道。
|
||||
“There isn’t anything in what I said to suggest that I don’t welcome such technical feedback, but some assumed I was rejecting all feedback including technical commentary. I was not – I was talking about criticism of software which does not centre on the software itself, but rather on some combination of the motivations of the people who wrote it, or the particular free software license under which it is published, or the policies of the company, or the nationality of the company behind it,” said Mark Shuttleworth.
|
||||
|
||||
希望结束在这个事件上的所有的讨论以及人们最终将能够一起在和平号上工作, 实际上是崩溃的根源。
|
||||
希望结束在这个事件上的所有的讨论以及人们最终将能够一起在Mir显示服务器上工作, 实际上是崩溃的根源。
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
|
@ -0,0 +1,40 @@
|
||||
欧洲议会:NSA曾要求Linus Torvalds允许他们在Linux中植入后门
|
||||
================================================================================
|
||||
![](http://www.omgubuntu.co.uk/wp-content/uploads/2011/01/DSC01782.jpg)
|
||||
|
||||
*照片中为大神Linus(左)和Benjamin Humphrey(译者注:该小伙儿为本文原文出处‘OMG!Ubuntu!’的联合创始人之一,现已离开OMGUbuntu)!照片摄于2011年*
|
||||
|
||||
美国国家安全局([**NSA**][1])宣称,他们曾经要求Linux的创始人,Linus Torvalds,在GNU/Linux中建立一个他们可以访问的“后门”。
|
||||
|
||||
这绝非谣言,Linus的父亲,Nils Torvalds如此说道。
|
||||
|
||||
作为欧洲议会(MEP)的成员之一,Nils出席了最近关于“欧盟公民监视问题”的委员会质询会议。根据爱德华·斯诺登泄露出的一些NSA文档,委员会对文档中列出的一些公司代表就所谓的“合作”进行了质询。
|
||||
|
||||
同属欧洲议会成员的瑞典盗版党主席Christian Engström就质问微软的发言人,其公司是否曾主动为NSA在他们的系统中植入过“后门”,(译者注:盗版党是一个以废除专利制度、维护公民隐私为宗旨的民间自发政党,最先在瑞典出现,传送门→[盗版党百度百科](http://baike.baidu.com/view/1104760.htm))。之后,Nils Torvalds[说道][2]:
|
||||
|
||||
> 我的长子[Linus Torvalds]也被问到了同样的问题 —— “NSA是否曾要求他植入后门?”,当时他口中回答“No”,但同时却在点头。我的儿子有某种程度上的法律自由,他已经给出了正确的回答…… 每个人都明白,NSA的确曾要求他这么干过!
|
||||
|
||||
如果这段描述让你觉着耳熟,你可以[看下Youtube上关于这一段的视频片段][3]。后来Linus坚称他当时只是开玩笑,[NSA并没有为此找过他][4]。
|
||||
|
||||
**但是,根据11月11号质询会议上的发言看来,他的父亲并不这么想。**
|
||||
|
||||
根据文档,Google、[Yahoo!][5]、Facebook,[的确还有微软][6],都在NSA要求提供“后门”的合作公司之列,这一发现,虽不足以震惊全世界,但事实上,从大局考虑还是有意义的。毕竟,凭什么说NSA不会要求Linus这么做呢?
|
||||
|
||||
Nils并没有解释Linus具体是如何回应的 —— 但我估计,这说明了两个问题,首先我们至少可以肯定的一点是,开源世界一直在努力防范类似事情成为可能;
|
||||
|
||||
其次,如果真的有某些漏洞存在,NSA长长的触手早就已经把你的压箱底私房钱翻个底儿掉了。
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/nsa-ask-linus-torvalds-include-backdoors-linux-father-says-yes
|
||||
|
||||
译者:[Mr小眼儿](http://blog.csdn.net/tinyeyeser) 校对:[Caroline](https://github.com/carolinewuyan)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.nsa.gov/
|
||||
[2]:http://youtu.be/EkpIddQ8m2s?t=3h09m06s
|
||||
[3]:http://www.youtube.com/watch?v=7gRsgkdfYJ8
|
||||
[4]:http://mashable.com/2013/09/19/linus-torvalds-backdoor-linux/
|
||||
[5]:http://www.telegraph.co.uk/technology/internet-security/10459081/Yahoo-to-encrypt-internal-traffic-following-NSA-revelations.html
|
||||
[6]:http://www.bbc.co.uk/news/technology-23285642
|
@ -1,21 +1,21 @@
|
||||
一个有关Adobe密码泄漏的字迷游戏
|
||||
====
|
||||
一个有关**Adobe**公司密码泄漏的字迷游戏现在可以在[http://zed0.co.uk/crossword/][1]上玩咯。这个游戏的作者,创建这个游戏是为了告诉公众容易记忆的密码是非常不安全的,你不应该信任那些公司们会按照最佳实践来存储你的密码,例如Adobe。
|
||||
一个有关**Adobe**公司密码泄漏的字迷游戏现在可以在[http://zed0.co.uk/crossword/][1]上玩咯。作者创建这个游戏的初衷是为了告诉公众容易记忆的密码是非常不安全的,你不应该信任那些公司们会按照所谓最佳实践来存储你的密码,例如Adobe。
|
||||
|
||||
这个字迷游戏使用从Adobe公司泄漏出来的最常见的1000个密码以便于提醒你什么样的密码是不够强壮的,容易被破解。假如你使用的密码就是字迷游戏中的这种密码,而且你还把它作为你的全球通用密码,那么你应该立即更换掉它。这样的密码非常糟糕!赶紧去更换掉它,趁现在还不太晚。
|
||||
这个字迷游戏使用了从Adobe公司泄漏出来的最常见的1000个密码,从而提醒你,什么样的密码是不够强壮的,容易被破解的。假如你使用的密码就是字迷游戏中的这种密码,而且你还把它作为你的全球通用密码,那么你应该立即更换掉它。这样的密码非常糟糕!赶紧去更换掉它,趁现在还不太晚。
|
||||
|
||||
制作了如此有用且好玩的游戏的作者,向人们介绍说,他的灵感来源与[xkcd #1286: Encryptic][2],他还说到吧这些泄漏的密码放出来并不会造成太大的安全隐患,因为很多人很早以前就能猜中这样的密码。
|
||||
至于游戏本身,不但好玩而且有用。游戏作者介绍说,他的灵感来源于[xkcd #1286: Encryptic][2],他还说把这些泄漏的密码放出来并不会造成太大的安全隐患,因为很多人很早以前就能猜中这样的密码。
|
||||
|
||||
你还不知道Adobe公司的云安全事件吗?
|
||||
额,你还不知道Adobe公司的云安全事件?
|
||||
|
||||
不久前,Adobe公司成了网络攻击者的目标。Adobe公司的安全团队发现了一起针对Adobe公司内部网络的老练的攻击,获取了Adobe公司用户的信息以及盗取了数个Adobe公司产品的源代码。根据Adobe公司官方博客上的安全告示,攻击者盗取了Adobe用户的账户ID以及登录密码。但是Adobe公司的安全团队并不认为与账户关联的信用卡信息或者资金账户信息会一并被盗取。
|
||||
不久前,Adobe公司成了网络攻击者的目标。Adobe公司的安全团队发现了一起针对Adobe公司内部网络的复杂攻击,攻击获取了Adobe公司的客户信息并盗取了数个Adobe公司产品的源代码。根据Adobe公司官方博客上的安全告示,攻击者盗取了Adobe用户的账户ID以及登录密码。但是Adobe公司的安全团队并不认为与账户关联的信用卡信息或者资金账户信息会一并被盗取。
|
||||
|
||||
你可以点击[这儿][3]阅读更多有关的安全告示。
|
||||
你可以点击[这儿][3]阅读更多相关的安全公告。
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.unixmen.com/play-crossword-game-adobes-leaked-passwords/
|
||||
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[Mr小眼儿](http://blog.csdn.net/tinyeyeser)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user