mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-01-16 22:42:21 +08:00
[bazz2翻译中]This new worm targets Linux PCs and embedded devices
This commit is contained in:
commit
8523c32944
89
published/11 Basic Linux Interview Questions and Answers.md
Normal file
89
published/11 Basic Linux Interview Questions and Answers.md
Normal file
@ -0,0 +1,89 @@
|
||||
11个Linux基础面试问题
|
||||
================================================================================
|
||||
|
||||
### Q.1: Linux 操作系统的核心是什么? ###
|
||||
- Shell
|
||||
- Kernel
|
||||
- Command
|
||||
- Script
|
||||
- Terminal
|
||||
|
||||
> **答**: 内核(Kernel)是Linux 操作系统的核心。Shell是一个命令行解释器,命令(Command)是针对计算机的指令,脚本(Script)是存储在文件中的命令的集合,终端(Termial)是命令行接口。
|
||||
|
||||
### Q.2: Linus Torvalds 都创建过什么东东? ###
|
||||
- Fedora
|
||||
- Slackware
|
||||
- Debian
|
||||
- Gentoo
|
||||
- Linux
|
||||
|
||||
> **答**: Linux Torvalds 创建了Linux,Linux是所有上述操作系统的核心,同样也是其他一些Linux 操作系统的核心。
|
||||
|
||||
### Q.3: Torvalds,使用C++语言编写了Linux内核的大部分代码,是这样吗? ###
|
||||
|
||||
> **答**: 不! Linux内核包含了12,020,528行代码,其中注释占去了2,151,595 行。因此剩下的9,868,933 行就是纯代码了。而其中7,896,318行都是用C语言写的。
|
||||
|
||||
剩下的1,972,615行则是使用C++,汇编,Perl, Shell Script, Python, Bash Script, HTML, awk, yacc, lex, sed等。
|
||||
|
||||
**注**:代码行数每天都在变动,平均每天超过3,509行代码添加到内核。
|
||||
|
||||
### Q.4: 起初,Linux 是为 Intel X86 架构编写的,但是后来比其他操作系统移植的硬件平台都多,是这样吗 ? ###
|
||||
|
||||
> **答**: 是的,我同意。Linux那时候是为x86机器写的,而且现已移至到所有类型的平台。今天超过90%的超级计算机都在使用Linux。Linux在移动手机和平板电脑领域前景广阔。事实上我们被Linux包围着,远程遥控,太空科学,研究,Web,桌面计算等等,举之不尽。
|
||||
|
||||
### Q.5: 编辑 Linux 内核合法吗? ###
|
||||
|
||||
> **答**: 是的,内核基于GPL发布,任何人都可以基于GPL允许的权限随意编辑内核。Linux内核属于免费开源软件(FOSS)。
|
||||
|
||||
### Q.6: UNIX和Linux操作系统,本质上的不同在哪里?###
|
||||
|
||||
> **答**: Linux操作系统属于免费开源软件,内核是由 Linus Torvalds 和开源社区共同开发的。当然我们不能说UNIX操作系统和免费开源软件(FOSS)无关,BSD 就是基于 FOSS 范畴的 UNIX 的变种。而且大公司如 Apple,IBM,Oracle,HP等,都在为UNIX内核贡献代码。
|
||||
|
||||
### Q. 7: 挑出来一个与众不同的来. ###
|
||||
- HP-UX
|
||||
- AIX
|
||||
- OSX
|
||||
- Slackware
|
||||
- Solaris
|
||||
|
||||
> **答** : Slackware。 HP-UX, AIX, OSX, Solaris 分别是由 HP, IBM, APPLE, Oracle 开发的,并且都是UNIX的变种. Slackware 则是一个Linux操作系统.
|
||||
|
||||
### Q.8: Linux 不会感染病毒吗? ###
|
||||
|
||||
> **答** : 当然会! 这个地球上不存在不会感染病毒的操作系统。但是Linux以迄今为止病毒数量少而著称,是的,甚至比UNIX还要少。Linux榜上有名的病毒只有60-100个,而且没有一个病毒在传播蔓延。Unix粗略估计有85-120个。
|
||||
|
||||
### Q.9: Linux 属于哪种类型的操作系统? ###
|
||||
- 多用户
|
||||
- 多任务
|
||||
- 多线程
|
||||
- 以上所有
|
||||
- 以上都不是
|
||||
|
||||
> **答** : 以上所有。Linux是一个支持多用户,可以同时运行多个进程执行多个任务的操作系统。
|
||||
|
||||
### Q.10: 一般的 Linux 命令的语法格式是: ###
|
||||
- command [选项] [参数]
|
||||
- command 选项 [参数]
|
||||
- command [选项] [参数]
|
||||
- command 选项 参数
|
||||
|
||||
> **答** : Linux 命令的正确语法是, Command [选项] [参数]。
|
||||
|
||||
### Q.11: 挑出来一个与众不同的来. ###
|
||||
|
||||
- Vi
|
||||
- vim
|
||||
- cd
|
||||
- nano
|
||||
|
||||
> **答** : cd 与其他命令不同。Vi,vim和 nano都是编辑器,用于编辑文档,而cd是用于切换目录的命令。
|
||||
|
||||
就这么多了。上述问题你学到手几个?效果如何?我们期待着你的评论。下周,会有新的问题,让我们拭目以待。保持健康,锁定链接,记得来**Tecmint**哦。
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.tecmint.com/basic-linux-interview-questions-and-answers/
|
||||
|
||||
译者:[l3b2w1](https://github.com/l3b2w1) 校对:[jasminepeng](https://github.com/jasminepeng)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -1,9 +1,6 @@
|
||||
九个简单实例教你用uname命令获取Linux操作系统详情
|
||||
|
||||
九个uname命令获取Linux系统详情的实例
|
||||
================================================================================
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/linux-uname-command.png)
|
||||
|
||||
当你在控制台模式下,无法通过“鼠标右键 > 关于”获取操作系统的信息。这时,在Linux下,你可以使用**uname**命令,帮助你完成这些工作。 Uname是**unix name**的缩写。在控制台中实际使用的时候只需键入**uname**。
|
||||
|
||||
当你输入uname不带参数时,它仅仅显示你的操作系统的名字。
|
||||
@ -18,7 +15,7 @@
|
||||
|
||||
### 1. 内核名称 ###
|
||||
|
||||
你可以用**-s**参数,显示内核名称。
|
||||
你可以用**-s**参数,显示内核名称。(译注:可以在其他的类Unix系统上运行这个命令看看,比如mac就会显示Darwin)
|
||||
|
||||
# uname -s
|
||||
|
||||
@ -28,7 +25,7 @@
|
||||
|
||||
### 2. 内核发行版 ###
|
||||
|
||||
如果你想知道你正在使用哪个内核发行版,就可以用**-r**参数
|
||||
如果你想知道你正在使用哪个内核发行版(指不同的内核打包版本),就可以用**-r**参数
|
||||
|
||||
# uname -r
|
||||
|
||||
@ -36,7 +33,7 @@
|
||||
|
||||
### 3. 内核版本 ###
|
||||
|
||||
除一些内核信息外,用**-v**参数uname也能获取更详细的内核版本信息。
|
||||
除一些内核信息外,用**-v**参数uname也能获取更详细的内核版本信息(译注:不是版本号,是指该内核建立的时间和CPU架构等)。
|
||||
|
||||
# uname -v
|
||||
|
||||
@ -56,7 +53,7 @@
|
||||
|
||||
CentOS release 5.10 (Final)
|
||||
|
||||
如果不是基于RedHat的发行版,你可以查看**/et/issue/**文件.类似如下:
|
||||
如果不是基于RedHat的发行版,你可以查看**/etc/issue**文件.类似如下:
|
||||
|
||||
# cat /etc/issue
|
||||
|
||||
@ -74,7 +71,7 @@ i686表明了你用的是32位的操作系统,如果是X86_64则表明你用
|
||||
|
||||
### 6. 硬件平台 ###
|
||||
|
||||
与硬件名称类似,-i参数会显示你的硬件平台。
|
||||
与硬件名称类似,-i参数会显示你的硬件平台(译注:硬件名称i686是属于硬件平台i386系列的)。
|
||||
|
||||
# uname -i
|
||||
|
||||
@ -108,7 +105,7 @@ uname也可以透露你正在运行的操作系统信息,用**-o**参数可以
|
||||
|
||||
以上就是关于uname命令的使用。请敬请期待更多的命令!
|
||||
|
||||
谢谢!
|
||||
谢谢阅读!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
@ -1,4 +1,4 @@
|
||||
Apache OpenOffice vs. LibreOffice 详解
|
||||
Apache OpenOffice 与 LibreOffice 之间的抉择
|
||||
================================================================================
|
||||
> 这两个开源办公套件产品很相似,然而某一个貌似已经开始具有轻微的领先优势……
|
||||
|
||||
@ -10,7 +10,7 @@ Apache OpenOffice vs. LibreOffice 详解
|
||||
|
||||
###具体各程序间的区别###
|
||||
|
||||
LibreOffice和OpenOffice之间的程序大部分都是一样的。例如它俩的Draw,看起来完全没有区别;再说Impress,主要的区别就是LibreOffice最新版支持使用Android设备控制幻灯片放映;除了幻灯片背景以外,两者其他方面没什么不同,都能很好的胜任日常使用,除非有特殊偏好,用户选择哪一款都可以;同样,在Calc电子制表软件中,两者最大的区别就是你可以在LibreOffice里创建数据表格。
|
||||
LibreOffice和OpenOffice之间的程序大部分都是一样的。例如它俩的Draw,看起来完全没有区别;再如Impress,主要的区别就是LibreOffice的最新版支持使用Android设备控制幻灯片放映;除了幻灯片背景以外,两者其他方面没什么不同,都能很好的胜任日常使用,除非有特殊偏好,用户选择哪一款都可以;同样,在Calc电子制表软件中,两者最大的区别就是你可以在LibreOffice里创建数据表单。
|
||||
|
||||
即使在用户最常用的Writer程序中,两者的区别也很小。LibreOffice这边,编辑窗口的底部状态栏现在新包含了一个字词计数器,审阅标签也不再局限于某个单个点,现在可以附加在配图上,另外,LibreOffice终于解决了“脚注无法紧靠对应文本显示”的bug,除此以外,LibreOffice还添加了一个简易搜索栏,与web浏览器上的那种类似,同时,去掉了图形水平线的选项,这个功能过去十几年来几乎从没人用过。
|
||||
|
||||
@ -18,9 +18,9 @@ LibreOffice和OpenOffice之间的程序大部分都是一样的。例如它俩
|
||||
|
||||
一些更明显的区别体现在格式分类与字体支持上。例如,OpenOffice始终支持一些较老的保存格式,像AportisDoc(Palm版)和Pocket Word。另外,它也可以打开.docx格式的文件,但是无法像LibreOffice一样将文档保存为docx格式。
|
||||
|
||||
LibreOffice同样在字体支持方面占有优势。它对多语言和高级排版工艺始终有较好的支持,因此最新发布版本能够支持OpenType这样的现代字体首选格式。更重要的,通过“文件->属性->自体”,你能够将字体嵌入到文档中去,无需任何繁琐操作,就能确保字体的兼容性。
|
||||
LibreOffice同样在字体支持方面占有优势。它对多语言和高级排版工艺始终有较好的支持,因此最新发布版本能够支持OpenType这样的现代字体首选格式。更重要的,通过“文件->属性->字体”,你能够将字体嵌入到文档中去,无需任何繁琐操作,就能确保字体的兼容性。
|
||||
|
||||
这样的特性使得LibreOffice在面对微软Office用户转换格式的时候,得到了决定性的1分。因为通常,OpenOffice和LibreOffice都无法很好处理微软格式的文档,特别是那些又有文字表格又有图形对象再加上复杂格式的文档。因此,如果你要共享复杂一些的文档,例如宣传手册,最好使用PDF格式,而不是Open文档格式(ODF)。
|
||||
这样的特性使得LibreOffice在面对微软Office用户转换格式的时候,得到了决定性的1分。因为通常OpenOffice和LibreOffice都无法很好处理微软格式的文档,特别是那些又有文字表格又有图形对象再加上复杂格式的文档。因此,如果你要共享复杂一些的文档,例如宣传手册,最好使用PDF格式,而不是Open文档格式(ODF)。
|
||||
|
||||
然而,如果你确实需要转换一些本地或微软的文档,LibreOffice拥有一些决定性优势。它不仅能读写大多数微软文档,而且它对字体替换处理的很好,而这正是文档格式转换时要面临的一个主要问题。尽管其他问题仍有不少,例如在特性实现上有所不同,但LibreOffice在处理微软Office文档时确实应该是一个更可靠的选择。
|
||||
|
||||
@ -32,35 +32,35 @@ OpenOffice和LibreOffice两者都能很好的支持插件扩展,想要加强
|
||||
|
||||
以上这些扩展在OpenOffice下同样可用。与前者不同的是,使用OpenOffice时,你首先需要知道有这些扩展,然后专门去找到它们,这样一来,很大程度上限制了新用户对很多功能的体验。因此,当OpenOffice在最近发布的版本中尝试努力提供更好用的现代模板和剪贴画时,这样的疏漏就成了一个非常严重的不足,特别是当它很容易弥补的时候,(更何况LibreOffice同时也提供了自家最新的模板和剪贴画)。
|
||||
|
||||
###接口的更新换代###
|
||||
###界面的更新换代###
|
||||
|
||||
在OpenOffice.org属于Sun和Oracle的12年日子里,它的代码和接口就如同许多优秀特性一样,几乎被完全忽略。如今的结果就是,OpenOffice和LibreOffice作为套件产品,都各自拥有一整套优秀的功能,但是它们的接口却仍停留在上世纪90年代的水平。只有表面上的一些老旧接口被移除,其实大部分仍然亟待更新。
|
||||
在OpenOffice.org属于Sun和Oracle的12年日子里,它的界面和许多的其它功能一样,几乎被丢在遗忘的角落。如今的结果就是,OpenOffice和LibreOffice作为套件产品,都各自拥有一整套优秀的功能,但是它们的界面却仍停留在上世纪90年代的水平。只有表面上的一些老旧界面被移除,其实大部分仍然亟待更新。
|
||||
|
||||
在最新的发布中,OpenOffice试图彻底更新自己的接口,但是却由于“导航栏”而被迫受阻。导航栏这一特性,如今已经成为“用户体验”的标签,在LibreOffice中,你可以通过“工具->选项->LibreOffice->高级”找到关于它的设置。
|
||||
在最新的发布中,OpenOffice试图彻底更新自己的界面的努力主要集中在“边栏”上。这一特性,你可以通过“工具->选项->LibreOffice->高级”打开,它被标记为“试验性”的。
|
||||
|
||||
导航栏是一组功能集合,主要用于用户手动格式化。【【【这一特性鼓励用户使用样式,就代码编写人员的逻辑来说,这一点很容易被忽略。(这一句各种纠结不明白啥意思啊啊啊啊啊=。=)】】】然而,它最大的好处是,大大简化了字符和图形的格式化标签页,例如原本所有应用程序中都有的加粗选项,以及电子表格单元格中的“格式”标签页。幸运的是,导航栏还重新定义了菜单和样式对话框窗口的概念。
|
||||
边栏是一组功能集合,主要用于用户手动格式化。这一特性便于用户应用样式,因为如果用户关注在文章逻辑上,很容易忽略编排的样式。然而,最好的是,它大大简化了格式化字符和段落的选项卡,例如所有应用程序中都有的边框选项卡,以及电子表格单元格中的“格式”选项卡。幸运的是,边栏还重新定义了菜单和样式对话框窗口的概念。
|
||||
|
||||
LibreOffice还拥有更多的“冒险创新精神”,例如,与导航栏类似,Impress中的任务面板,摘要显示了大多数幻灯片设计步骤中要用到的选项卡名称。
|
||||
LibreOffice还拥有更多的“冒险创新精神”,例如,与边栏类似,Impress中的任务面板,摘要显示了大多数幻灯片设计步骤中要用到的选项卡名称。
|
||||
|
||||
在Writer编辑窗口中,LibreOffice的大部分接口已经完成改进,窗口底部的状态栏中,添加了一个字词计数器,原本负责管理和编辑模板的狭窄子菜单,如今也已被高端大气上档次的流线形按钮所取代。
|
||||
在Writer编辑窗口中,LibreOffice的大部分界面已经完成改进,窗口底部的状态栏中,添加了一个字词计数器,原本负责管理和编辑模板的狭窄子菜单,如今也已被高端大气上档次的流线形按钮所取代。
|
||||
|
||||
更明显的,LibreOffice中的主文本框架被精减为四个边角的十字准线。同样的,页眉和页脚也默认改为不可见,要想找到它们,四个小直角标明了它们的边界位置,点击就可以出现。
|
||||
|
||||
不太成功的一点改进是LibreOffice中管理页眉页脚的编辑窗口。除了【【【使用标签页鼓励手动格式化这一事实(和上面那纠结的一句一样,这是什么意思啊啊啊啊啊=。=)】】】,比较恼人的是,当在新一页的第一行输入的时候,已经输入的一部分总是会自动隐藏。
|
||||
不太成功的一点改进是LibreOffice中管理页眉页脚的编辑窗口中的选项卡。虽然这个选项卡事实上是为了便于手动调整格式,但是让人郁闷的是,当在新一页的第一行输入的时候,已经输入的一部分总是会自动隐藏起来。
|
||||
|
||||
尽管LibreOffice还重组了许多窗口选项,但是这些努力远没有结束。有时,开发人员会让LibreOffice变成传统框架与现代极简艺术的混合体,看起来有些不伦不类,但是,至少LibreOffice正在尝试着解决长期搁置的接口问题,而这些,OpenOffice甚至都还没来得急意识到。
|
||||
尽管LibreOffice还重组了许多对话窗口的选项,但是这些努力远没有结束。有时,开发人员会让LibreOffice变成传统框架与现代极简艺术的混合体,看起来有些不伦不类,但是,至少LibreOffice正在尝试着解决长期搁置的界面问题,而这些,OpenOffice甚至都还没来得及意识到。
|
||||
|
||||
###做出选择###
|
||||
|
||||
如果文档不超过2到3页,一般用户可能需要时常检查标题栏看自己用的是LibreOffice还是OpenOffice。然而,对于进阶用户而言,LibreOffice目前可能更有优势。优势并不算大,但是很明显。
|
||||
如果文档不超过2到3页,一般用户可能会时常看看标题栏看自己用的是LibreOffice还是OpenOffice。然而,对于进阶用户而言,LibreOffice目前可能更有优势。优势并不算大,但是很明显。
|
||||
|
||||
这一优势的确很难被忽略。原因首先,在LibreOffice已经确立了好几个月时间优势的情况下,OpenOffice却仍在专注于管理权和代码审计,这些工作也许有帮助也有必要,但是普通用户更愿意看到他们对代码做出更多的改进工作。
|
||||
这一优势的确很难被忽略。原因首先是,在LibreOffice已经确立了好几个月时间优势的情况下,OpenOffice却仍在专注于管理权和代码审计,这些工作也许有帮助,也有必要,但是普通用户更愿意看到他们对代码做出更多的改进工作。
|
||||
|
||||
其次,LibreOffice的开发人员大部分是[Go-oo][3]的前成员,这是OpenOffice.org的一个非官方项目组,以“快速完善”为目标。当Apache OpenOffice项目组还在筹建中的时候,LibreOffice就已经吸引了全世界酷爱编程、热衷变革的天才们。
|
||||
其次,LibreOffice的开发人员大部分是[Go-oo][3]的前成员,这是OpenOffice.org的一个非官方分支,以“快速完善”为目标。当Apache OpenOffice项目组还在筹建中的时候,LibreOffice就已经吸引了全世界酷爱编程、热衷变革的天才们。
|
||||
|
||||
没有人做过准确的调查,但是我印象中,当OpenOffice.org社区分家的时候,大部分富于冒险创新精神的贡献者都选择了LibreOffice,同时,有一些半独立的文档小组,在谨慎地同时为两个项目工作。
|
||||
|
||||
其实,LibreOffice最重要的优势或许可以称之为“吸血许可证”。怎么个意思呢?就是OpenOffice的Apache许可证兼容LibreOffice的Lesser GNU通用公共许可证,但是LibreOffice的Less GNU通用公共许可证却不兼容OpenOffice的Apache许可证。换句话说,LibreOffice可以随意自由地从OpenOffice“借”代码,但是OpenOffice却根本无法从LibreOffice“借”到任何东西。严格地讲,如果想从LibreOffice“借”来某个功能,OpenOffice必须完全依靠“净室(clean-room)”来实现。
|
||||
其实,LibreOffice最重要的优势或许可以称之为“吸血许可证”。怎么个意思呢?就是OpenOffice的Apache许可证兼容LibreOffice的Lesser GNU通用公共许可证,但是LibreOffice的Less GNU通用公共许可证却不兼容OpenOffice的Apache许可证。换句话说,LibreOffice可以随意自由地从OpenOffice“借”代码,但是OpenOffice却根本无法从LibreOffice“借”到任何东西。严格地讲,如果想从LibreOffice“借”来某个功能,OpenOffice必须完全从头实现。
|
||||
|
||||
这一情况有可能会改变,尤其是当Apache OpenOffice比LibreOffice拥有更高的知名度的时候,然而LibreOffice的支持者们正在迅速扩张,它的社区非常活跃,短短3年间所做的要比OpenOffice.org十二年来做的还要多。
|
||||
|
||||
@ -70,7 +70,7 @@ LibreOffice还拥有更多的“冒险创新精神”,例如,与导航栏类
|
||||
|
||||
via: http://www.datamation.com/applications/apache-openoffice-vs.-libreoffice-1.html
|
||||
|
||||
译者:[Mr小眼儿](http://blog.csdn.net/tinyeyeser) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
译者:[Mr小眼儿](http://blog.csdn.net/tinyeyeser) 校对:[wxy](https://github.com/wxy)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
@ -0,0 +1,39 @@
|
||||
Canonical Dev称Linux Mint“脆弱”,不要将其用于网银
|
||||
================================================================================
|
||||
**一位Canonical公司[工程师建议][1]:基于Ubuntu的流行操作系统Linux Mint用户不应该将其用于网银 。**
|
||||
|
||||
Mint决定禁止更新那些存在已知安全问题的安装包 - 从内核、浏览器到启动加载器和Xorg显示服务 - 这样给用户带来了一个“脆弱的系统” ,Oliver Grawert说。
|
||||
|
||||
> “不去马上整合Ubuntu提交的那些修正,而是拒绝这些软件包的(安全)更新。我要说,强制保持一个有缺陷的内核、浏览器或xorg,而不是允许安装更新补丁,这会变成一个易受攻击的系统,(原文如此)”。
|
||||
>
|
||||
> “就我个人而言,我不会用它做网银操作。”
|
||||
|
||||
当然不只有Grawert认为Mint在安全意识上的低下。Mozilla贡献者兼前Ubuntu成员 **Benjamin Kerensa** 也有同样的看法:
|
||||
|
||||
> “目前还不清楚为什么Linux Mint禁止所有的安全更新。我可以说,Mint需要花好几个月才能得到一个Firefox的修正版,而Ubuntu和Debian已经早在他们的包上打了安全补丁。
|
||||
>
|
||||
> 这将置Linux Mint用户处于危险中,也是我从来不建议任何人将Linux Mint作为一种替代Ubuntu的系统的主要原因之一。”
|
||||
|
||||
Oliver Grawert是一位可靠的撰稿人。作为一位Canonical公司下的Ubuntu工程师,他比大多数人更了解自己在说什么。
|
||||
|
||||
那么Mint的用户存在实际风险么?
|
||||
|
||||
半对半错。Mint开发商坚决拒绝更新的现有软件包中大部分的安全“漏洞”(这个词更好一些)都是有记录和已知的,虽然这些漏洞很少被利用。因此对用户构成的“实际风险”仍然存在,至少现在,在理论上是很有可能的。
|
||||
|
||||
也就是说,没有发生**已知的**由于使用Mint发行版(或任何其他基于Ubuntu的未打补丁的发行版)并被通过利用Grawert引用的Ubuntu开发邮件列表上的漏洞造成身份盗窃乃至更糟的事故的情况。
|
||||
|
||||
但是,仅仅因为迄今为止没有人曾经钻进这扇半掩的窗户,并不能说明其他人永远不会这么做。
|
||||
|
||||
**看到Ubuntu持续被提及有关自身的(主要是理论上)隐私问题后,至少它还穿着另外一只鞋子,我们可喜的看到它对用户安全的强烈关注正在延伸至其他发行版上。**
|
||||
|
||||
*请注意:我们已经向Linux Mint征求意见及澄清,答复将在后继文章发表。*
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/canonical-dev-dont-use-linux-mint-online-banking-unsecure
|
||||
|
||||
译者:[whatever1992](https://github.com/whatever1992) 校对:[wxy](https://github.com/wxy)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2013-November/014770.html
|
@ -1,22 +1,27 @@
|
||||
已部署的核心算法
|
||||
那些算法在哪里?
|
||||
================================================================================
|
||||
在我看来,一个系统背后主要驱动的算法更容易在非算法课程上找到,同理,目前的程序更容易在应用数学而不是理论数学中找到。在讲座中,很少有实际问题有一个抽象问题的精确就够。追根究底地说,我认为没有理由为何流行算法课程资料。诸如Strassen乘法,AKS素性测试、或者Moser-Tardos算法与底层实际问题,如实现视频数据库、优化的编译器、操作系统、网络拥堵控制系统或者其他系统有相关。这些课程的价值是学习利用错综复杂的方法找出问题的结构而找出有效的解决方案。高级算法也满足了一些简单算法,这些分析并不平凡。正是由于这个原因,我不会不理会简单随机算法或者PageRank。
|
||||
|
||||
我想你可以选择任何一个大型软件并会内部实现了发现基础和高级的算法。作为一个研究案例,我选择了Linux内核,并会示例一些Chromium里面的例子。
|
||||
本文来源于一篇stackexchange的[问题][101]回答。提问者问到,我们在计算机科学和数学课程里面学习到的那些算法,到底在什么地方用到了?结果[Vijay D][103]给出一个洋洋洒洒的[深入回答][102],得到了提问者和众多围观。我们将这篇回答翻译过来以飨读者。
|
||||
|
||||
[Vijay D][103]写到:
|
||||
|
||||
在我看来,一个系统背后主要发挥作用的算法更容易在非算法课程上找到,这和应用数学中的成果比理论数学中更容易出现在应用中是一个道理。在讲座中,很少有实际问题能够精确匹配到一个抽象问题。归根结底,我认为没有理由让流行的算法课程,诸如Strassen乘法,AKS素性测试、或者Moser-Tardos算法与底层实际问题,如实现视频数据库、优化的编译器、操作系统、网络拥堵控制系统或者其他系统相关。这些课程的价值是学习利用错综复杂的方法发现问题的脉络而找出有效的解决方案。高级算法和简单算法的分析都不简单。正是由于这个原因,我不会忽略简单随机算法或者PageRank。
|
||||
|
||||
我想你可以选择任何一个大型软件,并在内部找到它所采用的基础和高级的算法。作为一个研究案例,我选择了Linux内核,并会示例一些Chromium里面的例子。
|
||||
|
||||
### Linux内核中的基本数据结构和算法 ###
|
||||
|
||||
链接在这里([source code on github][1])。
|
||||
Linux内核([源代码的链接在github][1])。
|
||||
|
||||
1.[链表][2], [双向链表][3], [无锁链表][4]。
|
||||
1.[链表][2]、[双向链表][3]、[无锁链表][4]。
|
||||
|
||||
2.[B+ 树][5]的注释会告诉你无法在教科书上找到的东西。
|
||||
2.[B+ 树][5],这是一些你无法在教科书上找到的说明。
|
||||
|
||||
> 一个相对简单的B+树的实现。我把它作为一个学习练习来帮助理解B+树是如何工作的。这同样也被证明是有用的。
|
||||
|
||||
> 一个相对简单的B+树的实现。我把它作为一个学习练习来帮助理解B+树是如何工作的。这同样也被证明是有用的。
|
||||
>
|
||||
> ...
|
||||
>
|
||||
> 一个技巧在教科书中并不常见。最小的值在右侧而不是在左侧。所有在一个节点里用到的槽都在左侧,所有没有用到的槽包含了空值(NUL)。大多数操作只简单地遍历所有的槽一次并在第一个空值时(NUL)终止。
|
||||
|
||||
> 一个在教科书中并不常见的技巧。最小的值在右侧而不是在左侧。所有在一个节点里用到的槽都在左侧,所有没有用到的槽包含了空值(NUL)。大多数操作只简单地遍历所有的槽一次并在第一个空值时(NUL)终止。
|
||||
|
||||
3.[优先排序列表][6] 用于 [互斥量][7]、[驱动][8]等等。
|
||||
|
||||
@ -26,29 +31,29 @@
|
||||
|
||||
6.[根树][12]用于[内存管理][13],NFS相关查询和网络相关功能。
|
||||
|
||||
> 根树一个通用的用处是存储指针到结构页中。
|
||||
> 根树的一个通用的用处是存储指针到结构页中。
|
||||
|
||||
7.[优先级堆][14],是一个字面上的教科书实现,用于[cgroup][15]。
|
||||
7.[优先级堆][14],如其名称的教科书实现,用于[cgroup][15]。
|
||||
|
||||
> 第七章中,简单的基于CLR的只插入,含有指针的静态大小优先级堆
|
||||
> 《简单的基于CLR的只插入的,含有指针的定长优先级堆》第七章
|
||||
|
||||
8.[哈希函数][16],参考了Knuth和一篇论文。
|
||||
|
||||
> Knuth建议约黄金比例的素数通过对乘法散列机器字的最大整数表示。Chuck Lever验证了该技术的有效性:
|
||||
> Knuth建议,用乘法哈希的机器字来表示接近黄金比例的素数的最大整数。Chuck Lever验证了该技术的有效性:
|
||||
>
|
||||
> [http://www.citi.umich.edu/techreports/reports/citi-tr-00-1.pdf][17]
|
||||
>
|
||||
> 这些素数的选择是位稀疏的,他们可以通过移位和加法操作,而不必使用乘法器,乘法器是很慢的。
|
||||
|
||||
9.一部分代码,比如[这个驱动][18],实现了他们自己的哈希函数。
|
||||
9.有的代码,比如[这个驱动][18],实现了他们自己的哈希函数。
|
||||
|
||||
> 哈希函数使用了一种旋转哈希算法
|
||||
> 使用了一种旋转哈希算法的哈希函数
|
||||
>
|
||||
> Knuth, D. 计算机程序设计艺术, 卷 3: 排序与搜索, 第6.7章. Addison Wesley, 1973
|
||||
> Knuth, D. 《计算机程序设计艺术, 卷 3: 排序与搜索》, 第6、7章. Addison Wesley, 1973
|
||||
|
||||
10.[哈希表][19]用于实现[inode][20],[文件系统完整性检测][21]等等。
|
||||
10.[哈希表][19]用于实现[inode][20]、[文件系统完整性检测][21]等等。
|
||||
|
||||
11.[位数组][22]用于处理标志位、中断等等。并在Knuth的卷4中阐述。
|
||||
11.[位数组][22]用于处理标志位、中断等等。并在Knuth那本书的卷4中阐述。
|
||||
|
||||
12.[信号量][23]和[自旋锁][24]
|
||||
|
||||
@ -58,49 +63,49 @@
|
||||
|
||||
15.[深度优先搜索][29]被广泛地用于[目录配置中][30]。
|
||||
|
||||
> 执行一个修改过的遍历深度优先的命名空间树,以指定的start_handle节点开始以及结束。回调函数会在任何一个参数匹配的节点被发现时被调用。如果回调函数返回了一个非0值,搜索将会激励结束并且将返回值给调用者。
|
||||
> 执行一个修改过的命名空间树的深度优先遍历,以指定的start_handle节点开始(及结束)。回调函数会在任何一个参数匹配的节点被发现时被调用。如果回调函数返回了一个非0值,搜索将会立即终止并且将其返回给调用者。
|
||||
|
||||
16.[广度有限搜索][31]用于检测运行时锁定的正确性。
|
||||
16.[广度优先搜索][31]用于检测运行时锁定的正确性。
|
||||
|
||||
17.链表中的[归并排序][32]用于[垃圾收集][33],[文件系统管理][34]等等。
|
||||
17.链表中的[归并排序][32]用于[垃圾收集][33]、[文件系统管理][34]等等。
|
||||
|
||||
18.[冒泡排序][35]在一个驱动库中也是一个令人惊讶的实现。
|
||||
18.[冒泡排序][35]在一个驱动库中也有一个令人惊讶的实现。
|
||||
|
||||
19.[Knuth-Morris-Pratt 字符串匹配][36],
|
||||
|
||||
> 根据Knuth、Morris和Pratt [1]实现了一个线性时间的字符串匹配算法。他们的算法避免了转换函数的显式地计算DELTA。对于长度为n的文本,其匹配时间是O(n),对于长度为m的模式(pattern),仅使用一个辅助函数PI[1 . .m],预先计算模式的时间为O(m)。数组PI允许转换函数DELTA被实时有效地计算。粗略地说,对于任何状态"q"= 0,1,…、m和在SIGMA中的任何字符"a",PI["q"]的值包含的信息是独立的"a"并需要计算DELTA("q","a") 2.既然PI只有m个记录,而DELTA有O(m |SIGMA|)个记录,在预处理时间计算PI而不是DELTA的时候,我们可以节省一个因数|SIGMA|
|
||||
> 根据Knuth、Morris和Pratt\[1\]实现了一个线性时间的字符串匹配算法。他们的算法避免了转换函数的显式地计算DELTA。对于长度为n的文本,其匹配时间是O(n),对于长度为m的模式(pattern),仅使用一个辅助函数PI[1 . .m],预先计算模式的时间为O(m)。数组PI允许转换函数DELTA被实时有效地计算。粗略地说,对于任何状态"q"= 0,1,…、m和在SIGMA中的任何字符"a",PI["q"]的值包含的信息是独立的"a"并需要计算DELTA("q","a") \[2\]。既然PI只有m个记录,而DELTA有O(m |SIGMA|)个记录,在预处理时间计算PI而不是DELTA的时候,我们可以节省一个因数|SIGMA|
|
||||
>
|
||||
> [1] Cormen, Leiserson, Rivest, Stein,算法介绍,第二版,MIT出版社
|
||||
> \[1\] Cormen, Leiserson, Rivest, Stein,算法介绍,第二版,MIT出版社
|
||||
>
|
||||
> [2] 见有限自动机原理
|
||||
> \[2\] 见有限自动机原理
|
||||
|
||||
20.[Boyer-Moore 模式匹配][37]是在找替代品时的参考和建议。
|
||||
|
||||
> 实现了Boyer-Moore字符串匹配算法:
|
||||
>
|
||||
> [1] 一个快速的字符串搜索算法,R.S. Boyer and Moore.计算机通信协会,20(10), 1977, pp. 762-772. [http://www.cs.utexas.edu/users/moore/publications/fstrpos.pdf][38]
|
||||
> \[1\] 《一个快速的字符串搜索算法》,R.S. Boyer and Moore.计算机通信协会,20(10), 1977, pp. 762-772. [http://www.cs.utexas.edu/users/moore/publications/fstrpos.pdf][38]
|
||||
>
|
||||
> [2] 准确的字符串匹配算法手册,Thierry Lecroq, 2004 [http://www-igm.univ-mlv.fr/~lecroq/string/string.pdf][39]
|
||||
> \[2\] 《准确的字符串匹配算法手册》,Thierry Lecroq, 2004 [http://www-igm.univ-mlv.fr/~lecroq/string/string.pdf][39]
|
||||
>
|
||||
> 注:由于Boyer-Moore(BM)从右到左搜索匹配,仍然有可能匹配分布在多个块,在这种情况下该算法不会找到任何巧合。
|
||||
> 注:由于Boyer-Moore(BM)从右到左搜索匹配,仍然有可能匹配分布在多个块,在这种情况下该算法并没有优势。
|
||||
>
|
||||
> 如果你愿意确保这样的事情永远不会发生,那使用Knuth-Pratt-Morris(KMP)实现。总之,根据您的设置适当地选择字符串搜索算法。
|
||||
> 如果你希望确保这样的事情永远不会发生,那使用Knuth-Pratt-Morris(KMP)实现。总之,根据您的设置适当地选择字符串搜索算法。
|
||||
>
|
||||
> 如果你正在用文本搜索器进行过滤,NIDS或任何类似的注重安全的目的,那么使用KMP。否则,如果你真的关心性能,并且你对数据包进行分类以使用服务质量(QoS)政策,且你不介意匹配可能分布分散,那么用BM。
|
||||
> 如果你正在用文本搜索器进行过滤,NIDS或任何类似的注重安全的目的,那么使用KMP。否则,如果你真的关心性能,并且你对数据包进行分类以使用服务质量(QoS)政策,当你不介意匹配可能分布分散,那么用BM。
|
||||
|
||||
### Chromium 浏览器中的数据结构和算法 ###
|
||||
|
||||
链接在这里([source code on Google code][40])。我只会列出一部分。我建议使用搜索来找到你最喜欢的算法或者数据结构。
|
||||
Chromium的([源代码在 Google code][40])。我只会列出一部分。我建议使用搜索来找到你最喜欢的算法或者数据结构。
|
||||
|
||||
1.[伸展树][41]。
|
||||
|
||||
> The tree is also parameterized by an allocation policy (Allocator). The policy is used for allocating lists in the C free store or the zone; see zone.h.
|
||||
> 这个树通过分配策略(分配器)参数化。这个策略用于C的可用存储区的列表分配,参见zone.h。
|
||||
|
||||
2.[Voronoi diagrams][42]用于一个示例。
|
||||
2.[Voronoi算法][42]用于一个示例。
|
||||
|
||||
3.[基于Bresenham的标志算法][43]
|
||||
3.[基于Bresenham算法的选项卡][43]
|
||||
|
||||
也有这样的第三方的数据结构和算法包含在Chromium代码中。
|
||||
在Chromium的第三方代码里面也有如下的数据结构和算法。
|
||||
|
||||
1.[二叉树][44]
|
||||
|
||||
@ -108,51 +113,53 @@
|
||||
|
||||
> Julian Walker的总结
|
||||
>
|
||||
> 红黑树是有趣的野兽。他们被认为比AVL树(它们的直接竞争对手)简单,乍一看这似乎是由于插入是一项轻松的乐事。然而,当你开始玩删除算法,红黑树变得非常棘手。然而, 平衡物增加了复杂性,插入和删除可以使用单通道,实现自上而下的算法。这与AVL树情况不一样,只能写自顶向下插入算法。删除从AVL树需要自下而上的算法。
|
||||
> 红黑树是一个有趣的小东西。他们被认为比AVL树(它们的直接竞争对手)简单,乍一看这似乎是由于插入是一项轻松的乐事。然而,当你开始删除时,红黑树变得非常棘手。然而,通过复杂性的平衡,插入和删除可以使用单通道,实现自上而下的算法。这与AVL树情况不一样,插入只能自顶向下,删除则需要自下而上。
|
||||
|
||||
> ...
|
||||
>
|
||||
> 红黑树是很流行的,因为大多数数据结构都有一个古怪的名字。比如,在Java和c++库映射结构通常用红黑树实现。红黑树的速度也与AVL树相当。而AVL树平衡不是很好,需要保持平衡的工作红黑树通常更好。有一些误解被流传,但在大多数情况下对红黑树的宣传是准确的。
|
||||
> 红黑树是很流行的,像大多数数据结构一样有一个古怪的名字。比如,在Java和c++库映射结构通常用红黑树实现。红黑树的速度也与AVL树相当。而AVL树平衡性不是很好,需要保持平衡的话红黑树通常更好。有一些流传的误解,但在大多数情况下对红黑树的宣传是准确的。
|
||||
|
||||
3.[AVL 树][46]
|
||||
|
||||
4.[Rabin-Karp字符串匹配][47]用于比较。
|
||||
|
||||
5.[计算机器人后缀][48]
|
||||
5.[自动机后缀的计算][48]。
|
||||
|
||||
6.由Apple公司实现的[布隆过滤器][49]
|
||||
6.由Apple公司实现的[bloom过滤器][49]。
|
||||
|
||||
7.[Bresenham 算法][50].
|
||||
7.[Bresenham 算法][50]。
|
||||
|
||||
### 编程语言库 ###
|
||||
|
||||
我想这个问题值得思考。编程语言设计者们认为这值得花一些工程师时间和精力来实现这些数据结构和算法,这样其他人你不必这么做了。库的存在是我们可以在一些用C写的软件,但比Java少,重新实现了基础数据结构的部分原因。
|
||||
我想这个问题值得思考。编程语言设计者们认为值得花一些工程师的时间和精力来实现这些数据结构和算法,这样其他人就不必这么做了。这些库是我们在JAVA里面比C更少的发现需要重新实现基本数据结构的部分原因。
|
||||
|
||||
1.[C++ STL][51]包含了链表、栈、队列、map、向量和对[排序][52]、[搜索和堆操作][53]算法。
|
||||
1.[C++ STL][51]包含了链表、栈、队列、映射、向量和[排序][52]、[搜索和堆操作][53]算法。
|
||||
|
||||
2.[Java API][54]易于扩展的并且越来越多。
|
||||
|
||||
2.[Java API][54]是非常广阔的并且覆盖了更多。
|
||||
3.[Boost C++ 库][55]包含了像 Boyer-Moore以及Knuth-Morris-Pratt字符串匹配算法。
|
||||
|
||||
### 分配和调度算法 ###
|
||||
|
||||
我发现这些很有趣,因为即使他们被称为启发式,您使用的策略规定了算法类型和需要的数据结构,因此,所以需要人们知道栈和队列。
|
||||
我发现这些很有趣,因为即使他们被称为启发式,您使用的策略规定了算法类型和需要的数据结构,因此,所以需要人们知道栈和队列。
|
||||
|
||||
1.最近最少使用算法可以用不同的方法实现。Linux内核有一种[基于列表的实现][56]。
|
||||
1.最近最少使用(LRU)算法可以用不同的方法实现。Linux内核有一种[基于列表的实现][56]。
|
||||
|
||||
2.其他的还有先入先出、最常使用、和轮循。
|
||||
2.其他的还有先入先出(FIFO)、最常使用和轮询。
|
||||
|
||||
3.FIFO的一个变种用于VAX/VMS系统。
|
||||
|
||||
4.[Richard Carr][58]的[时钟算法][57]用于Linux中的页面替换。
|
||||
|
||||
5.Intel i860处理器是一种随即替代策略。
|
||||
5.Intel i860处理器是一种随机替代策略。
|
||||
|
||||
6.[自适应置换高速缓存][59]用于一些IBM存储控制器中,也曾经用于PostgreSQL中([虽然仅仅因为一些专利问题][60])。
|
||||
|
||||
7.Knuth在计算机程序设计艺术,卷1中讨论过的[Buddy内存分配算法][61]内用于Linux内核中,jemalloc并发分配器被用于FreeBSD和[facebook][62]中。
|
||||
7.Knuth在《计算机程序设计艺术 卷1》中讨论过的[Buddy内存分配算法][61]内用于Linux内核中,jemalloc并发分配器被用于FreeBSD和[facebook][62]中。
|
||||
|
||||
### *nix系统核心工具 ###
|
||||
|
||||
1.*grep*和*awk*同时实从正则表达式中实现NFA的Thompson-McNaughton-Yamada构造,这显然击败了[Perl的实现][63]。
|
||||
1.*grep*和*awk*同时从正则表达式中实现NFA的Thompson-McNaughton-Yamada构造,显然[这甚至击败了Perl的实现][63]。
|
||||
|
||||
2.*tsort*实现了拓扑排序。
|
||||
|
||||
@ -162,31 +169,31 @@
|
||||
|
||||
5.Unix上的crypt(1)实现了一个在Enigma机器上的不同加密算法。
|
||||
|
||||
6.[*Unix diff*][66]由Doug McIllroy实现,基于和James Hunt合作编写的圆形。它比用于计算Levenshtein距离的标准动态规划算法执行地更好。[Linux 版本][67]计算最短编辑距离。
|
||||
6.[*Unix diff*][66]由Doug McIllroy实现,基于和James Hunt合作编写的原形。它比用于计算Levenshtein距离的标准动态规划算法执行地更好。[Linux 版本][67]计算最短编辑距离。
|
||||
|
||||
### 加密算法 ###
|
||||
|
||||
这可能回事一个非常长的列表。加密算法在所有执行安全通信和交易的程序中都有实现。
|
||||
这本是一个非常长的列表。加密算法在所有执行安全通信和交易的程序中都有实现。
|
||||
|
||||
1.[Merkle 树][68],特别是 Tiger Tree Hash变种,被用于点对点应用,比如[GTK Gnutella][69]和[LimeWire][70]。
|
||||
|
||||
2.[MD5][71]被用于提供软件包的校验和并被用于在*nix系统上的完整性检测(([Linux 实现][72])),同样也在Windows和OSX中支持。
|
||||
2.[MD5][71]被用于提供软件包的校验和并被用于在*nix系统上的完整性检测([Linux 实现][72]),同样也支持Windows和OSX。
|
||||
|
||||
3.[OpenSSL][73]实现了很多加密算法包括AES、Blowfish、DES、SHA-1、SHA-2、RSA、DES等等
|
||||
3.[OpenSSL][73]实现了很多加密算法包括AES、Blowfish、DES、SHA-1、SHA-2、RSA、DES等等。
|
||||
|
||||
### 编译器 ###
|
||||
|
||||
1.[LALR 解析][74]用yacc和bison实现。
|
||||
1.[LALR 解析][74]在yacc和bison实现。
|
||||
|
||||
2.支配算法被用于大多数基于SSA形式的编译器优化。
|
||||
|
||||
3.lex和flex编译正则表达式成为NFA。
|
||||
3.lex和flex将正则表达式编译为NFA。
|
||||
|
||||
### 压缩和图像处理 ###
|
||||
|
||||
1.用于GIF图片格式的[Lempel-Ziv][75]算法用图形操作程序实现,从*unix工具转化到复杂的程序。
|
||||
1.用于GIF图片格式的[Lempel-Ziv][75]算法在图像处理程序中实现,从*unix工具转化到复杂的程序。
|
||||
|
||||
2.行程长度编码用于产生PCX文件(用于原始的画笔程序),是被压缩的BMP和TIFF文件。
|
||||
2.行程长度编码用于产生PCX文件(用于原来的画笔程序),它是被压缩的BMP和TIFF文件。
|
||||
|
||||
3.小波压缩是JPEG2000的基础,所以所有生成JPEG2000文件的数码相机会支持这个算法。
|
||||
|
||||
@ -194,15 +201,15 @@
|
||||
|
||||
### 冲突驱动语句学习算法 (CDCL) ###
|
||||
|
||||
自2000以来,SAT求解器在工业标准的运行时间(通常是硬件工业,虽然其他地方也被使用)以近乎指数的方式每年下跌。这发展中很重要的一部分是冲突驱动语句学习算法,它结合了Davis Logemann和Loveland在约束规划和人工智能研究中关于语句学习的原始论文中的布尔约束传播算法。特定地,工业造型,SAT被认为是一个简单的问题([见这个讨论][77])。对我而言,这个一个最近最好的成功故事因为它结合了这几年算法的前进推广、聪明的工程理念、实验性的评估、齐心协力地解决一个问题。[Malik and Zhang的CACM文章][78]值得阅读。这个算法在许多大学中教授(我参加了4个地方都是如此),但是通常在一个逻辑或者形式方法课上。
|
||||
自2000年以来,SAT求解器在工业标准的运行时间(通常是硬件工业,虽然其他地方也被使用)以近乎指数的方式每年下跌。这发展中很重要的一部分是冲突驱动语句学习算法,它结合了Davis Logemann和Loveland在约束规划和人工智能研究中关于语句学习的原始论文中的布尔约束传播算法。特定地,工业造型,SAT被认为是一个简单的问题([见这个讨论][77])。对我而言,这个一个最近最好的成功故事,因为它结合了这几年算法的不断发展、清晰的工程理念、实验性的评估、齐心协力地解决一个问题。[Malik 和 Zhang的CACM文章][78]值得阅读。这个算法在许多大学中教授(我参加过的4个地方都是如此),但是通常在一个逻辑或者形式方法课上。
|
||||
|
||||
SAT求解器的应用有很多。IBM,Intel和许多其他公司都有他们的SAT求解器是西安。OpenSuse的[包管理器][78]同样使用了一个SAT求解器。
|
||||
SAT求解器的应用有很多。IBM,Intel和许多其他公司都有他们的SAT求解器实现。OpenSuse的[包管理器][78]同样使用了一个SAT求解器。
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://cstheory.stackexchange.com/questions/19759/core-algorithms-deployed/19773#19773
|
||||
|
||||
译者:[geekpi](https://github.com/geekpi) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
译者:[geekpi](https://github.com/geekpi) 校对:[wxy](https://github.com/wxy)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
@ -284,4 +291,8 @@ via: http://cstheory.stackexchange.com/questions/19759/core-algorithms-deployed/
|
||||
[76]:https://github.com/mirrors/linux-2.6/blob/b3a3a9c441e2c8f6b6760de9331023a7906a4ac6/lib/reed_solomon/reed_solomon.c
|
||||
[77]:http://rjlipton.wordpress.com/2009/07/13/sat-solvers-is-sat-hard-or-easy/
|
||||
[78]:http://dl.acm.org/citation.cfm?id=1536637
|
||||
[79]:http://en.opensuse.org/Portal%3aLibzypp
|
||||
[79]:http://en.opensuse.org/Portal%3aLibzypp
|
||||
|
||||
[101]:http://cstheory.stackexchange.com/questions/19759/core-algorithms-deployed/
|
||||
[102]:http://cstheory.stackexchange.com/questions/19759/core-algorithms-deployed/19773#19773
|
||||
[103]:http://cstheory.stackexchange.com/users/4155/vijay-d
|
@ -1,9 +1,9 @@
|
||||
每日Ubuntu小技巧——在Ubuntu中添加用户
|
||||
================================================================================
|
||||
|
||||
Ubuntu是一个多用户操作系统。多用户操作系统意味着多个用户可以通过独立的、个人的HOME文件夹,文件和设置访问计算机。用户A可以登录并修改他/她自己的配置文件而不会影响用户 **B ** 的配置文件。
|
||||
Ubuntu是一个多用户操作系统。多用户操作系统意味着多个用户可以通过独立的、个人的HOME文件夹,文件和设置访问计算机。用户**A**可以登录并修改他/她自己的配置文件而不会影响用户**B**的配置文件。
|
||||
|
||||
因此,你可以为每一个可能使用你家里电脑的用户创建一个独立的账户,而不是仅仅为所有人创建一个共享的账户。本短文将展示使用Ubuntu时如何实现这一点。
|
||||
因此,你可以为每一个可能使用你家里电脑的用户创建一个独立的账户,而不是仅仅为所有人创建一个共享的账户。本文将展示使用Ubuntu时如何实现这一点。
|
||||
|
||||
为了获得上面所说的那样的独立账户,首先点击长条菜单栏上的齿轮图标,然后点击系统设置。
|
||||
|
||||
@ -13,7 +13,7 @@ Ubuntu是一个多用户操作系统。多用户操作系统意味着多个用
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/09/useraccountsubuntu.png)
|
||||
|
||||
要添加用户到你的Ubuntu需要管理员权限。如果你要这么做,就在添加账户前点击解锁(Unlock)。
|
||||
要添加用户到你的Ubuntu需要管理员权限,请在添加账户前点击解锁(Unlock)。
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/09/useraccountsubuntu1.png)
|
||||
|
||||
@ -27,7 +27,7 @@ Ubuntu是一个多用户操作系统。多用户操作系统意味着多个用
|
||||
|
||||
输入用户全名时,系统将根据全名自动选择用户名。你可以保留自动生成的用户名,也可以根据需要修改用户名。完成后,点击**创建(Create)**来创建账户。
|
||||
|
||||
默认情况下,刚创建的账户将会不可用,直到它的密码被创建/修改。要想让账户可用,点击账户不可用按钮,然后输入密码。
|
||||
默认情况下,刚创建的账户是不可用的,除非给他设置或修改了密码。要想让账户可用,点击账户的不可用按钮,然后输入密码。
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/09/useraccountsubuntu3.png)
|
||||
|
@ -1,13 +1,13 @@
|
||||
每日Ubuntu小技巧——在Ubuntu下使用一款轻量级的Email阅读器-Geary
|
||||
每日Ubuntu小技巧:一款轻量级的Email阅读器Geary
|
||||
================================================================================
|
||||
|
||||
正如大家所知,Ubuntu 本身自带可以收发邮件的客户端——Thunderbird,当然它也支持Gmail,Yahoo Mail,Microsoft Outlook 等等支持IMAP协议的邮件服务。
|
||||
|
||||
Thunderbird 是一个功能强大的邮件客户端,只要email客户端所支持的功能,它都能够做到。但是如果你想选择一个能在够在GNOME 下运行的轻量级客户端,Geary 是一个不错的选择。
|
||||
Thunderbird 是一个功能强大的邮件客户端,只要email客户端所需要的功能,它都能够做到。但是如果你想选择一个能在够在GNOME 下运行的轻量级客户端,Geary 是一个不错的选择。
|
||||
|
||||
Geary 是一个界面简洁,能让你快捷方便的地阅读邮件的免费程序。它所有的对话均展示在一个简洁的面板上,这样你可以不必点击鼠标来切换消息。
|
||||
|
||||
Geary 还支持IMAP 协议,你可以使用Google, Yahoo 和 Microsoft 这样的在线邮箱服务来收发电子邮件。
|
||||
Geary 还支持IMAP 协议,所以你可以使用Google, Yahoo 和 Microsoft 这样的在线邮箱服务。
|
||||
|
||||
以Ubuntu 13.10用户为例,Geary 可以在Ubuntu 的软件中心获取。只要运行以下命令即可安装Geary 。
|
||||
|
87
published/How to manage Linux server with GUI.md
Normal file
87
published/How to manage Linux server with GUI.md
Normal file
@ -0,0 +1,87 @@
|
||||
如何使用图形界面Webmin管理linux服务器
|
||||
================================================================================
|
||||
一台典型的linux服务器运行命令行环境中,并已经包括了一些用于安装和配置各种没有界面的服务的基本工具。和一些成熟的具有图形界面的桌面软件相比,就安全性、资源消费和速度来说,仅需要少量的设置无疑是一个优点。
|
||||
|
||||
如果你习惯了使用基于图形界面的软件环境,你也许会想在Linux服务器中是否也有图形界面。典型的Linux桌面环境如`GNOME`、`KDE`等,与它们提供的功能相比,其所占用的系统资源负担是很不值得的,而且还不够安全,因为越多的代码越会带来安全弱点。
|
||||
|
||||
另外一个成熟的桌面GUI的可选替代是使用 **基于Web的管理工具**。现在已经有许多基于Web的配置管理工具,如 [Webmin][1]、[ISPconfig][2]、[Zentyal][3]等。
|
||||
|
||||
在这篇教程中, 我会讲述 **怎样利用基于Web的界面工具来管理和配置Linux服务器**。
|
||||
|
||||
Webmin 是一个用`Perl`语言写的轻量级 (~20 MB) 系统配置工具。 Webmin 具有内置的web服务器, 允许用户通过web接口来配置Linux服务器。 其中一个优点是由于它是基于模块架构的,你可以选择性加载[模块][12]来扩展其功能。
|
||||
|
||||
### Linux服务器上安装Webmin ###
|
||||
|
||||
在 Ubuntu 或 Debian 系统中安装Webmin, 你可以使用如下命令。
|
||||
|
||||
$ sudo apt-get install perl libnet-ssleay-perl openssl libauthen-pam-perl libpam-runtime libio-pty-perl apt-show-versions python
|
||||
$ wget http://prdownloads.sourceforge.net/webadmin/webmin_1.660_all.deb
|
||||
$ sudo dpkg -i webmin_1.660_all.deb
|
||||
|
||||
在CentOS 或 RHEL 系统中安装Webmin, 使用如下命令:
|
||||
|
||||
$ wget http://prdownloads.sourceforge.net/webadmin/webmin_1.660_all.deb
|
||||
$ sudo rpm -U webmin-1.660-1.noarch.rpm
|
||||
|
||||
### 使用 Webmin ###
|
||||
|
||||
安装好Webmin之后,你可以通过在浏览器中输入 https://\<主机的IP地址\>:10000 来使用。 如果你开启了防火墙, 请确保TCP端口 10000 没有被拦截。
|
||||
|
||||
同时, 请注意你应该使用 HTTPS, 而不是 HTTP。 否则, 会出现重定向错误。 Webmin 默认使用其自己生成的的SSL验证模式。
|
||||
|
||||
一旦你进入了Webmin登录页面, 你可以使用root身份登录 (当然需要输入root账户密码)或者使用具有root权限的任何用户账户登录。 登录成功后, 你可以看到如下Linux服务器的状态信息。
|
||||
|
||||
[![](http://farm4.staticflickr.com/3803/10937800943_e1ac465c3f_z.jpg)][4]
|
||||
|
||||
### Webmin 的特点 ###
|
||||
|
||||
Webmin 一个引以为豪的优点就是它几乎能够配置任何Linux服务器所支持的配置。接下来我来介绍,让你们大体了解它的一些重要功能。
|
||||
|
||||
设置引导时自动启动的服务, 同时显示他们相关配置信息。
|
||||
|
||||
[![](http://farm8.staticflickr.com/7437/10937589506_7abcaac10e_z.jpg)][5]
|
||||
|
||||
实时监控服务器状态和其他服务, 同时配置定时监控及邮件提醒。 你也可以监控一系列服务器守护进程如 NFS、MySQL、 BIND DNS、Squid proxy、Apache Web server等, 或者监控系统资源如磁盘存储情况、内存使用和网络占用等。
|
||||
|
||||
[![](http://farm6.staticflickr.com/5521/10937589676_a64d4eee57_z.jpg)][6]
|
||||
|
||||
配置 iptables-based firewall。
|
||||
|
||||
[![](http://farm4.staticflickr.com/3679/10937801173_61cd4b11a3_z.jpg)][7]
|
||||
|
||||
配置本地路由表和网关。
|
||||
|
||||
[![](http://farm6.staticflickr.com/5545/10937531925_a5d77384ac_z.jpg)][8]
|
||||
|
||||
挂载和配置文件系统。
|
||||
|
||||
[![](http://farm4.staticflickr.com/3710/10937589556_9fd192cdb9_z.jpg)][9]
|
||||
|
||||
通过文件管理接口来查看和修改本地文件,但是这需要浏览器有相关的java插件。
|
||||
|
||||
[![](http://farm6.staticflickr.com/5544/10937531975_368196fd03_z.jpg)][10]
|
||||
|
||||
通过改变Webmin的相关配置,你可以控制管理 IP 地址,添加/删除 Webmin 功能模块,开启双因子认证来使用安全登录功能,或者创建证书验证等。
|
||||
|
||||
[![](http://farm8.staticflickr.com/7317/10937532015_b5e1263496_z.jpg)][11]
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://xmodulo.com/2013/11/manage-linux-server-gui.html
|
||||
|
||||
译者:[thinkinglk](https://github.com/译者ID) 校对:[Caroline](https://github.com/carolinewuyan)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.webmin.com/
|
||||
[2]:http://www.ispconfig.org/
|
||||
[3]:http://www.zentyal.org/
|
||||
[4]:http://www.flickr.com/photos/xmodulo/10937800943/
|
||||
[5]:http://www.flickr.com/photos/xmodulo/10937589506/
|
||||
[6]:http://www.flickr.com/photos/xmodulo/10937589676/
|
||||
[7]:http://www.flickr.com/photos/xmodulo/10937801173/
|
||||
[8]:http://www.flickr.com/photos/xmodulo/10937531925/
|
||||
[9]:http://www.flickr.com/photos/xmodulo/10937589556/
|
||||
[10]:http://www.flickr.com/photos/xmodulo/10937531975/
|
||||
[11]:http://www.flickr.com/photos/xmodulo/10937532015/
|
||||
[12]:http://www.webmin.com/standard.html
|
@ -1,12 +1,12 @@
|
||||
欧洲议会:NSA曾要求Linus Torvalds允许他们在Linux中植入后门
|
||||
这是玩笑吗?Linux之“祖父”认为NSA曾要求在Linux中植入后门
|
||||
================================================================================
|
||||
![](http://www.omgubuntu.co.uk/wp-content/uploads/2011/01/DSC01782.jpg)
|
||||
|
||||
*照片中为大神Linus(左)和Benjamin Humphrey(译者注:该小伙儿为本文原文出处‘OMG!Ubuntu!’的联合创始人之一,现已离开OMGUbuntu)!照片摄于2011年*
|
||||
|
||||
美国国家安全局([**NSA**][1])宣称,他们曾经要求Linux的创始人,Linus Torvalds,在GNU/Linux中建立一个他们可以访问的“后门”。
|
||||
美国国家安全局([**NSA**][1])被称,他们曾经要求Linux的创始人,Linus Torvalds,在GNU/Linux中建立一个他们可以访问的“后门”。
|
||||
|
||||
这绝非谣言,Linus的父亲,Nils Torvalds如此说道。
|
||||
这绝非谣言,Linus的父亲,Nils Torvalds如此说道。(译注:也许Nils可以算做是Linux的祖父?好吧,我是标题党,啦啦啦~ :D 无论如何,感谢他生了一个好儿子! )
|
||||
|
||||
作为欧洲议会(MEP)的成员之一,Nils出席了最近关于“欧盟公民监视问题”的委员会质询会议。根据爱德华·斯诺登泄露出的一些NSA文档,委员会对文档中列出的一些公司代表就所谓的“合作”进行了质询。
|
||||
|
@ -50,8 +50,8 @@ Recoll可以从Dash或者菜单中启动。
|
||||
正如上面提到的,假如你想更多的控制索引的细节,你可以调节Recoll的索引功能。
|
||||
在Recoll的工具中有两个配置项
|
||||
|
||||
1.索引配置
|
||||
2.索引计划
|
||||
1. 索引配置
|
||||
2. 索引计划
|
||||
|
||||
让我们来看一下上面这两个的简短描述。
|
||||
|
||||
@ -118,6 +118,7 @@ Recoll支持两种索引计划:
|
||||
欢呼吧!
|
||||
|
||||
如有问题,请参考我们的Q/A论坛 : http://ask.unixmen.com/ 。
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.unixmen.com/recoll-text-searching-tool-linux-desktops/
|
@ -1,19 +1,14 @@
|
||||
VidMasta:一个搜索电影和电视剧的桌面应用
|
||||
VidMasta:搜索和观看在线电影、电视剧的神器
|
||||
===
|
||||
|
||||
你是否曾经想要从桌面搜索电影或电视剧,或者搜寻能够随时为你搜索这些东西的应用程序?这儿有一个应用可以满足你的需要。
|
||||
|
||||
[**VidMasta**][1]是一个免费,
|
||||
|
||||
|
||||
VidMasta: A Desktop Application For Searching Movies And TV Shows
|
||||
================================================================================
|
||||
Ever wanted to search for a Movie or a TV shows from your desktop or searching for a application to do it for you whenever you want? Here is a application to fulfil your needs.
|
||||
|
||||
[**VidMasta**][1] is free, cross-platform, federated search desktop application to read about, preview, watch, and download any movie or television titles that are being shared online. It will run on Linux, Windows and Mac OS X.
|
||||
[**VidMasta**][1]是一个免费的、跨平台的的应用,它将搜索、浏览、评论、观看和下载那些在线分享的视频和电视剧等功能融为一体。它可以运行在Linux、Windows和Mac OS X上。
|
||||
|
||||
###特点
|
||||
|
||||
使用VidMasta,你可以做到一下这些:
|
||||
使用VidMasta,你可以做到以下这些:
|
||||
|
||||
- 观看或下载任何格式的电影或电视剧
|
||||
- 支持的格式是:TV,DVD,720P,1080P。
|
||||
- 匿名链接并自动过滤不受信任的IP,可以使用代理,还可以使用加密连接。
|
||||
@ -34,8 +29,7 @@ Ever wanted to search for a Movie or a TV shows from your desktop or searching f
|
||||
|
||||
###在Linux上安装VidMasta
|
||||
|
||||
在安装VidMasta之前,你应该在你的Linux桌面系统中安装最新版的Java。
|
||||
从[这儿][4]下载最新版。进入你下载的文件夹,使用下面的命令安装它:
|
||||
在安装VidMasta之前,你应该在你的Linux桌面系统中安装最新版的Java。从[这儿][4]下载最新版。进入你下载的文件夹,使用下面的命令安装它:
|
||||
|
||||
sudo java -jar vidmasta-setup-16.7.jar
|
||||
|
||||
@ -89,7 +83,9 @@ Ever wanted to search for a Movie or a TV shows from your desktop or searching f
|
||||
|
||||
是不是很酷?
|
||||
|
||||
需要注意的是,若你不能下载最新的电影或电视剧时,也许是因为版权问题或者地理原因。你也可以尝试一下安装最新版的Java并禁用掉屏蔽广告程序,再去播放或下载电影。
|
||||
需要注意的是,若你不能下载最新的电影或电视剧时,也许是因为版权问题或者国家原因。
|
||||
|
||||
你也可以尝试一下安装最新版的Java并禁用掉屏蔽广告程序,再去播放或下载电影。
|
||||
|
||||
你是否对此很期待呢?赶紧把它下载下来安装到你的系统中,祝你使用愉快!
|
||||
|
||||
@ -97,7 +93,7 @@ Ever wanted to search for a Movie or a TV shows from your desktop or searching f
|
||||
|
||||
via: http://www.unixmen.com/vidmasta-desktop-application-searching-movies-tv-shows/
|
||||
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz`) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz`) 校对:[wxy](https://github.com/wxy)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
70
sources/Are Open Source Developers Too Demanding.md
Normal file
70
sources/Are Open Source Developers Too Demanding.md
Normal file
@ -0,0 +1,70 @@
|
||||
Are Open Source Developers Too Demanding?
|
||||
================================================================================
|
||||
**Open source invites participation, including criticism. But do developers sometimes take it too far?**
|
||||
|
||||
![](http://readwrite.com/files/opencola_wikipedia.jpg)
|
||||
|
||||
Developers can be a fickle bunch. Gifted with mountains of free, open-source code of ever-improving quality, some developers can’t help but complain that there’s not more, and even more free, software. But the problem often isn't the code itself, but poorly calibrated expectations and scanty training.
|
||||
|
||||
### What? Me Pay? ###
|
||||
|
||||
One sometimes unrealistic expectation is that software should be free. All of it.
|
||||
|
||||
So, for example, we have [one young developer berating nginx][1] for building “admittedly amazing software” but then having the audacity to charge for it.
|
||||
|
||||
No, really. Those nginx people are trying to make money by writing software that people want. Can you believe the gall?
|
||||
|
||||
Actually, his problem is more nuanced than this. Despite electing not to use Apache httpd, the Hip Young Startup blog author complains that nginx "took a feature that Apache httpd has had literally forever and put it behind a pay wall." It's unclear why he doesn't just use Apache to solve his problem, given that he also says "the performance difference between nginx and httpd in this scenario is negligible."
|
||||
|
||||
Or maybe he could fix nginx himself, given that, by his own admission, it's "trivial" to make the changes himself to get around nginx's attempts to sustain product development by charging for some features. The problem, as he acknowledges, is that he "shouldn’t have to do any of this [crap]."
|
||||
|
||||
In other words, the world (or nginx) owes this developer a living. Who knew?
|
||||
|
||||
Let's be clear: one of the ways open source succeeds is by dramatically lowering the bar to adoption. Charging money, even a negligible fee, can hinder that adoption. But getting uppity about the primary developer of an open-source project charging money for value? As programmer Brendan Loudermilk ([@bloudermilk][2]) [tells][3] the Hip Young Startup blogger, "You could always pay for and support the software that serves as a core dependency of your app."
|
||||
|
||||
Imagine that.
|
||||
|
||||
### Documentation? Of Course I Didn’t Read The Documentation! ###
|
||||
|
||||
Then there are the countless others who take to Hacker News to complain about software they often don’t understand, quite often because they haven’t bothered to read the documentation. I completely get that great software should be approachable, and great products, generally, should be somewhat self-explanatory.
|
||||
|
||||
But much of the best open-source software can be complex to run, at least, at scale. If the software isn't working for someone, it's not obvious that the software is the problem. Vlad Mihalcea, founder of the Struts open-source framework, nails this, [arguing][4] that “if there is someone to blame, it’s usually us” as much of the available open-source software tends to be high-quality code.
|
||||
|
||||
What it isn’t, he goes on to argue, is a free lunch in terms of a learning curve. Any software, whether open source or proprietary, requires some investment in learning how to be productive with it. As he notes of Hibernate and other open-source technologies, “If you want to employ them [successfully], be prepared to learn a lot. There is no other way.”
|
||||
|
||||
This won’t resonate with the hacker crowd whose first instinct is to complain when software doesn’t work the way they want, even if it wasn’t designed to do what they want it to do. But it’s true, all the same.
|
||||
|
||||
### Healthcare.gov Vs. Gov.UK ###
|
||||
|
||||
Just look at the Healthcare.gov debacle for proof. Recently NoSQL database vendor MarkLogic has been [taking bullets][5] over its alleged role in Healthcare.gov’s many technical problems. [Some have gone so far as to argue][6] that NoSQL databases, in general, are faulty because of the Healthcare.gov debacle.
|
||||
|
||||
This is stupid.
|
||||
|
||||
MarkLogic is a fine database. While not perfect, it’s silly to blame Healthcare.gov’s problems on this legacy database. Code isn’t the primary problem.
|
||||
|
||||
As [I’ve argued][7], Healthcare.gov’s problems aren’t really about code, but instead about process. For proof, look no further than Healthcare.gov’s British peer, Gov.UK, [which credits NoSQL technologies][8] as a significant reasons for its success.
|
||||
|
||||
The difference isn’t in the code the two websites used, but rather their respective approaches: Gov.UK is iterative, agile. Healthcare.gov is top-down, waterfall.
|
||||
|
||||
### A Poor Craftsman Blames Her Tools ###
|
||||
|
||||
Open source invites criticism by laying bare its strengths and weaknesses in a way proprietary software never did. Developers today have a level of accessibility to the code they use that previous generations of developers lacked, with a megaphone (the Internet) that allows them to broadcast complaints about that code.
|
||||
|
||||
But let’s not lose sight of just how blessed we are to have this code, or forget our obligation to apply it appropriately in order to be successful. In other words, read the documentation before you complain that open-source software doesn’t “work.” More often than not, it works just fine, but not for the ill-conceived purpose you have in mind.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://readwrite.com/2013/11/26/are-open-source-developers-too-demanding#awesm=~ooy2qPfuR2PvIx
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://readwrite.com/2013/11/26/%E2%80%9Chttp://www.hipyoungstartup.com/2013/11/we-should-ditch-nginx/%E2%80%9C
|
||||
[2]:https://twitter.com/bloudermilk
|
||||
[3]:http://www.hipyoungstartup.com/2013/11/we-should-ditch-nginx/#comment-17
|
||||
[4]:http://readwrite.com/2013/11/26/%E2%80%9Chttp://java.dzone.com/articles/why-i-never-blame-open-source%E2%80%9D
|
||||
[5]:http://gigaom.com/2013/11/25/how-the-use-of-a-nosql-database-played-a-role-in-the-healthcare-gov-snafu/
|
||||
[6]:http://developers.slashdot.org/story/13/11/24/1437203/nyt-healthcaregov-project-chaos-due-partly-to-unorthodox-database-choice
|
||||
[7]:http://readwrite.com/2013/11/04/sorry-open-source-isnt-the-panacea-for-healthcaregov#awesm=~oojDQ8fiVXrjGP
|
||||
[8]:http://digital.cabinetoffice.gov.uk/colophon-beta/
|
@ -0,0 +1,44 @@
|
||||
Canonical Dev Calls Linux Mint ‘Vulnerable’, Wouldn’t Use it For Online Banking
|
||||
================================================================================
|
||||
> Linux Mint has since responded to the comments by Oliver Grawert. [You can read them here][1].
|
||||
|
||||
**Users of the popular Ubuntu-based operating system Linux Mint should not use it for online banking, a Canonical [engineer has advised][2].**
|
||||
|
||||
Mint’s decision to prevent packages with known security issues from updating – from the kernel and browser to the boot-loader and Xorg display server – leaves its users with a “vulnerable system”, says *Oliver Grawert*.
|
||||
|
||||
> “Instead of just integrating changes properly with the packages in the ubuntu archive they instead suppress doing (security) updates at all for them. i would say forcefully keeping a vulnerable kernel browser or xorg in place instead of allowing the provided security updates to be installer makes it a vulnerable system, (sic)”.
|
||||
>
|
||||
> “I personally wouldn’t do online banking with it.”
|
||||
|
||||
Grawert certainly isn’t alone in considering Mint a sub-par choice for the security conscious. Mozilla contributor and former Ubuntu member Benjamin **Kerensa* feels the same:**
|
||||
|
||||
> “It is unclear why Linux Mint disables all of their security updates. I can say that it took them many months to get a fixed version of Firefox packaged while Ubuntu and Debian had already had security fixes in their package.
|
||||
>
|
||||
> This puts Linux Mint users at risk and is one of the key reasons I never suggest Linux Mint to anyone as an alternative to Ubuntu.”
|
||||
|
||||
Oliver Grawert is no fly-by-night contributor. As one of Canonical’s Ubuntu Engineering bods he’s better placed than most to know what he’s talking about.
|
||||
|
||||
> ‘But are Mint users in actual risk? Yes and no…’
|
||||
|
||||
But are Mint users in actual risk?
|
||||
|
||||
Yes and no. The majority of security “holes” (for want of a better word) of the kind present in the packages that Mint’s developers steadfastly refuse to update are both documented and known, but rarely exploited by those of a nefarious breed. As such the “actual threat” posed to users remains, at least for now, largely a theoretical one.
|
||||
|
||||
That’s to say that there are no known incidents of identify theft or worse resulting from use of Mint (or any other Ubuntu-based distribution with unpatched packages) through any of the exploits referenced by Grawert on the Ubuntu Dev Mailing List.
|
||||
|
||||
But just because no-one has entered through the window left ajar thus far, isn’t to say someone won’t ever do it.
|
||||
|
||||
**After seeing Ubuntu given a long and sustained kicking about its own (largely theoretical) privacy issues, it will be interesting to see if, now the boot is placed firmly on the other foot, the vehement concern for users’ wellbeing will extend to other distributions. **
|
||||
|
||||
Notice: We reached out to Linux Mint for comment & clarification but received no reply.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/canonical-dev-dont-use-linux-mint-online-banking-unsecure
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:这个地址在发布的时候填写成“Linux Mint Respond to Ubuntu Developer’s ‘Vulnerable’ Claim”这篇文章的发布的地址
|
||||
[2]:https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2013-November/014770.html
|
@ -0,0 +1,29 @@
|
||||
Canonical and ASUS Have Formed a Partnership in USA
|
||||
================================================================================
|
||||
**Canonical and ASUS have formed a partnership that would enable the hardware vendor to equip a couple of its laptops with the Ubuntu operating system.**
|
||||
|
||||
ASUS is now providing the X201E and 1015E laptops with Ubuntu preinstalled in an effort to penetrate the education market.
|
||||
|
||||
“As Ubuntu, and all the software bundled on it is free, there’s no licence fees in the purchase price which significantly reduces cost. This is perfect for students and institutions, both of whose finances can be hard pressed.”
|
||||
|
||||
“Productivity applications are taken care of by LibreOffice. Familiar feeling, they offer all the functionality students and staff need and are fully compatible with existing files from the leading proprietary alternative. There are also bundled free applications for email and web browsing,” reads the official [announcement][1] on Ubuntu’s website.
|
||||
|
||||
The two laptops are not exactly powerhouses and are aimed at productivity, and maybe multimedia content. The ASUS 1015E laptop features a Intel Celeron 847 1.1 GHz processor, 2 GB DDR3 Memory, a 320 GB 5400 rpm Hard Drive, and a 10.1-Inch screen.
|
||||
|
||||
The other model, which is currently out of stock, ASUS X201E, is a little bit more powerful, but not by much: Intel Celeron 847 (1.1GHz) Sandy Bridge processor, 4 GB DDR3, 320 GB 5400 rpm Hard Drive, an 11.6-Inch screen, and Intel GMA HD graphics solution.
|
||||
|
||||
“Beyond the basics thousands of other free, open-source applications are available to meet more specific needs from image processing and 3D animation to anti-virus or accounting.”
|
||||
|
||||
“We know that effective personal computing is vital to students and Institutions, so it’s exciting for us to work with our partners to bring these low-cost, high-performance packages into the education sector,” is also stated in the announcement.
|
||||
|
||||
Canonical announcement sends to a couple of Amazon pages, but if you’re interested in these products than you should know that they are available in a number of other stores.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://news.softpedia.com/news/Canonical-and-ASUS-Have-Formed-a-Partnership-in-USA-404483.shtml
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://insights.ubuntu.com/resources/article/asus-and-ubuntu-deliver-affordable-world-class-laptops-to-usa-education/
|
@ -1,49 +0,0 @@
|
||||
Daily Ubuntu Tips – Print From Shared Windows Printers
|
||||
================================================================================
|
||||
For users with both Windows and Ubuntu machines and a single printer, this blog post is going to show you how to share a printer in Windows and allow Ubuntu machines to printer to it.
|
||||
|
||||
Almost all printers support Windows by default. Printer manufactures are building printers for Windows and not many are doing it for Linux systems, including Ubuntu. So, if you have a printer with full Windows support, you can share it from the Windows machine and allow other systems to print to it.
|
||||
|
||||
I ran into this problem few years go when most printers didn’t support Linux systems. I had an older printer which was designed specifically for Windows and Mac OS X with no support for Linux.
|
||||
|
||||
I installed the printer driver on my Windows machine and it worked great. My Windows machine was printing just fine, but couldn’t get the Ubuntu machine to because the printer didn’t support LAN.
|
||||
|
||||
So, I shared the printer from Windows and my Ubuntu machine was printing properly with the correct fonts and style. If you find yourself in similar situation, follow the guide below to do the same.
|
||||
|
||||
First, logon to Windows and right-click the printer you wish to share and click ‘**Printer properties**’
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu.png)
|
||||
|
||||
Next, select the ‘Sharing’ tab and check the ‘Share this printer’ box to share the printer. Remember the shared name because you’ll connect using that shared name.
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu1.png)
|
||||
|
||||
Finally, open the commands prompt as administrator and run the commands below to enable file and printer sharing through the firewall.
|
||||
|
||||
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
|
||||
|
||||
Next, logon to Ubuntu and select the **gear** on the panel at the top right and select System **Settings…**
|
||||
|
||||
When System Settings opens, select Printers. The add a printer. When prompted to select a device, choose ‘ **Windows Printer via SAMBA**’.
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu2.png)
|
||||
|
||||
Enter the Windows computer IP address or hostname followed by the printer shared name. You may also have to enter your windows account credentials (username and password). Click Browse to verify that you can see the printer and when you’re done, click Forward to continue.
|
||||
|
||||
Next, select the printer brand and model. If you don’t see the particular model, choose the next closest to it and continue.
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu3.png)
|
||||
|
||||
If everything is done correctly, you should have a printer installed and ready to use.
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu4.png)
|
||||
|
||||
Enjoy!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.liberiangeek.net/2013/11/daily-ubuntu-tips-print-from-shared-windows-printers/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -1,35 +0,0 @@
|
||||
Daily Ubuntu Tips–Protect Your Computers Using OpenDNS’ Secure DNS Infrastructure
|
||||
================================================================================
|
||||
The Internet is a jungle. Everyone – good and bad is connected to the same Internet we’re all connected to. Folks whose business is to infect your computer with nasty viruses and those who seek to protect the good guys are all connected.
|
||||
|
||||
With that said, the Internet is the best thing that ever happened to mankind. It contains wealth of information and resources that anyone can access, mostly free of charge. Some of the most prestigious colleges are offering free high level courses to anyone who wants to learn. It is a good thing that the Internet is available to us today.
|
||||
|
||||
Something to always keep in your mind when using the Internet is that your computer is always a target. A target for viruses, malwares and other programs that want to destroy it.
|
||||
|
||||
Because of that, it’s always recommended to use the Internet with computers that are protected with antivirus and antispyware programs. In some cases, that may still not be enough. Adding more layers of security is always good.
|
||||
|
||||
When looking to add additional layers of security to protect your machines, using OpenDNS’ secure DNS infrastructure may help. There are many parts that make up the Internet and protecting as many of its parts is the best way to go.
|
||||
|
||||
First, you’ll want to install antivirus and antispyware programs on your computers. Because browsing the Internet allows your computer to query remote DNS providers, using protected and secured DNS providers will go a long way protecting your machine.
|
||||
|
||||
This brief tutorials is going to show you how to configure Ubuntu machine to use OpenDNS’ infrastructure to help protect your machines.
|
||||
|
||||
sudo gedit /etc/dhcp/dhclient.conf
|
||||
|
||||
Finally, add the line below into the file and save it.
|
||||
|
||||
supersede domain-name-servers 208.67.222.222,208.67.220.220;
|
||||
|
||||
Restart your computer and enjoy!
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/opendns-ubuntu.png)
|
||||
|
||||
Enjoy!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.liberiangeek.net/2013/11/daily-ubuntu-tipsprotect-your-computers-using-opendns-secure-dns-infrastructure/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,126 @@
|
||||
[翻译中]by stduolc
|
||||
How to Crack a Wi-Fi Network's WEP Password with BackTrack
|
||||
================================================================================
|
||||
![](http://img.gawkerassets.com/img/17idgc21242wbjpg/ku-xlarge.jpg)
|
||||
|
||||
You already know that if you want to lock down your Wi-Fi network, you should [opt for WPA encryption][1] because WEP is easy to crack. But did you know how easy? Take a look.
|
||||
|
||||
*Note: This post demonstrates how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, see our [guide to cracking a Wi-Fi network's WPA password with Reaver][2] instead.*
|
||||
|
||||
Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing [how to pick a lock][3] doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.
|
||||
|
||||
Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain't what you'd call "news." But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes.
|
||||
|
||||
### What You'll Need ###
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrsu8hf19png/original.png)
|
||||
|
||||
Unless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need:
|
||||
|
||||
- **A compatible wireless adapter**—This is the biggest requirement. You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not. After consulting with my friendly neighborhood security expert, I purchased an Alfa AWUS050NH USB adapter, pictured here, and it set me back about $50 on Amazon. Update: Don't do what I did. Get the [Alfa AWUS036H][4], not the US050NH, instead. [The guy in this video][5] below is using a $12 model he bought on Ebay (and is even [selling his router of choice)][6]. There are [plenty of resources on getting aircrack-compatible adapters out there][7].
|
||||
|
||||
- **[A BackTrack Live CD][8]**. We already took you on a [full screenshot tour of how to install and use BackTrack 3][9], the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started.
|
||||
|
||||
- **A nearby WEP-enabled Wi-Fi network**. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
|
||||
|
||||
- **Patience with the command line**. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.
|
||||
|
||||
### Crack That WEP ###
|
||||
|
||||
To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the taskbar in the lower left corner, second button to the right. Now, the commands.
|
||||
|
||||
First run the following to get a list of your network interfaces:
|
||||
|
||||
airmon-ng
|
||||
|
||||
The only one I've got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).
|
||||
|
||||
Now, run the following four commands. See the output that I got for them in the screenshot below.
|
||||
|
||||
airmon-ng stop (interface)
|
||||
ifconfig (interface) down
|
||||
macchanger —mac 00:11:22:33:44:55 (interface)
|
||||
airmon-ng start (interface)
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrsub9llbpng/ku-xlarge.png)
|
||||
|
||||
If you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully "faked" a new MAC address on your network interface, 00:11:22:33:44:55.
|
||||
|
||||
Now it's time to pick your network. Run:
|
||||
|
||||
airodump-ng (interface)
|
||||
|
||||
To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrut97td8png/ku-xlarge.png)
|
||||
|
||||
Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.
|
||||
|
||||
Now we're going to watch what's going on with that network you chose and capture that information to a file. Run:
|
||||
|
||||
airodump-ng -c (channel) -w (file name) —bssid (bssid) (interface)
|
||||
|
||||
Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose "yoyo," which is the network's name I'm cracking.
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrutbx04dpng/ku-xlarge.png)
|
||||
|
||||
You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:
|
||||
|
||||
aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)
|
||||
|
||||
Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring "Association successful" message with that smiley face.
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrut9v67spng/ku-xlarge.png)
|
||||
|
||||
You're almost there. Now it's time for:
|
||||
|
||||
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)
|
||||
|
||||
Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the "#Data" column—you want it to go above 10,000. (Pictured below it's only at 854.)
|
||||
|
||||
Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrwseb5uipng/ku-xlarge.png)
|
||||
|
||||
Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected:
|
||||
|
||||
aircrack-ng -b (bssid) (file name-01.cap)
|
||||
|
||||
Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension.
|
||||
|
||||
If you didn't get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:
|
||||
|
||||
![](http://img.gawkerassets.com/img/17ggkrws8f1gepng/ku-medium.png)
|
||||
|
||||
The WEP key appears next to "KEY FOUND." Drop the colons and enter it to log onto the network.
|
||||
|
||||
### Problems Along the Way ###
|
||||
|
||||
With this article I set out to prove that cracking WEP is a relatively "easy" process for someone determined and willing to get the hardware and software going. I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine. Even though the AP which I was cracking was my own and in the same room as my Alfa, the power reading on the signal was always around -30, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Mac and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key.
|
||||
|
||||
So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline.
|
||||
|
||||
To see the video version of these exact instructions, check out this dude's YouTube video.
|
||||
|
||||
[http://www.youtube.com/embed/kDD9PjiQ2_U?wmode=transparent&rel=0&autohide=1&showinfo=0&enablejsapi=1][10]
|
||||
|
||||
Got any experience with the WEP cracking courtesy of BackTrack? What do you have to say about it? Give it up in the comments.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://lifehacker.com/5305094/how-to-crack-a-wi+fi-networks-wep-password-with-backtrack
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://lifehacker.com/386675/secure-your-home-wi+fi-network
|
||||
[2]:http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver
|
||||
[3]:http://lifehacker.com/399735/how-to-pick-a-lock-with-a-bump-key
|
||||
[4]:http://www.amazon.com/Alfa-AWUS036H-802-11b-Wireless-network/dp/B002WCEWU8?tag=lifehackeramzn-20&ascsubtag=[referrer|lifehacker.com[type|link[postId|5305094[asin|B002WCEWU8[authorId|5774310829120954491
|
||||
[5]:http://www.youtube.com/watch?v=oHq-cKoYcr8
|
||||
[6]:http://www.youtube.com/watch?v=bFlOHMj7Qoc
|
||||
[7]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fwww.aircrack-ng.org%2Fdoku.php%3Fid%3Dcompatible_cards&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5305094%2Fhow-to-crack-a-wi%2Bfi-networks-wep-password-with-backtrack&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[8]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fwww.backtrack-linux.org%2F&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5305094%2Fhow-to-crack-a-wi%2Bfi-networks-wep-password-with-backtrack&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[9]:http://lifehacker.com/5166530/backtrack-is-a-security+focused-live-cd-packed-with-system-tools
|
||||
[10]:http://www.youtube.com/embed/kDD9PjiQ2_U?wmode=transparent&rel=0&autohide=1&showinfo=0&enablejsapi=1
|
@ -0,0 +1,154 @@
|
||||
How to Crack a Wi-Fi Network's WPA Password with Reaver
|
||||
================================================================================
|
||||
![](http://img.gawkerassets.com/img/17pw3mgej3x93jpg/ku-xlarge.jpg)
|
||||
|
||||
Your Wi-Fi network is your conveniently wireless gateway to the internet, and since you're not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how [easy it is to crack a WEP password][1], you probably secure your network using the more bulletproof WPA security protocol.
|
||||
|
||||
Here's the bad news: A new, free, open-source tool called [Reaver][2] exploits a security hole in wireless routers and can crack most routers' current passwords with relative ease. Here's how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.
|
||||
|
||||
In the first section of this post, I'll walk through the steps required to crack a WPA password using Reaver. You can follow along with either the video or the text below. After that, I'll explain how Reaver works, and what you can do to protect your network against Reaver attacks.
|
||||
|
||||
[http://www.youtube.com/embed/z1c1OIMbmb0?wmode=transparent&rel=0&autohide=1&showinfo=0&enablejsapi=1][3]
|
||||
|
||||
First, a quick note: As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise. The more you know, the better you can protect yourself.
|
||||
|
||||
### What You'll Need ###
|
||||
|
||||
You don't have to be a networking wizard to use Reaver, the command-line tool that does the heavy lifting, and if you've got a blank DVD, a computer with compatible Wi-Fi, and a few hours on your hands, you've got basically all you'll need. There are a number of ways you could set up Reaver, but here are the specific requirements for this guide:
|
||||
|
||||
![](http://img.gawkerassets.com/img/194pra0777vwyjpg/ku-xlarge.jpg)
|
||||
|
||||
- [**The BackTrack 5 Live DVD**][4]. BackTrack is a bootable Linux distribution that's filled to the brim with network testing tools, and while it's not strictly required to use Reaver, it's the easiest approach for most users. Download the Live DVD [from BackTrack's download page][5] and burn it to a DVD. You can alternately download a virtual machine image if you're using VMware, but if you don't know what VMware is, just stick with the Live DVD. As of this writing, that means you should select BackTrack 5 R3 from the Release drop-down, select Gnome, 32- or 64-bit depending on your CPU (if you don't know which you have, 32 is a safe bet), ISO for image, and then download the ISO.
|
||||
|
||||
- **A computer with Wi-Fi and a DVD drive**. BackTrack will work with the wireless card on most laptops, so chances are your laptop will work fine. However, BackTrack doesn't have a full compatibility list, so no guarantees. You'll also need a DVD drive, since that's how you'll boot into BackTrack. I used a six-year-old MacBook Pro.
|
||||
|
||||
- **A nearby WPA-secured Wi-Fi network**. Technically, it will need to be a network using WPA security with the WPS feature enabled. I'll explain in more detail in the "How Reaver Works" section how WPS creates the security hole that makes WPA cracking possible.
|
||||
|
||||
- **A little patience**. This is a 4-step process, and while it's not terribly difficult to crack a WPA password with Reaver, it's a brute-force attack, which means your computer will be testing a number of different combinations of cracks on your router before it finds the right one. When I tested it, Reaver took roughly 2.5 hours to successfully crack my password. The [Reaver home page][6] suggests it can take anywhere from 4-10 hours. Your mileage may vary.
|
||||
|
||||
### Let's Get Crackin' ###
|
||||
|
||||
At this point you should have BackTrack burned to a DVD, and you should have your laptop handy.
|
||||
|
||||
#### Step 1: Boot into BackTrack ####
|
||||
|
||||
To boot into BackTrack, just put the DVD in your drive and boot your machine from the disc. (Google around if you don't know anything about live CDs/DVDs and need help with this part.) During the boot process, BackTrack will prompt you to to choose the boot mode. Select "BackTrack Text - Default Boot Text Mode" and press Enter.
|
||||
|
||||
Eventually BackTrack will boot to a command line prompt. When you've reached the prompt, type `startx` and press Enter. BackTrack will boot into its graphical interface.
|
||||
|
||||
#### Step 2: Install Reaver ####
|
||||
|
||||
Update: This step is no longer necessary, as Reaver comes pre-installed on Backtrack 5 R3. Skip down to Step 3.
|
||||
|
||||
Reaver has been added to the bleeding edge version of BackTrack, but it's not yet incorporated with the live DVD, so as of this writing, you need to install Reaver before proceeding. (Eventually, Reaver will simply be incorporated with BackTrack by default.) To install Reaver, you'll first need to connect to a Wi-Fi network that you have the password to.
|
||||
|
||||
1. Click Applications > Internet > Wicd Network Manager
|
||||
1. Select your network and click Connect, enter your password if necessary, click OK, and then click Connect a second time.
|
||||
|
||||
Now that you're online, let's install Reaver. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type:
|
||||
|
||||
apt-get update
|
||||
|
||||
And then, after the update completes:
|
||||
|
||||
apt-get install reaver
|
||||
|
||||
If all went well, Reaver should now be installed. It may seem a little lame that you need to connect to a network to do this, but it will remain installed until you reboot your computer. At this point, go ahead and disconnect from the network by opening Wicd Network Manager again and clicking Disconnect. (You may not strictly need to do this. I did just because it felt like I was somehow cheating if I were already connected to a network.)
|
||||
|
||||
#### Step 3: Gather Your Device Information, Prep Your Crackin' ####
|
||||
|
||||
In order to use Reaver, you need to get your wireless card's interface name, the BSSID of the router you're attempting to crack (the BSSID is a unique series of letters and numbers that identifies a router), and you need to make sure your wireless card is in monitor mode. So let's do all that.
|
||||
|
||||
**Find your wireless card:** Inside Terminal, type:
|
||||
|
||||
iwconfig
|
||||
|
||||
Press Enter. You should see a wireless device in the subsequent list. Most likely, it'll be named `wlan0`, but if you have more than one wireless card, or a more unusual networking setup, it may be named something different.
|
||||
|
||||
![](http://img.gawkerassets.com/img/194prsh4oyo2mjpg/ku-xlarge.jpg)
|
||||
|
||||
**Put your wireless card into monitor mode**: Assuming your wireless card's interface name is `wlan0`, execute the following command to put your wireless card into monitor mode:
|
||||
|
||||
airmon-ng start wlan0
|
||||
|
||||
This command will output the name of monitor mode interface, which you'll also want to make note of. Most likely, it'll be `mon0`, like in the screenshot below. Make note of that.
|
||||
|
||||
![](http://img.gawkerassets.com/img/194prrjkz8yorjpg/ku-xlarge.jpg)
|
||||
|
||||
**Find the BSSID of the router you want to crack**: Lastly, you need to get the unique identifier of the router you're attempting to crack so that you can point Reaver in the right direction. To do this, execute the following command:
|
||||
|
||||
airodump-ng wlan0
|
||||
|
||||
(Note: If `airodump-ng wlan0` doesn't work for you, you may want to try the monitor interface instead—e.g., `airodump-ng mon0`.)
|
||||
|
||||
You'll see a list of the wireless networks in range—it'll look something like the screenshot below:
|
||||
|
||||
![](http://img.gawkerassets.com/img/194prtyebc284jpg/ku-xlarge.jpg)
|
||||
|
||||
When you see the network you want, press Ctrl+C to stop the list from refreshing, then copy that network's BSSID (it's the series of letters, numbers, and colons on the far left). The network should have WPA or WPA2 listed under the ENC column. (If it's WEP, use our [previous guide to cracking WEP passwords][7].)
|
||||
|
||||
Now, with the BSSID and monitor interface name in hand, you've got everything you need to start up Reaver.
|
||||
|
||||
#### Step 4: Crack a Network's WPA Password with Reaver ####
|
||||
|
||||
Now execute the following command in the Terminal, replacing `bssid` and moninterface with the BSSID and monitor interface and you copied down above:
|
||||
|
||||
reaver -i moninterface -b bssid -vv
|
||||
|
||||
For example, if your monitor interface was `mon0` like mine, and your BSSID was `8D:AE:9D:65:1F:B2` (a BSSID I just made up), your command would look like:
|
||||
|
||||
reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv
|
||||
|
||||
Press Enter, sit back, and let Reaver work its disturbing magic. Reaver will now try a series of PINs on the router in a brute force attack, one after another. This will take a while. In my successful test, Reaver took 2 hours and 30 minutes to crack the network and deliver me with the correct password. As mentioned above, the Reaver documentation says it can take between 4 and 10 hours, so it could take more or less time than I experienced, depending. When Reaver's cracking has completed, it'll look like this:
|
||||
|
||||
![](http://img.gawkerassets.com/img/18qpo7omnvkbejpg/ku-medium.jpg)
|
||||
|
||||
**A few important factors to consider**: Reaver worked exactly as advertised in my test, but it won't necessarily work on all routers (see more below). Also, the router you're cracking needs to have a relatively strong signal, so if you're hardly in range of a router, you'll likely experience problems, and Reaver may not work. Throughout the process, Reaver would sometimes experience a timeout, sometimes get locked in a loop trying the same PIN repeatedly, and so on. I just let it keep on running, and kept it close to the router, and eventually it worked its way through.
|
||||
|
||||
Also of note, you can also pause your progress at any time by pressing Ctrl+C while Reaver is running. This will quit the process, but Reaver will save any progress so that next time you run the command, you can pick up where you left off-as long as you don't shut down your computer (which, if you're running off a live DVD, will reset everything).
|
||||
|
||||
### How Reaver Works ###
|
||||
|
||||
Now that you've seen how to use Reaver, let's take a quick overview of how Reaver works. The tool takes advantage of a vulnerability in something called Wi-Fi Protected Setup, or WPS. It's a feature that exists on many routers, intended to provide an easy setup process, and it's tied to a PIN that's hard-coded into the device. Reaver exploits a flaw in these PINs; the result is that, with enough time, it can reveal your WPA or WPA2 password.
|
||||
|
||||
Read more details about the vulnerability at [Sean Gallagher's excellent post on Ars Technica][8].
|
||||
|
||||
### How to Protect Yourself Against Reaver Attacks ###
|
||||
|
||||
Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place). Unfortunately, as Gallagher [points out as Ars][9], even with WPS manually turned off through his router's settings, Reaver was still able to crack his password.
|
||||
|
||||
> In a phone conversation, Craig Heffner said that the inability to shut this vulnerability down is widespread. He and others have found it to occur with every Linksys and Cisco Valet wireless access point they've tested. "On all of the Linksys routers, you cannot manually disable WPS," he said. While the Web interface has a radio button that allegedly turns off WPS configuration, "it's still on and still vulnerable.
|
||||
|
||||
So that's kind of a bummer. You may still want to try disabling WPS on your router if you can, and test it against Reaver to see if it helps.
|
||||
|
||||
You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer.
|
||||
|
||||
Double bummer. So what will work?
|
||||
|
||||
I have the open-source router firmware [DD-WRT][10] installed on my router and I was unable to use Reaver to crack its password. As it turns out, [DD-WRT does not support WPS][11], so there's yet another reason to love the free router-booster. If that's got you interested in DD-WRT, check their [supported devices list][12] to see if your router's supported. It's a good security upgrade, and DD-WRT can also do cool things like [monitor your internet usage][13], [set up a network hard drive][14], act as a [whole-house ad blocker][15], [boost the range of your Wi-Fi network][16], and more. It essentially [turns your $60 router into a $600 router][17].
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://lifehacker.com/5305094/how-to-crack-a-wi+fi-networks-wep-password-with-backtrack
|
||||
[2]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fcode.google.com%2Fp%2Freaver-wps%2F&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[3]:http://www.youtube.com/embed/z1c1OIMbmb0?wmode=transparent&rel=0&autohide=1&showinfo=0&enablejsapi=1
|
||||
[4]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fwww.backtrack-linux.org%2Fdownloads%2F&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[5]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fwww.backtrack-linux.org%2Fdownloads%2F&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[6]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fcode.google.com%2Fp%2Freaver-wps%2F&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[7]:http://lifehacker.com/5305094/how-to-crack-a-wi+fi-networks-wep-password-with-backtrack
|
||||
[8]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Farstechnica.com%2Fbusiness%2Fnews%2F2011%2F12%2Fresearchers-publish-open-source-tool-for-hacking-wifi-protected-setup.ars&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[9]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Farstechnica.com%2Fbusiness%2Fnews%2F2012%2F01%2Fhands-on-hacking-wifi-protected-setup-with-reaver.ars&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[10]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fdd-wrt.com%2F&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[11]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fcode.google.com%2Fp%2Freaver-wps%2Fissues%2Fdetail%3Fid%3D44&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[12]:http://go.redirectingat.com/?id=33330X911647&site=lifehacker.com&xs=1&isjs=1&url=http%3A%2F%2Fdd-wrt.com%2Fwiki%2Findex.php%2FSupported_Devices&xguid=&xcreo=0&sref=http%3A%2F%2Flifehacker.com%2F5873407%2Fhow-to-crack-a-wi%2Bfi-networks-wpa-password-with-reaver&pref=http%3A%2F%2Flifehacker.com%2F5953047%2Fhow-to-crack-wep-and-wpa-wi%2Bfi-passwords&xtz=-480&abp=1
|
||||
[13]:http://lifehacker.com/5821773/how-to-monitor-your-internet-usage-so-you-dont-exceed-your-data-cap
|
||||
[14]:http://lifehacker.com/5756233/get-more-out-of-your-dd+wrt-router-with-an-external-drive?tag=ddwrt
|
||||
[15]:http://lifehacker.com/5680670/turn-your-dd+wrt-enabled-router-into-a-whole-house-ad-blocker?tag=ddwrt
|
||||
[16]:http://lifehacker.com/5563196/turn-your-old-router-into-a-range+boosting-wi+fi-repeater?tag=ddwrt
|
||||
[17]:http://lifehacker.com/178132/hack-attack-turn-your-60-router-into-a-600-router
|
@ -1,95 +0,0 @@
|
||||
translating by coolpigs
|
||||
|
||||
How to Make a YouTube Instructional Screencast Video on Linux
|
||||
================================================================================
|
||||
A picture is worth a thousand words, and a well-crafted how-to video is darned near priceless. Linux has all the tools you need to make high-quality and useful instructional videos. We shall make a simple screencast with the wonderful Kdenlive video editor and the Audacity audio recorder and editor, and learn how to share this splendid screencast on YouTube.
|
||||
|
||||
All you need is your nice Linux PC with Kdenlive and Audacity installed, a good-quality microphone or headset, and a YouTube account. (Yes, there are many other free video-sharing services, and you are welcome to explore them.) YouTube is owned by Google, so Google tries to entice you into rampant sharing with everything and everyone in the world. Just say no if this is not what you want to do.
|
||||
|
||||
Our workflow goes like this:
|
||||
|
||||
- Capture screencast with Kdenlive
|
||||
- Record soundtrack with Audacity
|
||||
- Add soundtrack to Kdenlive
|
||||
- Upload to YouTube
|
||||
- The world views your video and is happy.
|
||||
|
||||
Kdenlive supports most popular digital video formats, including AVI, MP4, H.264, and MOV. It supports image files such as GIF, PNG, SVG, and TIFF, and audio file formats including uncompressed PCM, Vorbis, WAV, MP3 and AC3. You can even read and edit Flash files. In short, it should handle pretty much anything you throw at it.
|
||||
|
||||
Your soundtrack is just as important as your video track. Please, I beg you, pay attention to your audio. Keep it clean and simple, and keep the rambling digressions, verbal tics, and distracting background noises to a minimum. I prefer a good-quality headset for making narrations because you don't have to worry about microphone placement, and you can listen to yourself over and over without driving bystanders insane.
|
||||
|
||||
The Kdenlive documention is outdated and tells you that you need RecordMyDesktop to make screencasts. I have Kdenlive 0.9.4, and it does not need RecordMyDesktop.
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-1-settings.png)
|
||||
|
||||
*Figure 1: Default profile settings.*
|
||||
|
||||
### Making the Screencast ###
|
||||
|
||||
If you're installing Kdenlive for the first time you'll get a configuration wizard at first run. Don't worry too much about the default settings because you can change them anytime. These are the settings I use for my screencasts: HD 720p 30 fps, 1280x720 screen size. How do you know what settings to use? [YouTube tells you][1]. To set these values go to Settings > Configure Kdenlive > Project Defaults > Default Profile > HD 720p 30fps (figure 1), and set the size of your screen capture in Settings > Configure Kdenlive > Capture > Screen Grab (figure 2). You may also choose a Full Screen Capture, though it's better to stick with the dimensions specified by YouTube, because if they're different YouTube adds pillarboxes to make them fit. Your eager viewers want to see a screen filled with glorious content, not pillarboxes.
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-2-settings.png)
|
||||
|
||||
*Figure 2: Screencast screen size.*
|
||||
|
||||
The default YouTube video player size is 640x360 at 320p, which is small and blurry. The player has controls for small, larger, and full-screen, plus multiple quality levels. These are for your viewers only, and you can't change the defaults, which is sad because nothing looks good at 640x360 at 320p. But you still want to make videos with the higher quality settings, and you can always add some text to remind your viewers to try the better settings.
|
||||
|
||||
### Save Your Project ###
|
||||
|
||||
Before you do anything else go to File > Save as to save your project, and remember to save it periodically.
|
||||
|
||||
### Screen Grab ###
|
||||
|
||||
Making your screen capture is easy as pie. Go to the Record Monitor, select Screen Grab, and then hit the Record button. This opens a box with dotted borders on your screen, and everything inside this box is recorded. So all you have to do is move and size the window you want recorded inside the box. Do your thing, then when you're finished click the stop button (figure 3).
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-3-screen-grab.png)
|
||||
|
||||
*Figure 3: Making the screen grab.*
|
||||
|
||||
Clicking Stop automatically opens the Clip Monitor so you can preview your new clip. If you like it, drag it from the Project Tree to the Video 1 track. Now you can edit your new video. There are always bits you'll want to trim; a fast way to do this is to play your clip in the Project Monitor until you get to the end of the part you want to remove. Then Pause, then press Shift+r. This cuts your clip at the point on the timeline that you stopped, so now you have two clips. Click on the one you want to delete and press the Delete key, and poof! It is gone.
|
||||
|
||||
You'll want to drag your remaining clip to whatever point on the timeline you want it to start, and you might want to add some nice transitions. Some simple fades are good; simply right-click on your clip and click Add Effect > Fade > Fade from black and Fade to black, and Kdenlive will automatically place them at the beginning and end.
|
||||
|
||||
### Adding a Soundtrack ###
|
||||
|
||||
Please see [Whirlwind Intro to Audacity on Linux: From Recording to CD in One Lesson][2] to learn the basics of recording with Audacity. Export your recording as a 16-bit WAV file and then import it into Kdenlive via Project > Add Clip. Drag your new audio clip down to one of the Audio tracks. An easy way to make your narration is to play your video track and talk as it plays. With a little luck you won't have to do a lot of cleanup, and your commentary will be in sync with the video.
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-4-audio-gap.png)
|
||||
|
||||
*Fig 4: Cut your track with Shift+r and drag one of the clips away from the cut to create a silent gap.*
|
||||
|
||||
If you're a fast talker and get ahead of your video, you can easily add a space in the audio track. Simply cut your track with Shift+r, and drag one of the clips away from the cut to create a silent gap (figure 4).
|
||||
|
||||
### Rendering Your Project ###
|
||||
|
||||
When you're happy with your edits and ready to export to your final format, click the Render button. This takes a few minutes depending on the speed of your computer and size of your project. There are presets for Web, and if you choose File Rendering you can tweak your settings (figure 5). I've gotten good results with File Rendering > H.264, Video bitrate 12000, and audio 384. H.264 is a super-compressed MPEG-4 format that delivers small file sizes and good quality.
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-5-rendering.png)
|
||||
|
||||
*Fig. 5: Choose File Rendering to tweak your Web settings.*
|
||||
|
||||
### YouTube Bound ###
|
||||
|
||||
Play your new video in VLC or MPlayer or whatever you like, and if it looks good then you're ready to upload to your YouTube account. In typical Google fashion your dashboard and video manager are disorganized and complicated, but keep poking around and you'll figure it out. Before you can do anything you'll have to put your account in good standing, which means getting a code number from Google via text or email. When you prove you're not a bot by entering the code number you'll be able to upload videos.
|
||||
|
||||
You can upload your videos and mark them as either private or public. Google has some editing tools you might like, such as auto-fix and music soundtracks, though in my nearly-humble opinion hardly anyone does background music correctly so it's just annoying. But you might be the first to do it right!
|
||||
|
||||
The most useful editing tool is automatic closed-captioning. I recommend using this on all of your videos, not only for people who can't hear very well but for anyone who has to keep the volume low, and to make sure everyone understands what you're saying. The captioning tool also creates a transcript.
|
||||
|
||||
Another useful tool is the annotations tool, which supports speech bubbles, titles, spotlights, and labels. Of course you can do all this in Kdenlive, so you can try both.
|
||||
|
||||
Well, here we are at the end and it seems we've barely begun. Please share your videos and YouTube tips and tricks in the comments. And while you're at it, please share your new video tutorial with us on [video.linux.com][3] and join the 100 Linux Tutorials Campaign.
|
||||
|
||||
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linux.com/learn/tutorials/745745-how-to-make-a-youtube-instructional-screencast-video-on-linux/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:https://support.google.com/youtube/answer/1722171?hl=en&ref_topic=2888648
|
||||
[2]:http://www.linux.com/learn/tutorials/422799-whirlwind-intro-to-audacity-on-linux
|
||||
[3]:http://video.linux.com/100-linux-tutorials
|
@ -1,4 +1,4 @@
|
||||
bazz2 领了
|
||||
翻译中by Linux-pdz
|
||||
How to convert video to animated gif image on Linux
|
||||
================================================================================
|
||||
Once thought of as outdated art forms, animated GIF images have now come back. If you haven't noticed, quite a few online sharing and social networking sites are now supporting animated GIF images, for example, on [Tumblr][1], [Flickr][2], [Google+][3], and [partly on Facebook][4]. Due to their ease of consumption and sharing, GIF-ed animations are now part of mainstream Internet culture.
|
||||
|
@ -1,3 +1,4 @@
|
||||
NearTan 选题
|
||||
How to setup EPEL repository on CentOS 5/6
|
||||
================================================================================
|
||||
What is EPEL repository
|
||||
|
@ -0,0 +1,61 @@
|
||||
Insights into top 3 IT skill groups in highest demand
|
||||
================================================================================
|
||||
![](http://www.linuxcareer.com/images/linux_it_skills_watch.png)
|
||||
|
||||
According to our [IT skill sets][1] research, IT skills required by employers of Linux talent can be classified into relatively independent groups. This article focuses on the top three groups of IT skills that were in the highest demand in the last quarter (Jul-Sep 2013) and refer to job advertisements in selected countries, including USA. It turns out that these three groups of IT skills can be linked with Linux related job categories.
|
||||
|
||||
It seems that in the last quarter Embedded Devices Developers related skills were in the highest demand by employers of Linux professionals. The second and third skill groups refer to Virtualization Engineering and LAMP Administrator job opportunities, respectively. This article discusses skill requirements for these three types of job listings and provides insights into the dependency structure of pairs of IT skills within the analyzed three groups of skills.
|
||||
|
||||
> If you have not read our [IT Skill Sets][1] article it is recommended to familiarize yourself with this article before you start reading the content below. This article is based on the material presented previously in [IT Skill Sets][1], which explains in detail the methodology used in this study.
|
||||
|
||||
### October 2013 update to IT skills classification ###
|
||||
|
||||
![](http://www.linuxcareer.com/images/percentage_of_linux_job_ads_linked_with_corresponding_skill_groups.png)
|
||||
|
||||
In the IT skill sets article, LinuxCareer.com analyzed the Linux job listings for the period between May and the end of June 2013. We have brought this classification up to date by considering the period of July until the end of September 2013. The percentage of Linux job ads corresponding to ten relatively independent groups of IT skills is displayed in the above bar chart[1]. The following link to the [IT Classification][2] diagram shows how this bar chart was devised based on the classifications. The top three IT skill groups in highest demand are: Embedded Devices Developers with 27% of Linux job market share; Virtualization Engineers with 20% of Linux job market share; and LAMP Administrators with 12% of Linux job market share. In the next three sections of this article we will focus on the identified top 3 IT skill groups and discuss in detail relationships between pairs of skills. For instance, MySQL and PHP are strongly linked and usually required in tandem by employers. Note also that knowledge of Linux is required in every job advertisement taken into account in the study conducted by LinuxCareer.com.
|
||||
|
||||
### Embedded Devices Developers and Programmers ###
|
||||
|
||||
The first set of skills in the highest demand are skills relevant to Embedded Devices Developers and Programmers. Dependency chart[2] below shows more detail pertaining to relationships between pairs of skills. Specifically, it shows which pairs of skills are most likely to appear together in Linux related job advertisements. For instance, Embedded links strongly to C/C++/C#, which is visualized in the graph by either darker shade of a rectangle in the lower part of the graph or larger portion of the corresponding circles shaded in the upper portion of the graph.
|
||||
|
||||
In general, this group of skills can be further split into three segments. These are:
|
||||
|
||||
1. **Android, Embedded, C/C++/C# and Java**. This is the core of the skills you need to know if you would like to work in development of embedded devices. It is possible that either C/C++/C# or Java is required by employers, since Java is based to some extend on C/C++/C#. If you have a look at the October’s IT Skills Watch, Java leads as a programming language with the score of 9513 compared with the C/C++/C# score of 5403. Therefore, in general, if you stand before a choice between mastering of C/C++/C# or Java, Java seems to be a better choice. However, according to the graph below, C/C++/C# seems to appear more frequently in the advertisements relevant to Embedded devices. This suggests that, even though Java gets a higher general score in IT Skills Watch, mastering of C/C++/C# rather than Java is required for Embedded Devices Developer positions.
|
||||
1.** Python, Perl and Bash**. These set of skills are a complementary set of programming and scripting skills. Perl and Python seem to appear often together in job advertisements, however, it is reasonable to assume that these two skills are required alternatively.
|
||||
1. **Git, Subversion and Jira**. These skills pertain to source code management, debugging and project management. Some knowledge of these skills is certainly an advantage to programming related projects. Currently, the majority of open source development projects and a large number of corporate projects use such software to manage their source code.
|
||||
|
||||
![](http://www.linuxcareer.com/images/embedded_devices_development_skills_demand_dependency.png)
|
||||
|
||||
### Virtualization Engineers including skills related to data storage and management ###
|
||||
|
||||
The second group of skills that are currently in demand are the group of skills relating to job advertisements relevant to Virtualization Engineering job opportunities as illustrated in the dependency chart[2] below. This group can be further divided into two segments. The first segment of skills is Redhat, VMware, vSphere, ESX/ESXi, XenServer and Citrix. These skills are paramount for Virtualization Engineering job opportunities. The second segment of skills are skills relevant to Unix Systems, Data Storage and Management. It appears that these two segments are closely related. It is not a surprise that VMware comes together with ESX/ESXi and vSphere since ESX/ESXi is a computer virtualization product offered by VMware and vSphere is VMware’s cloud computing virtualization operating system. It is also interesting that Redhat has been grouped with VMware and Citrix products. The strong relation of Solaris and AIX could be a consequence of the fact that they are both proprietary Unix Systems and possibly knowledge of either one of them is sufficient.
|
||||
|
||||
![](http://www.linuxcareer.com/images/virtualization_engineering_skills_demand_dependency.png)
|
||||
|
||||
### LAMP Administrators ###
|
||||
|
||||
Finally, the third group of skills is the type of skills required by employers of LAMP administrators exhibited in the dependency chart[2] below. LAMP stands for Linux Apache MySQL and PHP. All these skills are a core for a LAMP administrator. This is a relatively small group of skills that can take you far in your Linux career. In particular, the strong relation of PHP and MySQL suggests that one of these skills cannot come without the other.
|
||||
|
||||
![](http://www.linuxcareer.com/images/lamp_administrator_skills_demand_dependency.png)
|
||||
|
||||
### Conclusion ###
|
||||
|
||||
In terms of employability and groups of skills relevant to Linux professionals, this article has identified two important points. The first point shows ten groups of IT skills that were identified by clustering analysis of the most frequently appearing IT skills. The second point of this article shows that the highest demand exists for Embedded Devices and Programmers positions as indicated in the Percentage of Linux job ads linked with corresponding skill groups bar chart. This is followed by job advertisements relevant to Virtualisation Engineering positions and LAMP administrator positions. These three skill groups are core Linux related professions in the last quarter analyzed.
|
||||
|
||||
### References ###
|
||||
|
||||
[1] Percentage of Linux job ads linked with corresponding skill groups created by [GNU R][3]. Relevant package: graphics.
|
||||
|
||||
[2] Dependency charts created by [GNU R][3]. Relevant package: corrgram.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linuxcareer.com/insights-into-top-3-it-skills-groups-in-highest-demand
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.linuxcareer.com/it-skill-sets
|
||||
[2]:http://www.linuxcareer.com/images/Linux_jobs_classification_jul_oct_2013.png
|
||||
[3]:http://www.r-project.org/
|
@ -0,0 +1,89 @@
|
||||
Install Oracle Java 7 in Elementary OS ‘Luna’ Via PPA
|
||||
================================================================================
|
||||
**Question**: How can I install Oracle Java 7 in Elemetary OS Luna?
|
||||
|
||||
**Answer**: To install Java 7 in Elementary OS Luna follow the steps below:
|
||||
|
||||
Since Elementary OS is Ubuntu based we are at liberty to use **WEPUD8 PPA** which has various Java packages in it.
|
||||
|
||||
1. Open Terminal.
|
||||
|
||||
2. Run the command below to add Java PPA to your repository:
|
||||
|
||||
$ sudo add-apt-repository ppa:webupd8team/java
|
||||
|
||||
You are about to add the following PPA to your system:
|
||||
Oracle Java (JDK) Installer (automatically downloads and installs Oracle JDK6 / JDK7 / JDK8). There are no actual Java files in this PPA. More info: http://www.webupd8.org/2012/01/install-oracle-java-jdk-7-in-ubuntu-via.html
|
||||
Debian installation instructions: http://www.webupd8.org/2012/06/how-to-install-oracle-java-7-in-debian.html
|
||||
More info: https://launchpad.net/~webupd8team/+archive/java
|
||||
Press [ENTER] to continue or ctrl-c to cancel adding it
|
||||
|
||||
3. Press ENTER to continue
|
||||
|
||||
gpg: keyring `/tmp/tmpB5WwDG/secring.gpg' created
|
||||
gpg: keyring `/tmp/tmpB5WwDG/pubring.gpg' created
|
||||
gpg: requesting key EEA14886 from hkp server keyserver.ubuntu.com
|
||||
gpg: /tmp/tmpB5WwDG/trustdb.gpg: trustdb created
|
||||
gpg: key EEA14886: public key "Launchpad VLC" imported
|
||||
gpg: Total number processed: 1
|
||||
gpg: imported: 1 (RSA: 1)
|
||||
OK
|
||||
|
||||
4. Now update your system
|
||||
|
||||
$ sudo apt-get update
|
||||
|
||||
5. Install Java 7 by running the command below:
|
||||
|
||||
$ sudo apt-get install oracle-java7-installer
|
||||
|
||||
[sudo] password for enock:
|
||||
Reading package lists... Done
|
||||
Building dependency tree
|
||||
Reading state information... Done
|
||||
The following packages were automatically installed and are no longer required:
|
||||
gir1.2-gstreamer-0.10 libilmbase6 libmagickcore4 libmagickwand4 libcdt4
|
||||
libmagickcore4-extra liblqr-1-0 imagemagick-common libpathplan4 libopenexr6
|
||||
rsync netpbm libgvc5 libnetpbm10 libgraph4
|
||||
Use 'apt-get autoremove' to remove them.
|
||||
The following extra packages will be installed:
|
||||
gsfonts-x11 java-common
|
||||
Suggested packages:
|
||||
default-jre equivs binfmt-support visualvm ttf-baekmuk ttf-unfonts
|
||||
ttf-unfonts-core ttf-kochi-gothic ttf-sazanami-gothic ttf-kochi-mincho
|
||||
ttf-sazanami-mincho ttf-arphic-uming
|
||||
The following NEW packages will be installed:
|
||||
gsfonts-x11 java-common oracle-java7-installer
|
||||
0 upgraded, 3 newly installed, 0 to remove and 196 not upgraded.
|
||||
Need to get 88.5 kB of archives.
|
||||
After this operation, 473 kB of additional disk space will be used.
|
||||
Do you want to continue [Y/n]?
|
||||
|
||||
6. Type **Y** for Yes and Press enter to continue installation.
|
||||
|
||||
7. During the installation, you need to agree to the license to continue. Select **OK**.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/JDK-ask1.png)
|
||||
|
||||
8. Then Select **Yes** to continue.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/JDK-ask2.png)
|
||||
|
||||
9. Now relax for the packages to be downloaded and installed automatically:
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/JDK-Downloading.png)
|
||||
|
||||
7. Installation has been completed successfully. You can now check the version of Java from the Terminal:
|
||||
|
||||
$ java -version
|
||||
java version "1.7.0_45"
|
||||
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
|
||||
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.unixmen.com/install-oracle-java-7-elementary-os-luna-via-ppa/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,45 @@
|
||||
Linux Mint Respond to Ubuntu Developer’s ‘Vulnerable’ Claim
|
||||
================================================================================
|
||||
**It’s never a particularly tasty task having to write a news article on something that you know is going to cause headache and upset in the wider community.**
|
||||
|
||||
Earlier today I had to grin and bear it as I did just that in an article relaying comments made by Canonical engineer Oliver Grawert in which he branded Linux Mint a “‘vulnerable’ system” due to the way the distro provides security updates to users.
|
||||
|
||||
*Tl;dr: they don’t. (At least, not automatically.)*
|
||||
|
||||
A Canonical developer highlighting security concerns with another distro might sound like pure click bait on paper, but in practice it has important ramifications for users. Security is important, even on a platform that most perceive as invincible.
|
||||
|
||||
> ‘To put my own Top Trumps cards on the table, I was unaware that Mint held back security updates…’
|
||||
|
||||
Whether you agreed with Oliver’s take on Mint’s approach or not, **his comments were worth relaying**. These weren’t made by someone with an axe to grind.. They were informed by his esteemed position as an Ubuntu engineer. He knows what he’s talking about. Whether correct or misplaced, his comments have resulted in positive discussions about how security update practices should be handled.
|
||||
|
||||
To put my own Top *Trump™* cards on the table, I was unaware that Mint held back security updates for packages like Xorg and the Linux Kernel. So, at the very least, this mini-furore – borne largely out of knee-jerk reaction to the comments rather than their content in intent – has served a purpose.
|
||||
|
||||
### Mint Respond ###
|
||||
|
||||
Linux Mint head-honco Clement Lefebvre has since responded to the remarks, saying that he and his team of developers are “very happy with the filtering system” for security updates in Mint.
|
||||
|
||||
> ” We explained why the Ubuntu update policy was not good enough for us and we consequently developed the update manager to solve that particular problem.
|
||||
>
|
||||
> Firefox doesn’t come to you later in Mint than it does in Ubuntu (it’s a level 2 update).
|
||||
>
|
||||
> Yes, by default you get updates in Ubuntu for kernels and Xorg and not in Mint. Yes, there’s a very good reason for that.”
|
||||
|
||||
While Lefebvre doesn’t expand on precisely what that “very good reason” is, the general consensus on the web seems to be that Kernel and Xorg updates are held back because of the stability and performance issues that sometimes arise after upgrading.
|
||||
|
||||
Which, in many ways, is understandable.
|
||||
|
||||
Linux Mint don’t prevent their users from installing these updates but they are not enabled by default.
|
||||
|
||||
For further information on Linux Mint’s approach to security refer to the following blog post.
|
||||
|
||||
- [Linux Mint – Security Vs Stability][1]
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/linux-mint-responds-ubuntu-developers-security-claims
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://segfault.linuxmint.com/2013/11/answering-controversy-stability-vs-security-is-something-you-configure/
|
@ -1,52 +0,0 @@
|
||||
NearTan 选题
|
||||
Linux Uptime Command – Find How Long Your System Been Running
|
||||
================================================================================
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/linux-uptime-command.png)
|
||||
|
||||
Information about how long the system has been running may not critical for some people. But for server administrators, it is critical. Servers which running mission critical application must be running as long as possible. Sometimes it must be zero-downtime. So, how can we know information about it?
|
||||
|
||||
On Linux operating system, we can use uptime command. You don’t need root privileges to run this command. This command also already installed on Linux system by default.
|
||||
|
||||
The syntax is like this :
|
||||
|
||||
$ uptime
|
||||
|
||||
You may see an output like this :
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime.png)
|
||||
|
||||
This information is provided in **/proc/uptime** file. Even the file is text based, but it’s a raw information which is not directly human-readable. That’s why we need uptime command to translate it.
|
||||
|
||||
Here’s how to read the information provided by uptime :
|
||||
|
||||
### System Time ###
|
||||
|
||||
You see at the Figure 1 above, the first information on the left side is **14:04:39**. It shows you the system time in 24 hours format.
|
||||
|
||||
### System Uptime ###
|
||||
|
||||
The second information is **Up 1004 days, 12:20.** It give you a timeframe how long the system has been running. From the Figure 1, it shows you that the system has been running for 1004 days and 12 hours – 20 minutes. If the system has not pass 24 hours then it will show you only hours and / or minutes timeframe. Take a look at Figure 2 and Figure 3 below. When the system is restarted then the counter will be reset to zero.
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime_minutes.png)
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime_hours1.png)
|
||||
|
||||
### Numbers of Users Logged In ###
|
||||
|
||||
The third information is uptime shows you numbers of users logged in. Figure 1 show you that there is **1 user** logged at that time. When there is multiple user logged in, uptime will tell you the numbers.
|
||||
|
||||
### Load Average ###
|
||||
|
||||
The last information is about the average load of the system. From the Figure 1 again you see numbers **0.25, 0.25, 0.19**. The two decimal point is translated as a percentage. 0.25 means 25% and 0.19 means 19%.
|
||||
|
||||
While the sequence 0.25, 0.25, 0.19 represent for the past 1 minutes, 5 minutes and 15 minutes. The lower numbers you get mean the better your system will perform.
|
||||
|
||||
That’s the usage of the **uptime** command in daily used. For more detailed information, please refer to uptime manual page by typing **man uptime** in your Linux console.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://linoxide.com/linux-command/linux-uptime-command/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,84 @@
|
||||
Linux chief: ‘Open source is safer, and Linux is more secure than any other OS
|
||||
================================================================================
|
||||
In an interview with Linux Foundation executive director Jim Zemlin, VentureBeat got a bird’s-eye view of the future of the open-source operating system for 2014.
|
||||
|
||||
We also addressed the controversial issues of government spying and “backdoors” — those nefarious windows into our personal online lives that the public recently discovered in most of the services we use every day.
|
||||
|
||||
Zemlin gave us the skinny on how and why GNU/Linux remains the most secure option for concerned consumers — and why it’s becoming the OS of choice for powering cars, phones, TVs, and all kinds of emerging devices.
|
||||
|
||||
Here’s our e-mail transcript in a bare-naked Q&A format.
|
||||
|
||||
----------
|
||||
|
||||
**VentureBeat: Security and privacy has been the hottest topic this year, bar none. We’ve heard rumors that Linus [Torvalds, Linux creator] OK’d a Linux backdoor for the government.**
|
||||
|
||||
**Zemlin**: If there were a backdoor in Linux, you’d know it.
|
||||
|
||||
The whole world can see every line of code in Linux. This is one of the reasons Linux is more secure than other operating systems and why open-source software overall is a safer than closed software. The transparency of the code ensures it’s secure.
|
||||
|
||||
And for the record: He wasn’t approached.
|
||||
|
||||
**VentureBeat: How committed is the foundation to preserving Linux users’ privacy and freedom from tracking/surveillance?**
|
||||
|
||||
**Zemlin**: As committed as we have always been. It’s very difficult to insert something into the kernel that would violate privacy and freedom without thousands of developers noticing. The nature of Linux is that it’s self-policing.
|
||||
|
||||
**VentureBeat: Do you think there’s any chance that this year’s privacy/security/surveillance issues has driven or will drive more consumers toward Linux?**
|
||||
|
||||
**Zemlin**: Around the world, I am hearing people say, “Using open source is a critical to ensure privacy.” So yes, I think that will drive more users people to Linux.
|
||||
|
||||
I also think more consumers are being driven toward Linux for a variety of reasons, in addition to the confidence and trust they have about privacy and security related to the platform. The transparency of the code and development process gives increasingly knowledgeable and aware consumers an option they feel good about.
|
||||
|
||||
[Video game publisher] Valve and [its work on SteamOS][1] is driving more consumers to Linux, as is the ongoing dominance of Android and other consumer devices that run Linux — from televisions to appliances, cars, and more.
|
||||
|
||||
**VentureBeat: Do you have any thoughts on the Ubuntu Edge for phones? Where do you see the market for Linux/Ubuntu phones going in 2014-2015?**
|
||||
|
||||
**Zemlin**: I like seeing potentially interesting new products go to market, especially when they’re Linux-based. It is hard to predict what product will produce a big hit in the phone market from year to year.
|
||||
|
||||
I don’t think it is a stretch to predict phones based on Linux will dominate. Android, Tizen, Ubuntu, Firefox, and more show that Linux can drive innovation in the mobile market and create new experiences for consumers and market opportunities for developers and OEMs.
|
||||
|
||||
What’s exciting about the year ahead, and what I’ll be watching, is how Linux and open source will help connect all of these devices, objects, and services together.
|
||||
|
||||
**VentureBeat: What’s the most exciting use case you’ve seen so far for Linux embedded in automobile systems?**
|
||||
|
||||
**Zemlin**: No question it’s the in-vehicle-infotainment systems being built by Cadillac, Tesla, Toyota, Jaguar, Land Rover, and others.
|
||||
|
||||
For example, the Tesla Model S, which won the Motor Trend Car of the Year [honor] in 2013, features a 17-inch flat-screen computer running a custom-built Linux OS. This is really, really cool stuff.
|
||||
|
||||
And the 2014 Motor Trend Car of the Year was just revealed — the Cadillac CTS sedan — and it also uses Linux for its in-vehicle-infotainment system. Car makers are able to innovate and differentiate with these systems using Linux.
|
||||
|
||||
The success of Linux here can be seen in the latest numbers from IHS Automotive, which reported this month that sales of automotive Linux are expected to rise to 53.7 million units in 2020, passing Microsoft and Blackberry QNX in the global automotive infotainment market.
|
||||
|
||||
The Linux Foundation does a lot of work in this area with its Automotive Grade Linux workgroup. By hosting a neutral, supportive environment among the Linux kernel community, other open-source communities, and the automotive industry, we’re able to help advance automotive Linux technologies among some of the world’s largest automakers including Nissan, Jaguar, Land Rover, Toyota, and more.
|
||||
|
||||
**VentureBeat: How is Linux growing beyond the hardcore developer market, especially with regard to consumers and gamers?**
|
||||
|
||||
**Zemlin**: This year has been a turning a point for Linux with gamers for sure. Valve, the gaming company behind the Steam web platform for Linux, builds and runs all of its source code and animation on Linux. Valve’s CEO Gabe Newell reported at LinuxCon this year that they’re running 198 games on Linux, and with the introduction of the Linux-based Steam, that number will only continue to go up. This is the beginning of a new trend for Linux and gaming.
|
||||
|
||||
Consumers use Linux every day. It is the software that runs our lives. Companies like Google, Facebook, and Twitter are built on Linux and open-source software. At our LinuxCon Europe conference in October, Twitter’s Chris Aniszczyk told the audience: “Twitter is of course all running on Linux. Why would you need anything else?”
|
||||
|
||||
Linux now powers the 1.3 million Android phones that are activated daily, and most of the nearly 600,000 new TVs sold every day. New appliances and cars are being built with Linux. Major transportation systems use the operating system. The superpopular [GoPro uses Linux and open source][2]. The examples are endless.
|
||||
|
||||
And Linux and open source will just keep reaching more into mainstream consumer life. Samsung uses the Linux kernel and Linux-based products throughout its product line, from TVs to phones to home appliances and more.
|
||||
|
||||
Stay tuned — you’ll see more coming that illustrates the growing role of Linux and open source software and collaborative development in everyday life.
|
||||
|
||||
**VentureBeat: What are the biggest opportunities for free and open-source software in 2014, in your opinion?**
|
||||
|
||||
**Zemlin**: We’ve talked about gaming and consumer devices, but the enterprise continues to present even more opportunity for Linux. The rise of cloud computing is creating new challenges for developers and new opportunities for growth. Try to find a public cloud that’s not running Linux.
|
||||
|
||||
The realization of years of promise in software defined networking will be one of the major stories of 2014. People don’t appreciate how big software defined networking and network function virtualization will become. Think about it. Billions of dollars are spent on hardware based switches, routers, load balancers, firewalls, etc.; this is all being abstracted into software. More importantly it is being abstracted via open source software in the sweet spot for OSS which is at this infrastructure layer. I think you’ll see projects like OpenDaylight and others have a big breakout year in 2014.
|
||||
|
||||
Of course, this is all part of a broader trend towards collaborative development, which should be of interest to your readers. I’d predict that in another decade nearly all of infrastructure software will be built collaboratively. Developers in 2014 need to learn how to build software collaboratively and how to work on and contribute to open source software projects. Their career opportunities will be endless if they understand the principles of collaborative development and open source software.
|
||||
|
||||
It’s a thrilling time to be involved in Linux. It’s become the de facto platform to go to for everything from smart watches to TVs to automobiles, you name it.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://venturebeat.com/2013/11/26/linux-chief-open-source-is-safer-and-linux-is-more-secure-than-any-other-os-exclusive/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://venturebeat.com/2013/09/23/steamos-valves-linux-based-operating-system-for-the-tv-and-living-room/
|
||||
[2]:http://gopro.com/support/open-source
|
@ -0,0 +1,31 @@
|
||||
Senior researchers analyzed LibreOffice with interesting conclusions
|
||||
================================================================================
|
||||
Users, editors, state departments, teams and city administrations are enjoying [LibreOffice][1], free open-source office suite proving itself a clear success across the globe with more and more adoptions, more and more positive feedback.
|
||||
|
||||
While the users perceive LibreOffice as no-compromise and powerful, it seems that serious researchers have also found and described LibreOffice as a true success, as in the case of the "**Sustainability of Open Source software communities beyond a fork: How and why has the LibreOffice project evolved?**" document, too.
|
||||
|
||||
Essentially, "Sustainability of Open Source software communities beyond a fork: How and why has the LibreOffice project evolved?" is a research document [focused][2] on LibreOffice and its components, ranging from status to public perception, future capabilities, ability to attract supporters and contributors.
|
||||
|
||||
The conclusions of the mentioned document, while natural, talk about LibreOffice as a success on all fronts, conclusions such as:
|
||||
|
||||
- "The LibreOffice project, which was forked from the OpenOffice.org project, shows no sign of
|
||||
- long-term decline"
|
||||
- "LibreOffice has attracted the long-term and most active committers in OpenOffice.org"
|
||||
- "Open Source communities can outlive Open Source software projects"
|
||||
- "LibreOffice is perceived by its community as supportive, diversified, and independent"
|
||||
|
||||
![](http://iloveubuntu.net/pictures_me/libreoffice%20reasearch%20highlights.png)
|
||||
|
||||
The serious 60-pages-long document (available for download on [http://www.sciencedirect.com/science/article/pii/S0164121213002744/pdfft...][3]) presents LibreOffice as detailed, being an in-depth accurate analysis of the robust office suite, document written by senior researchers from the University of Skövde’s Informatics Research Centre.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://iloveubuntu.net/senior-researchers-analyzed-libreoffice-interesting-conclusions
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.libreoffice.org/
|
||||
[2]:http://www.sciencedirect.com/science/article/pii/S0164121213002744
|
||||
[3]:http://www.sciencedirect.com/science/article/pii/S0164121213002744/pdfft?md5=4b986a117fb06cc127b854cb5f622bec&pid=1-s2.0-S0164121213002744-main.pdf
|
189
sources/Setup FTP Server On openSUSE 13.1.md
Normal file
189
sources/Setup FTP Server On openSUSE 13.1.md
Normal file
@ -0,0 +1,189 @@
|
||||
Setup FTP Server On openSUSE 13.1
|
||||
================================================================================
|
||||
**vsftpd** (**V**ery **S**ecure **F**ile **T**ransport **P**rotocol **D**aemon) is a secure, fast FTP server for Unix/Linux systems. In this how-to article, let us see how to setup a basic FTP server using vsftpd on openSUSE 13.1.
|
||||
|
||||
### Install vsftpd ###
|
||||
|
||||
Login as root user and Enter the following the following command.
|
||||
|
||||
# zypper in vsftpd
|
||||
|
||||
Start vsftpd service and make it to start automatically on every reboot.
|
||||
|
||||
# systemctl enable vsftpd.service
|
||||
# systemctl start vsftpd.service
|
||||
|
||||
### Configure vsftpd ###
|
||||
|
||||
Create a folder for ftp users.
|
||||
|
||||
# mkdir /srv/ftp
|
||||
|
||||
Create a group called **ftp-users**.
|
||||
|
||||
# groupadd ftp-users
|
||||
|
||||
Let us create a sample user called unixmen with home directory **/srv/ftp** and group **ftp-users**.
|
||||
|
||||
# useradd -g ftp-users -d /srv/ftp/ unixmen
|
||||
|
||||
Set password for the new user.
|
||||
|
||||
# passwd unixmen
|
||||
|
||||
Make the ftp home directory **/srv/ftp/** accessible by ftp users.
|
||||
|
||||
# chmod 750 /srv/ftp/
|
||||
# chown unixmen:ftp-users /srv/ftp/
|
||||
|
||||
Edit file vsftpd.conf,
|
||||
|
||||
# nano /etc/vsftpd.conf
|
||||
|
||||
Make the changes as shown below.
|
||||
|
||||
[...]
|
||||
#Uncomment and Set YES to enable write.
|
||||
write_enable=YES
|
||||
[...]
|
||||
# Uncomment and Set banner name for your website
|
||||
ftpd_banner=Welcome to Unixmen FTP service.
|
||||
[...]
|
||||
# Uncomment
|
||||
ls_recurse_enable=YES
|
||||
[...]
|
||||
# Uncomment and set YES to allow local users to log in.
|
||||
local_enable=YES
|
||||
[...]
|
||||
# To disable anonymous access, set NO.
|
||||
anonymous_enable=NO
|
||||
[...]
|
||||
# Uncomment to enable ascii download and upload.
|
||||
ascii_upload_enable=YES
|
||||
ascii_download_enable=YES
|
||||
[...]
|
||||
## Add at the end of this file ##
|
||||
use_localtime=YES
|
||||
|
||||
Save and exit file.
|
||||
|
||||
### Test FTP Server Locally ###
|
||||
|
||||
First let us try to login to our FTP server as shown below.
|
||||
|
||||
# ftp localhost
|
||||
Trying ::1:21 ...
|
||||
Connected to localhost.
|
||||
220 (vsFTPd 3.0.2)
|
||||
Name (localhost:root): unixmen
|
||||
331 Please specify the password.
|
||||
Password:
|
||||
230 Login successful.
|
||||
Remote system type is UNIX.
|
||||
Using binary mode to transfer files.
|
||||
ftp>
|
||||
|
||||
As you in the above output, we will be able to login to ftp server using unixmen user.
|
||||
|
||||
### Test FTP Server Remotely ###
|
||||
|
||||
By default openSUSE built-in firewall won’t allow to login to FTP from remote systems. So let us allow vsftpd service through suse firewall. To do that go to **Yast -> Security and Users -> Firewall**.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/openSUSE-12.3-Running-Oracle-VM-VirtualBox_001.jpg)
|
||||
|
||||
In the Firewall section, go to **Allowed Services**. In the zone selection drop down box, select **External Zone** and in Service to Allow drop-down box, select **vsftpd server** and click add.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/openSUSE-12.3-Running-Oracle-VM-VirtualBox_004.jpg)
|
||||
|
||||
Click Next and close Yast Control center.
|
||||
|
||||
Now try to connect from a remote system.
|
||||
|
||||
I tried to login to FTP server from my ubuntu desktop.
|
||||
|
||||
sk@sk:~$ ftp 192.168.1.53
|
||||
Connected to 192.168.1.53.
|
||||
220 (vsFTPd 3.0.2)
|
||||
Name (192.168.1.53:sk): unixmen
|
||||
331 Please specify the password.
|
||||
Password:
|
||||
230 Login successful.
|
||||
Remote system type is UNIX.
|
||||
Using binary mode to transfer files.
|
||||
ftp>
|
||||
|
||||
As you see in the above output, I will be able to connect to FTP server. If you doesn’t allow the vsftpd service through firewall you will get a Connection timed out error.
|
||||
|
||||
### Connect from Browser ###
|
||||
|
||||
Open up your browser and Navigate to **ftp://ip-address/**. Enter the ftp user name and password.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/Index-of-ftp-192.168.1.53-Mozilla-Firefox_005.jpg)
|
||||
|
||||
### Connect to FTP server using FileZilla ###
|
||||
|
||||
Working from command-line mode might be little bit annoying to newbies. So let us install a graphical FTP client called [**Filezilla**][1] to get things done quite easier:
|
||||
|
||||
Mostly all distribution will have filezilla client in their official repository. To install filezilla on Linux based systems enter the following command:
|
||||
|
||||
On Ubuntu based systems:
|
||||
|
||||
$ sudo apt-get install filezilla
|
||||
|
||||
On Fedora/Redhat systems:
|
||||
|
||||
$ sudo yum install filezilla
|
||||
|
||||
On openSUSE:
|
||||
|
||||
# zypper in filezilla
|
||||
|
||||
After installing filezilla open it. Enter the ftp server IP address, user name and password and click quickconnect.
|
||||
|
||||
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/unixmen@192.168.1.53-FileZilla_006.jpg)
|
||||
|
||||
For added security, you can restrict FTP access to certain users by adding them to **/etc/vsftpd.chroot_list** file.
|
||||
|
||||
Edit vsftpd.conf file,
|
||||
|
||||
nano /etc/vsftpd.conf
|
||||
|
||||
Make the changes as shown below.
|
||||
|
||||
[...]
|
||||
# Uncomment and set YES
|
||||
chroot_local_user=YES
|
||||
chroot_list_enable=YES
|
||||
chroot_list_file=/etc/vsftpd.chroot_list
|
||||
[...]
|
||||
|
||||
Create **file /etc/vsftpd.chroot_list**,
|
||||
|
||||
nano /etc/vsftpd.chroot_list
|
||||
|
||||
Add the users that you want to give access to FTP server. I added the user **unixmen**.
|
||||
|
||||
unixmen
|
||||
|
||||
Restart ftp service.
|
||||
|
||||
# systemctl restart vsftpd.service
|
||||
|
||||
Now you will be able to connect to FTP server with users who are listed in the chroot list file.
|
||||
|
||||
If users other than in the chroot list want to access FTP server, they will get the following error.
|
||||
|
||||
500 OOPS: could not read chroot() list file:/etc/vsftpd.chroot_list
|
||||
ftp: Login failed
|
||||
|
||||
That’s it for now. Your FTP server is ready to use. Enjoy!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.unixmen.com/setup-ftp-server-opensuse-13-1/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:https://filezilla-project.org/
|
@ -0,0 +1,38 @@
|
||||
SuperTuxKart 0.8.1 Release Candidate Revved Up And Ready for Testing
|
||||
================================================================================
|
||||
**Hands up if you don’t like open-source racing game SuperTuxKart? You, folks, are strange.**
|
||||
|
||||
As kart-racers go, it’s one of the most popular freely available. And for good reason: it’s fun, easy to play and has a dedicated team of developers who are continually adding to and improving what is already a really polished game.
|
||||
|
||||
But it’s getting even better. The first release candidate of build 0.8.1 – the first update since last year’s 0.8 build – [has been made available for testing][1] (for ‘testing’ see ‘excuse to play it for hours and not feel guilty’).
|
||||
|
||||
SuperTuxKart 0.8.1 adds a number of improvements, including:
|
||||
|
||||
- A new Star Trek themed track “STK Enterprise”
|
||||
- Three tracks updated (‘Old Mines’, ‘Lighthouse’ & ‘Zen Garden’)
|
||||
- New ‘Egg Hunt’ and ‘Soccer’ modes
|
||||
- New and updated karts
|
||||
- New difficulty level
|
||||
- Bubblegum shield weapon
|
||||
- Option to save and resume Grand Prix mode
|
||||
- [WiiMote Support][2]
|
||||
|
||||
### Geting SuperTuxKart 0.8.1 ###
|
||||
|
||||
No release date has been given on when to expect the final, stable release of 0.8.1 but I’d expect it to land sometime in December – marking one year from the previous release in the 0.8.x series.
|
||||
|
||||
In the meantime, if you’re okay with “Release Candidate”-quality software, you’ll find a pre-compiled binary for Linux over on the project’s Sourceforge Page.
|
||||
|
||||
- [Download SuperTuxKart 0.8.1 Release Candidate][3]
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/supertux-kart-0-8-1-release-candidate
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://supertuxkart.blogspot.co.uk/2013/11/supertuxkart-081-rc1.html
|
||||
[2]:http://supertuxkart.net/Wiimote
|
||||
[3]:http://sourceforge.net/projects/supertuxkart/files/SuperTuxKart/0.8.1-rc1/
|
@ -1,127 +0,0 @@
|
||||
23 The Linux Kernel: Configuring the Kernel Part 19
|
||||
================================================================================
|
||||
![](http://www.linux.org/attachments/slide-jpg.626/)
|
||||
|
||||
Aloha and welcome to the next article of the Linux kernel series! We are getting closer to the end of the configuration process. In this article, we will discuss firmware drivers and then the filesystem drivers.
|
||||
|
||||
The first driver in this category is for finding the boot-disk (BIOS Enhanced Disk Drive calls determine boot disk). Sometimes, Linux does not know which drive is the bootable drive. This driver allows the kernel to ask the BIOS. Linux then stores the information on sysfs. Linux needs to know this for setting up bootloaders.
|
||||
|
||||
Even if BIOS EDD services are compiled in the kernel, this option can set such services to be inactive by default (Sets default behavior for EDD detection to off ). EDD stands for Enhanced Disk Drive.
|
||||
|
||||
When using kexec to load a different kernel, performance can be increased by having the firmware provide a memory map (Add firmware-provided memory map to sysfs).
|
||||
|
||||
The "Dell Systems Management Base Driver" gives the Linux kernel better control of the Dell hardware via the sysfs interface.
|
||||
|
||||
The hardware's information can be accessed by the software via /sys/class/dmi/id/ with this driver enabled (Export DMI identification via sysfs to userspace). DMI stands for Desktop Management Interface. The DMI manages the components of the hardware and can access the hardware's data. The structure of the data in the BIOS and hardware is regulated by the System Management BIOS (SMBIOS) specification.
|
||||
|
||||
The raw data tables from the DMI can be accessed with this driver (DMI table support in sysfs).
|
||||
|
||||
To boot from an iSCSI driver, enable this driver (iSCSI Boot Firmware Table Attributes).
|
||||
|
||||
The last firmware driver is a set of "Google Firmware Drivers". These are drivers for Google-specific hardware. Do not enable this driver unless you work for Google and need to use Linux on such hardware or if you are making a Linux kernel for a computer you stole from Google.
|
||||
|
||||
Next, we can configure the file system support of the kernel.
|
||||
|
||||
The "Second extended fs support" driver provides the EXT2 filesystem. [http://www.linux.org/threads/ext-file-system.4365/][1]
|
||||
|
||||
![](http://www.linux.org/attachments/kernel_19-png.627/)
|
||||
|
||||
The "Ext2 extended attributes" offers the ability to use extra metadata not natively supported by the filesystem.
|
||||
|
||||
The "Ext2 POSIX Access Control Lists" driver adds additional permission schemes not native to EXT2.
|
||||
|
||||
The "Ext2 Security Labels" enhances the security provided by SElinux.
|
||||
|
||||
Enabling "Ext2 execute in place support" allows executables to be executed in the current location without being executed using the paged cache.
|
||||
|
||||
The EXT3 filesystem is offered by this driver (Ext3 journaling file system support). [http://www.linux.org/threads/ext-file-system.4365/][2]
|
||||
|
||||
The "Default to 'data=ordered' in ext3" driver sets the data ordering mode to "Ordered". This deals with the way the journaling and writing work. Data ordering is explained in this article - [http://www.linux.org/threads/journal-file-system.4136/][3]
|
||||
|
||||
The "Ext3 extended attributes" offers the ability to use extra metadata not natively supported by the filesystem. Again, the following EXT3 drivers/features are the same as for EXT2 - "Ext3 POSIX Access Control Lists" and "Ext3 Security Labels". Also, the same is true for the following EXT4 drivers/features - "Ext4 POSIX Access Control Lists", "Ext4 Security Labels", and "EXT4 debugging support".
|
||||
|
||||
Journal Block Device debugging is supported by EXT3 (JBD debugging support) and EXT4 (JBD2 debugging support).
|
||||
|
||||
The next driver offers the Reiser filesystem (Reiserfs support). [http://www.linux.org/threads/reiser-file-system-reiser3-and-reiser4.4403/][4]
|
||||
|
||||
Debugging exists for the Reiser filesystem (Enable reiserfs debug mode).
|
||||
|
||||
The kernel can store ReiserFS statistics in /proc/fs/reiserfs (Stats in /proc/fs/reiserfs).
|
||||
|
||||
The following Reiser drivers/features are the same as the ones for EXT2/3/4 - "ReiserFS extended attributes", "ReiserFS POSIX Access Control Lists", and "ReiserFS Security Labels".
|
||||
|
||||
JFS is also supported by the Linux kernel and includes various features - "JFS filesystem support", "JFS POSIX Access Control Lists", "JFS Security Labels", "JFS debugging", and "JFS statistics". [http://www.linux.org/threads/journaled-file-system-jfs.4404/][5]
|
||||
|
||||
Again, XFS is supported with drivers/features that can be enabled - "XFS filesystem support", "XFS Quota support", "XFS POSIX ACL support", "XFS Realtime subvolume support", and "XFS Debugging support". [http://www.linux.org/threads/xfs-file-system.4364/][6]
|
||||
|
||||
The Global FileSystem 2 is supported by the Linux kernel (GFS2 file system support). This filesystem is used to share storage in a cluster.
|
||||
|
||||
The "GFS2 DLM locking" driver offers a distributed lock manager (DLM) for GFS2.
|
||||
|
||||
The Oracle Cluster FileSystem 2 is supported by the Linux kernel (OCFS2 file system support). This filesystem is used to share storage in a cluster.
|
||||
|
||||
The "O2CB Kernelspace Clustering" driver offers various services for the OCFS2 filesystem.
|
||||
|
||||
The "OCFS2 Userspace Clustering" driver allows the cluster stack to execute in userspace.
|
||||
|
||||
The "OCFS2 statistics" driver allows the user to get statistics concerning the filesystem.
|
||||
|
||||
Like with most of the Linux kernel, the OCFS2 offers logging (OCFS2 logging support). This may be used to watch for errors or for debugging purposes.
|
||||
|
||||
The "OCFS2 expensive checks" driver offers storage consistency checks at the cost of performance. Some Linux users recommend only enabling this feature for debugging purposes.
|
||||
|
||||
The kernel also contains the new B-Tree FileSystem; this driver offers the disk formatter (Btrfs filesystem Unstable disk format). BTRFS is still in development and is planned to one day become as popular or more popular than EXT4. [http://www.linux.org/threads/b-tree-file-system-btrfs.4430/][7]
|
||||
|
||||
The "Btrfs POSIX Access Control Lists" driver adds additional permission schemes not native to BTRFS.
|
||||
|
||||
Next, there is a BTRFS check tool (Btrfs with integrity check tool compiled in (DANGEROUS)). Since, BTRFS is a newly developing filesystem, most of the software associated with it are unstable.
|
||||
|
||||
The NIL-FileSystem is also supported by Linux (NILFS2 file system support). [http://www.linux.org/threads/new-implementation-of-a-log-structured-file-system-nilfs.4547/][8]
|
||||
|
||||
To support the flock() system call used by some filesystems, enable this driver (Enable POSIX file locking API). Disabling this driver will reduce the kernel size by about eleven kilobytes. The driver provides file-locking. File-locking is the process of allowing one process to read a file at a time. This is commonly used with network filesystems like NFS.
|
||||
|
||||
The "Dnotify support" driver is a legacy filesystem notification system that informs the userspace of events on the file system. One use of this and the successor notifications software is to monitor the filesystem for applications. Certain applications tell this daemon what events to watch. Otherwise, each userspace application would need to complete this task themselves.
|
||||
|
||||
Remember, Dnotify is a legacy system, so what is the new notification system? It is Inotify which is provided by this driver (Inotify support for userspace).
|
||||
|
||||
An alternative notification system is fanotify (Filesystem wide access notification). Fanotify is the same as Inotify, but fanotify relays more information to the userspace than Inotify.
|
||||
|
||||
Fanotify can check permissions with this driver enabled (fanotify permissions checking).
|
||||
|
||||
For systems that need to divide the storage space by user will want "Quota support". [http://www.linux.org/threads/atomic-disk-quotas.4277/][9]
|
||||
|
||||
The following driver allows disk quota warnings and messages to be reported through netlink (Report quota messages through netlink interface). Netlink is a socket interface on the userspace that communicates with the kernel.
|
||||
|
||||
Quota messages can also be sent to a console (Print quota warnings to console (OBSOLETE)).
|
||||
|
||||
This driver allows the quota system to perform extra sanity checks (Additional quota sanity checks). In computer technology, a sanity check is the process of checking for errors that may be due to poor programming. The files and output are inspected to ensure the data is what it should be and not structured in some odd fashion.
|
||||
|
||||
Some old system use the old quota system but want to retain the old quota system when upgrading to a newer kernel. This is easily solved by enabling this driver (Old quota format support). Many readers may be wondering why someone would want to keep the old quota system instead of upgrading. Well, imagine being the manager of the IT department of a very large corporation that has many servers running very important tasks. Would you want to create and configure a new (and possibly large) quota system when you can continue using the one that works well? Generally, with computers, follow the principle - If it is not broken or will not cause security issues, do not fix it.
|
||||
|
||||
The newer quota system supports 32-bit UIDs and GIDs with this driver (Quota format vfsv0 and vfsv1 support).
|
||||
|
||||
To automatically mount remote storage units, enable this driver (Kernel automounter version 4 support).
|
||||
|
||||
FUSE filesystems are supported by this driver (FUSE (Filesystem in Userspace) support). Filesystem in Userspace (FUSE) allows any user to create their own filesystem and utilize it in userspace.
|
||||
|
||||
A special extension for FUSE can be used to utilize character devices in userspace (Character device in Userspace support).
|
||||
|
||||
In the next article, we will discuss caches, optical disc filesystems, FAT32 on Linux, and other interesting filesystem topics. Mahalo!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linux.org/threads/the-linux-kernel-configuring-the-kernel-part-19.4929/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.linux.org/threads/ext-file-system.4365/
|
||||
[2]:http://www.linux.org/threads/ext-file-system.4365/
|
||||
[3]:http://www.linux.org/threads/journal-file-system.4136/
|
||||
[4]:http://www.linux.org/threads/reiser-file-system-reiser3-and-reiser4.4403/
|
||||
[5]:http://www.linux.org/threads/journaled-file-system-jfs.4404/
|
||||
[6]:http://www.linux.org/threads/xfs-file-system.4364/
|
||||
[7]:http://www.linux.org/threads/b-tree-file-system-btrfs.4430/
|
||||
[8]:http://www.linux.org/threads/new-implementation-of-a-log-structured-file-system-nilfs.4547/
|
||||
[9]:http://www.linux.org/threads/atomic-disk-quotas.4277/
|
@ -0,0 +1,40 @@
|
||||
[this is bazz2, if you wanna translate this article, no way :P]
|
||||
This new worm targets Linux PCs and embedded devices
|
||||
================================================================================
|
||||
**The malware spreads by exploiting a 2012 vulnerability in PHP, Symantec researchers said**
|
||||
|
||||
IDG News Service - A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
|
||||
|
||||
According to security researchers from Symantec, the malware spreads by exploiting a vulnerability in php-cgi, a component that allows PHP to run in the Common Gateway Interface (CGI) configuration. The vulnerability is tracked as CVE-2012-1823 and was patched in PHP 5.4.3 and PHP 5.3.13 in May 2012.
|
||||
|
||||
The new worm, which was named Linux.Darlloz, is based on proof-of-concept code released in late October, the Symantec researchers said Wednesday in a [blog post][1].
|
||||
|
||||
"Upon execution, the worm generates IP [Internet Protocol] addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability," the Symantec researchers explained. "If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."
|
||||
|
||||
The only variant seen to be spreading so far targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures.
|
||||
|
||||
However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL.
|
||||
|
||||
These architectures are used in embedded devices like home routers, IP cameras, set-top boxes and many others.
|
||||
|
||||
"The attacker is apparently trying to maximize the infection opportunity by expanding coverage to any devices running on Linux," the Symantec researchers said. "However, we have not confirmed attacks against non-PC devices yet."
|
||||
|
||||
The firmware of many embedded devices is based on some type of Linux and includes a Web server with PHP for the Web-based administration interface. These kinds of devices might be easier to compromise than Linux PCs or servers because they don't receive updates very often.
|
||||
|
||||
Patching vulnerabilities in embedded devices has never been an easy task. Many vendors don't issue regular updates and when they do, users are often not properly informed about the security issues fixed in those updates.
|
||||
|
||||
In addition, installing an update on embedded devices requires more work and technical knowledge than updating regular software installed on a computer. Users have to know where the updates are published, download them manually and then upload them to their devices through a Web-based administration interface.
|
||||
|
||||
"Many users may not be aware that they are using vulnerable devices in their homes or offices," the Symantec researchers said. "Another issue we could face is that even if users notice vulnerable devices, no updates have been provided to some products by the vendor, because of outdated technology or hardware limitations, such as not having enough memory or a CPU that is too slow to support new versions of the software."
|
||||
|
||||
To protect their devices from the worm, users are advised to verify if those devices run the latest available firmware version, update the firmware if needed, set up strong administration passwords and block HTTP POST requests to -/cgi-bin/php, -/cgi-bin/php5, -/cgi-bin/php-cgi, -/cgi-bin/php.cgi and -/cgi-bin/php4, either from the gateway firewall or on each individual device if possible, the Symantec researchers said.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.computerworld.com/s/article/9244409/This_new_worm_targets_Linux_PCs_and_embedded_devices?taxonomyId=122
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices
|
@ -0,0 +1,46 @@
|
||||
UNIGINE Is Probably the Best Gaming Engine on Linux
|
||||
================================================================================
|
||||
**The UNIGINE, a real-time 3D engine built to run on all major platforms, including Linux, has just received another update, bringing some important new features.**
|
||||
|
||||
![](http://i1-news.softpedia-static.com/images/news2/UNIGINE-Is-Probably-the-Best-Gaming-Engine-on-Linux-404484-2.jpg)
|
||||
|
||||
Unigine Engine is built by non-other than Unigine Corp., the company behind the Heaven DX11 Benchmark software. The technology they develop is getting better all the time, and with their recent expansion on the Linux platform, we’re all too glad to see that major updates have been implemented in the engine.
|
||||
|
||||
Amongst the biggest changes in the latest Unigine update is the Common Image Generator Interface (CIGI) protocol.
|
||||
|
||||
According to the developers, this interface is a standard way for a host device to communicate with an image generator (IG) in the simulation industry.
|
||||
|
||||
### Highlights of the new Unigine Engine: ###
|
||||
|
||||
- Support has been added for the conversion of WGS84, ECF and NED coordinate systems into Cartesian one (this will help developers to made better use of real-world GIS data in UNIGINE-powered projects);
|
||||
- The Game Framework has been implemented, making it easier to create games with features such as automatic link between Entity and Node, automatic link between Level and World, object management for Entities, Global Game context across all Levels, events handling system, optimal updating of Entities, and more;
|
||||
- The FPS stability for the rendered has been increased;
|
||||
- Two new options, a 2D noise and 3D noise (States tab in the editor), have been added to the mesh_leaf_base material;
|
||||
- A new parameter, Occlusion mask, has been added to all of the materials;
|
||||
- Heights of clutters and grass are synchronized now;
|
||||
- A few crashes on rendering of non-Flash splash screens have been fixed.
|
||||
|
||||
A complete list of new features, for all the platforms, is available in the official [announcement][1].
|
||||
|
||||
Keep in mind that the UNIGINE graphics engine is only aimed at commercial enterprises and that not even a trial version is available for the general public.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://news.softpedia.com/news/UNIGINE-Is-Probably-the-Best-Gaming-Engine-on-Linux-404484.shtml
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.unigine.com/devlog/2013/11/27/113
|
||||
[2]:
|
||||
[3]:
|
||||
[4]:
|
||||
[5]:
|
||||
[6]:
|
||||
[7]:
|
||||
[8]:
|
||||
[9]:
|
||||
[10]:
|
||||
[11]:
|
||||
[12]:
|
@ -0,0 +1,290 @@
|
||||
Unbelievable ! 30 Linux TOP Command Examples With Screenshots
|
||||
================================================================================
|
||||
The top command in Linux displays the running processes on the system. One of the most important tools for a system administrator. It is used extensively for monitoring the load on a server. In this article, we explore the top command in detail. The top command is an interactive command. Many commands are available when top is running. We will explore these commands as well.
|
||||
|
||||
### 1. Top Command output: ###
|
||||
|
||||
First of all, let us understand what the output says. Top command displays a lot of information about the running system. But we need to under stand the meaning of different sections of this output:
|
||||
Running by default, the top command displays output like this:
|
||||
|
||||
![Top default display](http://linoxide.com/wp-content/uploads/2013/11/01.top_default.png)
|
||||
|
||||
First few lines are horizontal showing summary about different system parameters, and following these are the processes and their attributes in columns.
|
||||
|
||||
#### 1.1 Uptime and Load Averages: ####
|
||||
|
||||
![Uptime display](http://linoxide.com/wp-content/uploads/2013/11/02.top_uptime.png)
|
||||
|
||||
At the top of top command is displayed the output similar to uptime command.
|
||||
|
||||
The fields display:
|
||||
|
||||
- current time
|
||||
- the time your system is been up
|
||||
- number of users logged in
|
||||
- load average of 5, 10 and 15 minutes respectively.
|
||||
|
||||
This uptime display can be toggled with ‘l’ command.
|
||||
|
||||
#### 1.2 Tasks: ####
|
||||
|
||||
![Task summary](http://linoxide.com/wp-content/uploads/2013/11/03.top_tasks.png)
|
||||
|
||||
The second line shows summary of tasks or processes. The processes can be in different states. It shows total number of the processes. Out of these, the processes can be running, sleeping, stopped or in zombie (zombie is the state of a process state, These process summary can be toggled with ‘t’ command.
|
||||
|
||||
#### 1.3 CPU States: ####
|
||||
|
||||
![CPU status display](http://linoxide.com/wp-content/uploads/2013/11/04.top_cpu_states.png)
|
||||
|
||||
Next is shown the CPU state. Here, %age of CPU time in different modes is shown. The meaning of different CPU times are:
|
||||
|
||||
- us, user: CPU time in running (un-niced) user processes
|
||||
- sy, system: CPU time in running kernel processes
|
||||
- ni, niced: CPU time in running niced user processes
|
||||
- wa, IO wait: CPU time waiting for IO completion
|
||||
- hi: CPU time serving hardware interrupts
|
||||
- si: CPU time serving software interrupts
|
||||
- st: CPU time stolen for this vm by the hipervisor.
|
||||
|
||||
This can be toggled with ‘t’ command.
|
||||
|
||||
#### 1.4 Memory Usage: ####
|
||||
|
||||
![Memory usage](http://linoxide.com/wp-content/uploads/2013/11/05.top_mem_usage.png)
|
||||
|
||||
Next two lines show memory usage, somewhat like ‘free’ command. 1st of these lines is for physical memory and the second for virtual memory (swap space).
|
||||
|
||||
The physical memory is displayed as: total available memory, used memory, free memory, and memory used for buffers
|
||||
Similarly, swap reflects: total, used, free and cached swap space.
|
||||
The memory can be toggled with ‘m’ command.
|
||||
|
||||
#### 1.5 Fields/Columns: ####
|
||||
|
||||
![Top columns](http://linoxide.com/wp-content/uploads/2013/11/06.top_fields.png)
|
||||
|
||||
After these horizontal system properties and states, the processes are shown in columns. The different columns represent different properties discussed below.
|
||||
|
||||
By default, top shows these attributes associated with processes:
|
||||
|
||||
**PID**
|
||||
The Process ID, to uniquely identify a processes.
|
||||
|
||||
**USER**
|
||||
The effective user name of the owner of the processes.
|
||||
|
||||
**PR**
|
||||
The scheduling priority of the process. Some values in this field are ‘rt’. It means that the process is running under real-time.
|
||||
|
||||
**NI**
|
||||
The nice value of the process. Lower values mean higher priority.
|
||||
|
||||
**VIRT**
|
||||
The amount of virtual memory used by the process.
|
||||
|
||||
**RES**
|
||||
The resident memory size. Resident memory is the amount of non-swapped physical memory a task is using.
|
||||
|
||||
**SHR**
|
||||
SHR is the shared memory used by the process.
|
||||
|
||||
**S**
|
||||
This is the process status. It can have one of the following values:
|
||||
|
||||
- D – uninterruptible sleep
|
||||
- R – running
|
||||
- S – sleeping
|
||||
- T – traced or stopped
|
||||
- Z – zombie
|
||||
|
||||
**%CPU**
|
||||
It is the percentage of CPU time the task has used since last update.
|
||||
|
||||
**%MEM**
|
||||
Percentage of available physical memory used by the process.
|
||||
|
||||
**TIME+**
|
||||
The total CPU time the task has used since it started, with precision upto hundredth of a second.
|
||||
|
||||
**COMMAND**
|
||||
The command which was used to start the process.
|
||||
|
||||
There are many other outputs which are not displayed by default which can display information about page faults, effective group and group ID of the process, and many more.
|
||||
|
||||
### 2. Interactive Commands: ###
|
||||
|
||||
We discussed earlier that the top command is interactive commands. Some of the commands we encountered in the last section. Here we explore these commands further.
|
||||
|
||||
#### 2.1 ‘h’: Help ####
|
||||
|
||||
First of all, you can press ‘h’ or ‘?’ to display the help menu for interactive commands.
|
||||
|
||||
![Help options](http://linoxide.com/wp-content/uploads/2013/11/07.top_help.png)
|
||||
|
||||
#### 2.2 ‘<ENTER>’ or ‘<SPACE>’: Refresh Display ####
|
||||
|
||||
The top command by default refreshes after a certain interval (3 seconds). To refresh manually, user can press enter or space key.
|
||||
|
||||
#### 2.3 A: Toggle Alternate Display Mode ####
|
||||
|
||||
This command switches between full-screen Mode and alternate-display mode. In alternate display mode, 4 windows are available:
|
||||
|
||||
1. Def
|
||||
2. Job
|
||||
3. Mem
|
||||
4. Usr
|
||||
|
||||
Each of the 4 field groups has a unique separately configurable summary area and its own configurable task area. Only one of these 4 windows will be the current window. The current window is displayed on the top left corner.
|
||||
|
||||
![Alternative display mode](http://linoxide.com/wp-content/uploads/2013/11/08.top_alternative_display.png)
|
||||
|
||||
You can switch between 4 windows with ‘a’ and ‘w’ keys. ‘a’ moves to next and ‘w’ to previous window. With ‘g’ command, you can enter a number to select the current window.
|
||||
|
||||
![Window selection in alternative display](http://linoxide.com/wp-content/uploads/2013/11/09.top_alternate_window_selection.png)
|
||||
|
||||
#### 2.4 B: Toggle Bold Display ####
|
||||
|
||||
Some important information is shown in bold characters. This command toggles use of bold.
|
||||
|
||||
![Bold off](http://linoxide.com/wp-content/uploads/2013/11/10.top_bold_display_off.png)
|
||||
|
||||
#### 2.5 ‘d’ or ‘s’: Set Display Time interval ####
|
||||
|
||||
When ‘d’ or ‘s’ is pressed, you will be prompted to enter a value ( in seconds ) which will be set as display interval. If you enter 1 here, top will refresh every second.
|
||||
|
||||
![Display time interval](http://linoxide.com/wp-content/uploads/2013/11/11.top_display_time_interval.png)
|
||||
|
||||
#### 2.6 ‘l’, ‘t’, ‘m’: Toggle Load, Task, Memory Info ####
|
||||
|
||||
These will toggle load average, task/cpu status and mem info respectively as discussed.
|
||||
|
||||
![Load average off](http://linoxide.com/wp-content/uploads/2013/11/12.top_load_average_display_off.png)
|
||||
|
||||
![CPU summary off](http://linoxide.com/wp-content/uploads/2013/11/13.top_cpu_display_off.png)
|
||||
|
||||
![Memory and swap usage off](http://linoxide.com/wp-content/uploads/2013/11/14.top_mem_display_off.png)
|
||||
|
||||
![All three displays off](http://linoxide.com/wp-content/uploads/2013/11/15.top_all_three_display_off.png)
|
||||
|
||||
#### 2.7 ‘f’: Field Management ####
|
||||
|
||||
This is used to chose what field you want to display on the output screen. The fields marked as * are selected.
|
||||
|
||||
![Managing columns](http://linoxide.com/wp-content/uploads/2013/11/16.top_field_management.png)
|
||||
|
||||
‘<’ and ‘>’
|
||||
The ‘<’ command moves the sorted field to the left and ‘>’ to the right
|
||||
|
||||
#### 2.8 ‘R’: Reverse Sort ####
|
||||
|
||||
Toggle Reverse/Normal sort order
|
||||
|
||||
#### 2.9 ‘c’: Toggle Command ####
|
||||
|
||||
Toggle full path of command that started the process and program name.
|
||||
|
||||
![Full command path](http://linoxide.com/wp-content/uploads/2013/11/17.top_command_name_displayed.png)
|
||||
|
||||
#### 2.10 ‘i’: Idle Tasks ####
|
||||
|
||||
Toggle idle tasks.
|
||||
|
||||
![Idle task display off](http://linoxide.com/wp-content/uploads/2013/11/18.top_idle_tasks_off.png)
|
||||
|
||||
#### 2.11 ‘V’: Forest View ####
|
||||
|
||||
Toggle forest view mode.
|
||||
|
||||
![Forest view of tasks](http://linoxide.com/wp-content/uploads/2013/11/19.top_forest_view.png)
|
||||
|
||||
#### 2.12 ‘Z’: Change color map ####
|
||||
|
||||
Pressing the ‘Z’ key takes the user to a screen where the display color can be changed for top command. There are 8 task areas to chose from and 8 colors.
|
||||
|
||||
![Customizing colors](http://linoxide.com/wp-content/uploads/2013/11/20.top_color_selection.png)
|
||||
|
||||
The below screen shows full colored top view with all 4 screens on.
|
||||
|
||||
![Colored display](http://linoxide.com/wp-content/uploads/2013/11/21.top_colored.png)
|
||||
|
||||
#### 2.13 ‘z’: Toggle Color ####
|
||||
|
||||
Toggle color, i.e. turn on or off the colored display.
|
||||
|
||||
#### 2.14 ‘x’ or ‘y’ ####
|
||||
|
||||
Toggle highlights: ‘x’ sort field; ‘y’ running tasks. Depending upon your display settings, You might have to make the output colored in order to notice these highlights.
|
||||
|
||||
![X and Y highlighted](http://linoxide.com/wp-content/uploads/2013/11/22.top_x_y_displayed.png)
|
||||
|
||||
#### 2.15 ‘u’: Processes of a User ####
|
||||
|
||||
Show processes for a particular user. You are prompted to enter the username. Blank will show for all users.
|
||||
|
||||
![Processes of 'raghu' user](http://linoxide.com/wp-content/uploads/2013/11/23.top_raghu_processes.png)
|
||||
|
||||
#### 2.16 ‘n’ or ‘#’: Number of tasks ####
|
||||
|
||||
Set maximum number of tasks displayed.
|
||||
|
||||
![Setting number of tasks displayed](http://linoxide.com/wp-content/uploads/2013/11/24.top_10_processes.png)
|
||||
|
||||
#### 2.17 ‘k’: Kill tasks ####
|
||||
|
||||
One of the most important commands of top. Used to send signals to tasks (Usually kill tasks).
|
||||
|
||||
![Killing a task](http://linoxide.com/wp-content/uploads/2013/11/25.top_kill_task.png)
|
||||
|
||||
#### 2.18 ‘r’: Renice ####
|
||||
|
||||
Renice a task to change the scheduling priority.
|
||||
|
||||
### 3. Command line options: ###
|
||||
|
||||
Most of these command line options are similar to the commands discussed above. Top output can be manipulated interactively with commands. But you can start top with some parameters set to your convenience with these options.
|
||||
|
||||
#### 3.1 -b: Batch mode ####
|
||||
|
||||
The -b option starts top command in batch mode. It can be useful when you want to save the output in a file.
|
||||
|
||||
#### 3.2 -c: Command/Program-name toggle: ####
|
||||
|
||||
As discussed in the above commands, this option will toggle from the last remembered state of command/program name display.
|
||||
|
||||
#### 3.3 -d: Set delay interval ####
|
||||
|
||||
Set the delay interval for top (in seconds). For example:
|
||||
|
||||
$ top -d 1
|
||||
|
||||
will start the top command with 1 sec delay interval.
|
||||
|
||||
#### 3.4 -i: idle process toggle ####
|
||||
|
||||
This option sets the top command with last remembered ‘i’ state reversed.
|
||||
|
||||
#### 3.5 -n: Set number of iterations ####
|
||||
|
||||
With -n option, you can set the number of iterations after which top willl end.
|
||||
|
||||
$ top -n 3
|
||||
|
||||
will exit top automatically after 3 outputs.
|
||||
|
||||
#### 3.6 -p: monitor specific PIDs ####
|
||||
|
||||
You can specify what PIDs you want to monitor with -p option. PID value 0 will be treated as process ID of top command itself.
|
||||
|
||||
#### 3.7 -u or -U: username or UID ####
|
||||
|
||||
The process of a particular user can be viewed with these options. Username or UID can be specified to the option. The -p, -u and -U options are mutually exclusive. Only one of the options can be used at a time. You get error when you try to use any combination of these options:
|
||||
|
||||
$ top -p 28453 -u raghu
|
||||
top: conflicting process selections (U/p/u)
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://linoxide.com/linux-command/linux-top-command-examples-screenshots/
|
||||
|
||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -1,97 +0,0 @@
|
||||
11个基础性Linux问答访谈
|
||||
================================================================================
|
||||
没有理论,我们在此高调宣布Tecmint新的板块诞生,专门致力于Linux。我们将带领你走进"Linux访谈"以及Linux其它的方方面面。在这样一个激烈竞争的世界,对于一个行业来说,此举必不可少。
|
||||
|
||||
![](http://www.tecmint.com/wp-content/uploads/2013/11/Basic-Interview-Questions.png)
|
||||
|
||||
该板块 (**Linux 访谈**) 每个周末都会发表新的文章。**Tecmint**开创的这个访谈栏目在所有致力于linux发展的网站中尚属首创,文章独有,质量上乘。
|
||||
|
||||
我们以**基础Linux访谈**开始,逐步引入涉及高级话题的文章,对此,我们非常期待你的答复,因为这将使我们万众瞩目。
|
||||
|
||||
#### Q.1: Linux 操作系统的核心是什么? ####
|
||||
- Shell
|
||||
- Kernel
|
||||
- Command
|
||||
- Script
|
||||
- Terminal
|
||||
|
||||
> **答**: 内核是Linux 操作系统的核心。Shell是一个命令行解释器,命令是针对计算机的指令,脚本是存储在文件中的命令的集合,终端是命令行接口。
|
||||
|
||||
#### Q.2: Linus Torvalds 都创建过什么东东? ####
|
||||
- Fedora
|
||||
- Slackware
|
||||
- Debian
|
||||
- Gentoo
|
||||
- Linux
|
||||
|
||||
> **答**: Linux Torvalds 创建了Linux,Linux是所有上述操作系统的核心,同样也是其他一些Linux 操作系统的核心。
|
||||
|
||||
#### Q.3: Torvalds, 使用C++语言编写了Linux内核的大部分代码,你同意吗? ####
|
||||
|
||||
> **答**: 不! Linux内核包含了12,020,528行代码,其中注释占去了2,151,595 行。因此剩下的9,868,933 行就是纯代码了。而其中7,896,318行都是用C语言写的。
|
||||
|
||||
剩下的1,972,615行则是使用C++,汇编,Perl, Shell Script, Python, Bash Script, HTML, awk, yacc, lex, sed等。
|
||||
|
||||
**注**:代码行数每天都在变动,平均每天超过3,509行代码被添加到内核。
|
||||
|
||||
#### Q.4: 起初,Linux 是为 Intel X86 架构编写的,但是后来移植到了其它平台上,你同意吗 ?. ####
|
||||
|
||||
> **答**: 是的,我同意。Linux那时候是为x86机器写的,而且现已移至到所有类型的平台。今天超过90%的超级计算机都在使用Linux。Linux在移动手机和平板电脑领域前景广阔。事实上我们被Linux包围着,遥控器,太空科学,研究,网络,台式机。举之不尽。
|
||||
|
||||
### Q.5: 编辑 Linux Kernel 合法吗? ####
|
||||
|
||||
> **答**: 是的,内核基于GPL发布,任何人都可以随意编辑内核,当然得基于GPL。Linux内核起源于免费开源软件(FOSS)的概念。
|
||||
|
||||
#### Q.6: UNIX和Linux操作系统,本质上的不同在哪里?####
|
||||
|
||||
> **答**: Linux操作系统属于开源软件,内核是由 Linus Torvalds 和开源社区共同开发的。你不能说UNIX操作系统不是来源于免费开源软件的范畴,BSD 是基于FOSS 范畴的UNIX 的变种。而且大公司如,Apple,IBM,Oracle,HP等,都在为UNIX内核贡献代码。
|
||||
|
||||
#### Q. 7: 挑出来一个与众不同的来. ####
|
||||
- HP-UX
|
||||
- AIX
|
||||
- OSX
|
||||
- Slackware
|
||||
- Solaris
|
||||
|
||||
> **答** : Slackware 就是那个稀奇古怪的那个. HP-UX, AIX, OSX, Solaris 分别是由 HP, IBM, APPLE, Oracle 开发的,并且都是UNIX的变种. Slackware 则是一个Linux操作系统.
|
||||
>
|
||||
#### Q.8: Linux 不会感染病毒码? ####
|
||||
|
||||
> **答** : 当然会! 这个地球上不存在不会感染病毒的操作系统。但是Linux以病毒数量的稀有而著称,至今,是的,甚至比UNIX还要少。Linux迄今榜上有名的病毒只有60-100个。而如今没有一个病毒在传播蔓延。Unix粗略估计有85-120个。
|
||||
|
||||
#### Q.9: Linux is which kind of Operating System? ####
|
||||
#### Q.9: Linux 属于哪种类型的操作系统? ####
|
||||
- 多用户
|
||||
- 多任务
|
||||
- 多线程
|
||||
- 以上所有
|
||||
- 以上都不是
|
||||
|
||||
> **答** : 以上所有. Linux是一个支持多用户,可以同时运行多个进程执行多个任务的操作系统。
|
||||
|
||||
#### Q.10: 任意 Linux 命令的语法格式: ####
|
||||
- command [选项] [参数]
|
||||
- command 选项 [参数]
|
||||
- command [选项] [参数]
|
||||
- command 选项 参数
|
||||
|
||||
> **答** : Linux 命令的正确语法是, 命令 [选项] [参数].
|
||||
|
||||
#### Q.11: Choose the odd one out. ####
|
||||
#### Q.11: 挑出来一个与众不同的来. ####
|
||||
|
||||
- Vi
|
||||
- vim
|
||||
- cd
|
||||
- nano
|
||||
|
||||
> **答** : cd 与其他命令不同。Vi,vim和 nano都是编辑器,用于编辑文档,而cd是用于切换目录的命令。
|
||||
|
||||
就这么多了。上述问题你学到手几个?效果如何?我们期待着你的评论。下周,会有新的问题,让我们拭目以待。保持健康,协调,记得链接**Tecmint**哦。
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.tecmint.com/basic-linux-interview-questions-and-answers/
|
||||
|
||||
译者:[译者ID](https://github.com/l3b2w1) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -1,41 +0,0 @@
|
||||
Canonical Dev称Linux Mint“脆弱”,不要将其用于办理在线银行业务
|
||||
================================================================================
|
||||
**一位Canonical公司[工程师建议][1]:基于Ubuntu的流行操作系统Linux Mint用户不应该将其用于在线办理银行业务 。**
|
||||
|
||||
Mint禁止更新那些存在已知安全问题的安装包 - 从内核和浏览器到启动加载器和Xorg显示服务 - 的决定提供给用户一个“脆弱的系统” ,Oliver Grawert说。
|
||||
|
||||
> “不去适当整合Ubuntu中归档包的变化,反而拒绝这些软件包的(安全)更新。不允许安装提供的安全更新,强迫保留一个基于脆弱内核的浏览器或xorg,将使之成为一个易受攻击的系统,(原文如此)”。
|
||||
>
|
||||
> “就我个人而言,我不会用它在线办理银行业务。 ”
|
||||
|
||||
当然不只有Grawert认为Mint在安全意识上的低下。Mozilla贡献者兼前Ubuntu成员 **Benjamin Kerensa** 也有同样的看法:
|
||||
|
||||
> “目前还不清楚为什么Linux Mint禁止所有的安全更新。我可以说,Mint需要花好几个月才能得到一个Firefox的修正版,而Ubuntu和Debian已经同时在他们的包上打了安全补丁。
|
||||
>
|
||||
> 这是使得Linux Mint用户处于危险中的其中一个关键原因,我从来不建议任何人将Linux Mint作为一种替代Ubuntu的系统。”
|
||||
|
||||
Oliver Grawert是一位可靠的撰稿人。作为一位Canonical公司下的Ubuntu工程师,他比大多数人更了解自己在说什么。
|
||||
|
||||
**‘那么Mint的用户存在实际风险么?可以说对也可以说不对…’**
|
||||
|
||||
那么Mint的用户存在实际风险么?
|
||||
|
||||
半对半错。Mint开发商坚决拒绝更新的现有软件包中大部分的安全“漏洞”(一个更好的词)都是有记录和已知的,虽然这些漏洞很少被利用。因此对用户构成的“实际风险”仍然存在,至少现在,在理论上是很有可能的。
|
||||
|
||||
也就是说,没有发生已知的由于使用Mint发行版(或任何其他基于Ubuntu的未打补丁的发行版)并被通过利用Grawert引用的Ubuntu开发邮件列表上的漏洞造成身份盗窃乃至更糟的事故的情况。
|
||||
|
||||
但是,仅仅因为迄今为止没有人曾经钻进这扇半掩的窗户,并不能说明其他人永远不会这么做。
|
||||
|
||||
**看到Ubuntu持续被提及有关自身的(主要是理论上)隐私问题后,现在靴子被牢牢地套在另一只脚上,我们将可喜的看到对用户安全的强烈关注正在延伸至其他发行版上**
|
||||
|
||||
*请注意:我们已经向Linux Mint征求意见及澄清,但还没收到任何答复。*
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.omgubuntu.co.uk/2013/11/canonical-dev-dont-use-linux-mint-online-banking-unsecure
|
||||
|
||||
译者:[whatever1992](https://github.com/whatever1992) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2013-November/014770.html
|
@ -0,0 +1,49 @@
|
||||
每日Ubuntu小技巧-使用Windows共享打印机进行打印
|
||||
===
|
||||
对于那些既有Windows电脑又有Ubuntu电脑但却只有一台打印机的用户,这篇博文向你展示如何在Windows中共享一个打印机,并允许Ubuntu使用它来打印。
|
||||
|
||||
几乎所有的打印机都默认支持Windows。许多打印机生产商都为Windows生产打印机但是很多却并不为Linux系统生产,包括Ubuntu。所以,假如你有一台支持Windows的打印机,你可以在Windows机器上分享它,然后让其它系统来使用它来打印。
|
||||
|
||||
在几年之前,我遇到了这个问题,那时大多数打印机生产商不支持Linux系统。我有一台老式的只支持Windows和Mac OS X但却不支持Linux的打印机。
|
||||
|
||||
我在我的Windows机器上安装了打印机驱动,然后它就可以很好的工作咯。我的Windows机器使用它来打印非常好,但是我的Ubuntu却无法使用它来打印,因为打印机并不支持LAN。
|
||||
|
||||
所以,我在Windows上共享该打印机,然后我的Ubuntu机器就可以使用合适的字体和风格进行打印咯。假如你也遇到类似的情景,你可以按照下面的指导也这样做。
|
||||
|
||||
首先,登入Windows,右击你要共享的打印机,然后点击‘**打印机属性**’
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu.png)
|
||||
|
||||
接着,选择“分享”标签页,勾选上‘分享这台打印机’复选框来分享这台打印机。记住共享打印机的名字,因为你要使用这个共享名来连接这台打印机。
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu1.png)
|
||||
|
||||
最后,以管理员权限运行命令行终端,运行以下命令以便于文件和打印机可以通过防火墙实现共享。
|
||||
|
||||
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
|
||||
|
||||
接着,登入Ubuntu中,选择顶部面板右边的**齿轮**,然后选择**设置...**
|
||||
|
||||
系统设置打开后,选择打印机,然后点击**添加**。当跳出来一个窗口让你选择设备时,选择‘使用SAMBA的Windows打印机’。
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu2.png)
|
||||
|
||||
键入Windows电脑的IP地址或者主机名,后面接着键入共享的打印机名。你可能需要键入你的windows验证信息(用户名和密码)。验证后你就可以看到打印机咯,当你完成这些后,就可以点击向前继续下一步咯。
|
||||
|
||||
接着,选择打印机商标和模型。假如你在列表中看不到和你的打印机相似的模型,选择一个最接近它的然后继续。
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu3.png)
|
||||
|
||||
以上这些都搞定了之后,你的打印机就安装好咯,可以使用了。
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/printersharingubuntu4.png)
|
||||
|
||||
好好享受吧!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.liberiangeek.net/2013/11/daily-ubuntu-tips-print-from-shared-windows-printers/
|
||||
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,35 @@
|
||||
每日Ubuntu小技巧-使用OpenDNS的安全协议保护你的电脑
|
||||
===
|
||||
因特网是个大熔炉。无论是好人还是坏人,都可以连接到和我们一样的网络。那些制作病毒感染人们电脑的坏蛋以及寻求保护人们的好人们全都连接到同一网络中。
|
||||
|
||||
就像人们所说的那样,因特网是过去所出现的一个最好的东东。它包含着任何人都可以获取的有价值的信息和资源,且大部分可以免费获取。一些最著名高校的人提供有免费的高质量课程,可供任何想学习的人来学习。今天,我们都可以连入因特网真是一件好事情。
|
||||
|
||||
但是有些事情你一定要记住,当你连入互联网时,你的电脑就成了攻击的目标。成为病毒,木马和其它程序破坏的目标。
|
||||
|
||||
正因为此,推荐连入因特网的电脑都要使用反病毒和反间谍软件来保护。在有些情况下,即使使用了这些软件也不能完全保证你的安全。再添加一个安全层总是一个好主意。
|
||||
|
||||
当寻找添加一个额外的安全层去保护你的机器时,使用OpenDNS的安全DNS框架可能会有帮助。因特网有许多部分组成,尽力对其每一部分都进行相应保护是保证安全的最好方法。
|
||||
|
||||
首先,你要在你的电脑上安装反病毒和反间谍软件。由于浏览因特网时允许你的电脑查询远程DNS服务器,因此使用受保护的安全的DNS服务器将是保护你电脑安全的好方法。
|
||||
|
||||
这是一个简明手册,告诉你如何在Ubuntu上配置OpenDNS框架以便保护你的电脑。
|
||||
|
||||
sudo gedit /etc/dhcp/dhclient.conf
|
||||
|
||||
最后,在打开的文件中添加下面一行,然后保存。
|
||||
|
||||
supersede domain-name-servers 208.67.222.222,208.67.220.220;
|
||||
|
||||
重启你的电脑,祝你玩的开心!
|
||||
|
||||
![](http://www.liberiangeek.net/wp-content/uploads/2013/11/opendns-ubuntu.png)
|
||||
|
||||
好好享受吧!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.liberiangeek.net/2013/11/daily-ubuntu-tipsprotect-your-computers-using-opendns-secure-dns-infrastructure/
|
||||
|
||||
译者:[Linux-pdz](https://github.com/Linux-pdz) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,95 @@
|
||||
如何在Linux上制作一个YouTube屏幕录像视频教程
|
||||
================================================================================
|
||||
一幅画胜过一千句话,一个精心设计的指导视频几乎无价。Linux有你需要的制作有用且高质量教学视频的所有工具。我们将用强大的kdenlive视频编辑器和Audacity音频录制器和编辑器制作一个简单的屏幕录像,并学习如何在YouTube上分享精彩的屏幕录像。
|
||||
|
||||
一台安装了Kdenlive和Audacit软件的Linux系统PC,一个质量好的麦克风或耳机,和一个YouTube的帐号就是你需要准备的全部。(是的,除了Youtube还有很多其他的免费视频共享服务,欢迎您来探索它们。)YouTube属于Google,因此Google试图诱导你与全世界共享任何人和事。如果这不是你想做的,请说no。
|
||||
|
||||
我们的工作流程是这样的:
|
||||
|
||||
- 用Kdenlive录制屏幕录像
|
||||
- 用Audacity录制音轨
|
||||
- 添加音轨到Kdenlive
|
||||
- 上传到YouTube
|
||||
- 全世界看你的视频,好开心
|
||||
|
||||
kdenlive支持最流行的数字视频格式,包括AVI,MP4,H.264,和MOV。它支持的图像文件,如GIF,PNG,SVG和TIFF;支持的音频文件格式,包括非压缩的PCM,Vorbis,WAV,MP3和 AC3。你甚至可以阅读和编辑Flash文件。总之,它可以处理很多东西。
|
||||
|
||||
你的配音与你的视频一样重要。请一定要重视你的音频。使音频保持干净和简单,保持杂乱的题外话,方言,和去除背景噪声降到最低点。我喜欢用一个质量好的耳机做陈述,因为你不必担心话筒位置,你可以听你自己反复地诉说而不影响到你身边的人。
|
||||
|
||||
Kdenlive的文档已过期,它会告诉你制作屏幕录像需要RecordMyDesktop软件。我用的是kdenlive 0.9.4,其实不需要Recordmydesktop。
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-1-settings.png)
|
||||
|
||||
*图 1:默认配置*
|
||||
|
||||
### 制作屏幕录像 ###
|
||||
|
||||
首次安装kdenlive,第一次运行时会启动配置向导。不必在意默认设置,因为你随时都可以改变它们。这是我的屏幕录像的设置:高清720p每秒30帧,1280x720的屏幕尺寸。如何知道使用什么设置项? [YouTube tells you][1]。设置这些值可到Settings > Configure Kdenlive > Project Defaults > Default Profile > HD 720p 30fps(图1),设置捕捉屏幕的大小到 Settings > Configure Kdenlive > Capture > Screen Grab(图2)。虽然你也可以选择捕捉全屏幕,但最好还是坚持用YouTube规定的尺寸。因为如果使用的尺寸与YouTube规定的不一样,则YouTube将增加Pillarboxes来达到合适的尺寸。热切的观众会更加希望看到一个充满生动的内容的屏幕,而不是Pillarboxes。
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-2-settings.png)
|
||||
|
||||
*Figure 2: Screencast screen size.*图 2:屏幕录像的屏幕大小
|
||||
|
||||
默认的YouTube视频播放器的大小是640x360标清320p,又小又模糊。播放器控制着小屏,大屏,全屏,和多个质量等级。这些设置只有你的观众会使用,640x360标清320p看起来真的不咋样,但郁闷的是你无法改变这个缺陷。尽管如此,你仍然想制作高质量视频的话,你可以添加一些文字来提醒观众尝试更好的配置。
|
||||
|
||||
### 保存你的项目 ###
|
||||
|
||||
在你做任何其他事情之前,点击 File->Save as 保存您的项目,并记住周期性地保存它。
|
||||
|
||||
### 抓取屏幕 ###
|
||||
|
||||
抓屏小菜一碟。到Record Monitor,选择Screen Grab,然后点击Record按钮。屏幕上将打开一个带虚线的框,框里面的所有内容都将被录制下来。因此,你需要做的所有事就是移动框并调整框的大小到你想要l录制的范围。完成后点击停止按钮(图3)。
|
||||
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-3-screen-grab.png)
|
||||
|
||||
*图 3:屏幕抓取*
|
||||
|
||||
单击Stop,自动打开Clip Monitor,你可以预览你的裁剪效果。如果你喜欢它,把它从Project Tree中拖到Video 1轨道。现在你可以编辑你的视频了。总会有需要你修剪的地方;一个快速的方法是,你在Project Monitor里播放你的剪辑片,直到播放到你需要移除部分的末尾。然后暂停,然后按下Shift+r。你的剪辑片将会在你按下停止的时间轴上的点上被切割为两个剪辑。点击你要删除的片断,按下Delete键,噗!它就消失了。
|
||||
|
||||
对于剩下的剪辑片断,可能你想要从时间轴上的某一点开始播放,也可能你想要加入一些好的变换。比如一些简单的渐变就相当不错;右键点击你的剪辑片断,点击Add Effect > Fade > Fade from black 和 Fade to black,然后Kdenlive将自动将这两个效果放到开头和末尾。
|
||||
|
||||
### 添加配音 ###
|
||||
|
||||
请参阅[Whirlwind Intro to Audacity on Linux: From Recording to CD in One Lesson][2]来学习使用Audacity录音的基础。以16bit的wav格式导出你的音频文件,然后通过Project > Add Clip导入到Kdenlive。然后将你的新音频剪辑拖到Audio tracks。一个简单的制作视频陈述的方式是边播视频边说。运气好的话,你不需要做很多的清理工作,你的评述就会与视频同步。
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-4-audio-gap.png)
|
||||
|
||||
*图 4:用Shift+r切割音轨,然后将其中一个剪辑片从切割点拖离,创建一个静音间隙*
|
||||
|
||||
如果你的语速比视频快,你可以在音轨中添加空档时间.很简单,用Shift+r切割音轨,然后将其中一个剪辑片从切割点拖离,创建一个静音间隙。(图4)。
|
||||
|
||||
### Rendering Your Project ### 渲染你的项目
|
||||
|
||||
当你满意自己的编辑,并准备导出你的最终格式时,点击Render按钮。这需要几分钟的时间,取决于你的电脑速度和项目大小。网页已有预先设定的值,如果你选择File Rendering, 你可以调整你的设置(图5)。我用File Rendering中的H.264,Video比特率12000, Audio比特率384取得了不错的效果。H.264是一种超压缩格式,使用这种格式发布的文件小但质量好。
|
||||
|
||||
|
||||
![](http://www.linux.com/images/stories/41373/fig-5-rendering.png)
|
||||
|
||||
*图 5:选择文件渲染,调整你的网页设置*
|
||||
|
||||
### YouTube Bound ###YouTube的装订
|
||||
|
||||
现在你可以在VLC或MPlayer或你喜欢的任何播放器中播放你的视频了,如果它看起来很好,那么你就可以将它上传到你的YouTube帐户里了。以典型的Google风格,你的信息中心和视频管理器会混乱又复杂,不过请坚持到处瞅瞅,你会理出头绪的。在你做任何事情之前,你必须对你的账户做资格认证,也就是通过短信和邮件获得一个验证码。通过输入验证码证明你不是一个网络爬虫后,你就能上传你的视频了。
|
||||
|
||||
|
||||
你可以上传你的视频,然后标记它们为私人可见或所有人可见。Google有一些编辑工具,你可能会喜欢,比如自动纠错和配背景音乐。不过以我的拙见,几乎没有人是这样子做背景音乐的,所以这种工具只会令人讨厌。不过你有可能是第一个正确使用这个工具的人哦。
|
||||
|
||||
最有用的编辑工具是自动闭路字幕。我推荐在你所有的视频上使用此功能,不光是为了那些听觉障碍的人,也为了那些需要保持低音量观看的人,确保所有的人都明白你在说什么。字幕工具还创建一个副本。
|
||||
|
||||
另一个有用的工具是注释工具,它支持言语泡沫,标题,聚光灯和标签。当然,在Kdenlive中,这些你都可以做到,所以都可以尝试一下。
|
||||
|
||||
好吧,到这里就结束了,但似乎我们刚刚开始。请分享你的视频,并在评论中添加Youtube的小建议和技巧。如果可以的话,请在[video.linux.com][3]分享你的新的视频教程,并加入100个Linux教程活动。
|
||||
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
来源于: http://www.linux.com/learn/tutorials/745745-how-to-make-a-youtube-instructional-screencast-video-on-linux/
|
||||
|
||||
译者:[coolpigs](https://github.com/coolpigs) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:https://support.google.com/youtube/answer/1722171?hl=en&ref_topic=2888648
|
||||
[2]:http://www.linux.com/learn/tutorials/422799-whirlwind-intro-to-audacity-on-linux
|
||||
[3]:http://video.linux.com/100-linux-tutorials
|
@ -1,77 +0,0 @@
|
||||
如何使用图形界面管理linux服务器
|
||||
================================================================================
|
||||
一台典型的linux服务器运行在预先载入了一些基本工具和配置服务的命令行界面环境中。和一些成熟的具有图形界面的桌面软件相比,就安全性、资源消费和速度来说,如此小的配置无疑是一个优点。
|
||||
|
||||
如果你曾经用过基于图形界面的软件环境,你也许会想在Linux服务器中是否也有图形界面。典型的Linux桌面环境如`GNOME`、`KDE`等,它们提供的功能相比带来的系统资源负担是不值得,而且还不够安全因为更多的代码会带来安全弱点。
|
||||
|
||||
替换成熟的基于图形界面桌面系统的一种可选方法是使用 **基于Web的管理工具**。现在已经有许多基于Web的配置管理工具, 如 [Webmin][1], [ISPconfig][2], [Zentyal][3], 等。
|
||||
|
||||
在这篇教程中, 我会讲述 **怎样利用基于Web的界面工具来管理和配置Linux服务器**.
|
||||
|
||||
Webmin 是一个用`Perl`语言写的轻型 (~20 MB) 系统配置工具。 Webmin 具有内置的web服务器, 允许用户通过web接口来配置Linux服务器。 其中一个优点是由于它是基于模块架构的,你可以选择性加载模块来扩展其功能。
|
||||
|
||||
### Linux服务器上安装Webmin ###
|
||||
|
||||
在 Ubuntu 或 Debian 系统中安装Webmin, 你可以使用如下命令。
|
||||
|
||||
$ sudo apt-get install perl libnet-ssleay-perl openssl libauthen-pam-perl libpam-runtime libio-pty-perl apt-show-versions python
|
||||
$ wget http://prdownloads.sourceforge.net/webadmin/webmin_1.660_all.deb
|
||||
$ sudo dpkg -i webmin_1.660_all.deb
|
||||
|
||||
在CentOS 或 RHEL 系统中安装Webmin, 使用如下命令:
|
||||
|
||||
$ wget http://prdownloads.sourceforge.net/webadmin/webmin_1.660_all.deb
|
||||
$ sudo rpm -U webmin-1.660-1.noarch.rpm
|
||||
|
||||
### 使用 Webmin ###
|
||||
|
||||
一旦你安装了Webmin, 你可以通过在浏览器中输入 https://<HOST_IP>:10000 来使用。 如果你开启了防火墙, 请确保TCP端口 10000 没有被使用。
|
||||
|
||||
同时, 请注意你应该使用 HTTPS, 而不是 HTTP。 否则, 会出现重定向错误。 Webmin 默认使用其自己生成的的SSL验证模式。
|
||||
|
||||
一旦你进入了Webmin登录页面, 你可以使用root身份登录 (当然需要输入root账户密码) 或者使用具有root权限的任何用户账户登录。 登录成功后, 你可以看到如下Linux服务器的状态信息。
|
||||
|
||||
[![](http://farm4.staticflickr.com/3803/10937800943_e1ac465c3f_z.jpg)][4]
|
||||
|
||||
### Webmin 的特点 ###
|
||||
|
||||
Webmin 一个引以为豪的有点就是它几乎能够配置任何Linux服务器所支持的配置。 下面, 让我们介绍一下它的重要功能。
|
||||
|
||||
开启或关闭 boot-time 服务, 同时会显示他们相关配置信息。
|
||||
|
||||
[![](http://farm8.staticflickr.com/7437/10937589506_7abcaac10e_z.jpg)][5]
|
||||
|
||||
实时监控服务器状态和其他服务, 同时配置调度监控和提醒邮件。 你也可以监控一系列守护进程如 NFS, MySQL, BIND DNS, Squid proxy, Apache Web server等, 或者系统资源如 磁盘信息 (disk storage)、内存和网络故障(memory or network traffic)等。
|
||||
|
||||
配置 iptables-based firewall。
|
||||
|
||||
[![](http://farm4.staticflickr.com/3679/10937801173_61cd4b11a3_z.jpg)][6]
|
||||
|
||||
配置本地路由表和网关。
|
||||
|
||||
挂载和配置文件系统。
|
||||
|
||||
[![](http://farm4.staticflickr.com/3710/10937589556_9fd192cdb9_z.jpg)][7]
|
||||
|
||||
通过文件管理接口来查看和修改本地文件,但是这需要浏览器有相关的java插件。
|
||||
|
||||
通过改变Webmin的相关配置,你可以控制管理 IP 地址, 添加/删除 Webmin 功能模块, 开启 two-factor 认证来使用安全登录功能,或者创建权威验证等。
|
||||
|
||||
[![](http://farm8.staticflickr.com/7317/10937532015_b5e1263496_z.jpg)][8]
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://xmodulo.com/2013/11/manage-linux-server-gui.html
|
||||
|
||||
译者:[thinkinglk](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.webmin.com/
|
||||
[2]:http://www.ispconfig.org/
|
||||
[3]:http://www.zentyal.org/
|
||||
[4]:http://www.flickr.com/photos/xmodulo/10937800943/
|
||||
[5]:http://www.flickr.com/photos/xmodulo/10937589506/
|
||||
[6]:http://www.flickr.com/photos/xmodulo/10937801173/
|
||||
[7]:http://www.flickr.com/photos/xmodulo/10937589556/
|
||||
[8]:http://www.flickr.com/photos/xmodulo/10937532015/
|
@ -0,0 +1,51 @@
|
||||
Linux Uptime 命令,让你知道你的系统运行了多久
|
||||
================================================================================
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/linux-uptime-command.png)
|
||||
|
||||
|
||||
系统运行了多久对于一些人来说是无关紧要的,但是对于服务器管理员来说,这是相当重要的信息。服务器在运行重要的应用的时候,必须尽量保证长时间的稳定运行,有时候甚至要求零宕机。那么我们怎么才能知道服务器运行了多久呢?
|
||||
|
||||
在Linux 下,我们可以使用uptime 命令,而且此命令不必使用root 权限。uptime 命令在系统中已经默认安装了。
|
||||
|
||||
语法就像这样:
|
||||
|
||||
$ uptime
|
||||
|
||||
你会在屏幕上看到类似这样的显示:
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime.png)
|
||||
|
||||
这些信息保存在/proc/uptime 文件中,虽然是以文本方式保存,但是这些数据却不能直接显示,需要我们使用uptime 命令来翻译它。
|
||||
|
||||
下面来讲解如何解读运行uptime 命令后显示的信息:
|
||||
|
||||
### 系统时间 ###
|
||||
|
||||
在图1中,左起第一个信息是14:04:39,这就是当前系统时间,以24小时格式输出。
|
||||
|
||||
### 系统运行时间 ###
|
||||
|
||||
第二个信息**Up 1004 days, 12:20**,这是显示你的系统运行的时间。这里显示的是到目前(即第一个时间)为止,你的系统运行了1004天12小时20分钟,如果你的系统没有运行超过24小时,这里将只会显示小时分钟或者只显示分钟。注意图2、图3的信息,当系统重启后将会清零。
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime_minutes.png)
|
||||
|
||||
![](http://linoxide.com/wp-content/uploads/2013/11/uptime_hours1.png)
|
||||
|
||||
### 已登陆用户的数量 ###
|
||||
|
||||
第三部分的信息是显示已登陆用户的数量。在图1中,显示的是**1 user** ,即当前登录用户数量。当多个用户在同时登陆系统时,uptime 命令将告诉你用户的数量。
|
||||
|
||||
### 平均负载量 ###
|
||||
|
||||
最后一个信息是系统的平均负载量。回到图1,你看到这样带两位小数的数字**0.25, 0.25, 0.19**可以换算成百分比,即0.25和0.19分别代表着25%和19%。
|
||||
19代表着过去1分钟、5分钟、15分钟系统的平均负载量。负载量越低意味着你的系统性能越好。
|
||||
|
||||
这就是**uptime** 命令的日常使用指导,如果想获取更详细的信息,请通过输入**man uptime** 进入uptime 命令的manual 页面来查看。
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://linoxide.com/linux-command/linux-uptime-command/
|
||||
|
||||
译者:[NearTan](https://github.com/NearTan) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
@ -0,0 +1,128 @@
|
||||
戴文的Linux内核专题:23 配置内核 (19)
|
||||
================================================================================
|
||||
![](http://www.linux.org/attachments/slide-jpg.626/)
|
||||
|
||||
欢迎进入Linux内核系列文章的下一篇!我们正在接近配置过程的终点。在这篇文章中,我们将会讨论固件驱动和文件系统驱动。
|
||||
|
||||
这个分类中的第一个驱动是寻找启动盘(BIOS Enhanced Disk Drive calls determine boot disk)。有时,Linux不会知道那个盘是启动盘。这个驱动允许内核询问BIOS。Linux接着在sysfs上存储信息。Linux需要知道这些来设置bootloader。
|
||||
|
||||
即使BIOS EDD服务被编译进了内核,这个选项可以设置这些服务不激活(Sets default behavior for EDD detection to off )。EDD代表的是"Enhanced Disk Drive"(增强磁盘驱动器)。
|
||||
|
||||
当使用kexec加载不同的内核时,性能可以通过固件提供的内存映射提升(Add firmware-provided memory map to sysfs)。
|
||||
|
||||
"Dell Systems Management Base Driver"通过sysfs接口提供了Linux内核对于Dell硬件的更好的控制。
|
||||
|
||||
启用这个驱动可以通过/sys/class/dmi/id/访问硬件的信息(Export DMI identification via sysfs to userspace)。DMI代表的是Desktop Management Interface(桌面管理接口)。DMI管理硬件的组件和访问硬件的数据。BIOS中数据的接口和硬件由SMBIOS(System Management BIOS)规范调节。
|
||||
|
||||
从DMI得到的原始数据表可以通过这个驱动访问(DMI table support in sysfs)。
|
||||
|
||||
为了从iSCSI驱动器中启动,启用这个驱动(DMI table support in sysfs)。
|
||||
|
||||
最后的驱动是一组"Google Firmware Drivers"。这些驱动用于Google特定的硬件。除非你为Google工作并且需要在硬件上使用Linux或者你在为一台从Google偷来的电脑编译内核,否则不要启用它。
|
||||
|
||||
下面,我们可以配置内核的文件系统支持。
|
||||
|
||||
"Second extended fs support"驱动用于EXT2文件系统。[http://www.linux.org/threads/ext-file-system.4365/][1]
|
||||
|
||||
![](http://www.linux.org/attachments/kernel_19-png.627/)
|
||||
|
||||
"Ext2 extended attributes"提供了原生文件系统不支持的额外的元数据的使用。
|
||||
|
||||
"Ext2 POSIX Access Control Lists"增加了额外的非原生的权限模型。
|
||||
|
||||
"Ext2 Security Labels"增强了有SELinux提供的安全性。
|
||||
|
||||
启用"Ext2 execute in place support"允许可执行文件在当前的位置执行而不必在页缓存中执行。
|
||||
|
||||
这个驱动提供EXT3文件系统(Ext3 journaling file system support)。 [http://www.linux.org/threads/ext-file-system.4365/][2]
|
||||
|
||||
"Default to 'data=ordered' in ext3"驱动设置数据的排序模式为"Ordered"。这种处理方式为日志和写入工作。数据排序在这篇文章中解释 - [http://www.linux.org/threads/journal-file-system.4136/][3]
|
||||
|
||||
"Ext3 extended attributes"提供了原生文件系统不支持的额外的元数据使用。再说一次,接下来的EXT3的驱动/特性与EXT2相同 - "Ext3 POSIX Access Control Lists" 和 "Ext3 Security Labels"。同样,对接下来的EXT4也是相同的 - "Ext4 POSIX Access Control Lists"、"Ext4 Security Labels" 和 "EXT4 debugging support"。
|
||||
|
||||
EXT3和EXT4支持日志块设备调试(JBD debugging support),(JBD2 debugging support)。
|
||||
|
||||
下面的驱动提供Reiser文件系统支持(Reiserfs support)。 [http://www.linux.org/threads/reiser-file-system-reiser3-and-reiser4.4403/][4]
|
||||
|
||||
Reiser文件系统也有调试(Enable reiserfs debug mode)。
|
||||
|
||||
内核可以存储ReiserFS统计在/proc/fs/reiserfs (Stats in /proc/fs/reiserfs)。
|
||||
|
||||
下面的Reiser驱动/特性与EXT2/3/4相同 - ReiserFS extended attributes", "ReiserFS POSIX Access Control Lists" 和 "ReiserFS Security Labels".
|
||||
|
||||
Linux内核同样支持JFS,同时也包含了不同的特性 "JFS filesystem support"、 "JFS POSIX Access Control Lists"、"JFS Security Labels"、"JFS debugging" 和 "JFS statistics". [http://www.linux.org/threads/journaled-file-system-jfs.4404/][5]
|
||||
|
||||
再说一次,XFS可以通过启用这些驱动/特性支持 - "XFS filesystem support"、"XFS Quota support"、"XFS POSIX ACL support"、"XFS Realtime subvolume support" 和 "XFS Debugging support"。 [http://www.linux.org/threads/xfs-file-system.4364/][6]
|
||||
|
||||
"Global FileSystem 2"可以被内核支持(GFS2 file system support)。这个文件系统用于在集群中共享存储。
|
||||
|
||||
"GFS2 DLM locking"驱动提供了GFS2的分布式锁管理(DLM)
|
||||
|
||||
"Oracle Cluster FileSystem 2"被内核支持(OCFS2 file system support)。这个文件系统用于在集群中共享存储。
|
||||
|
||||
"O2CB Kernelspace Clustering"提供了OCFS2文件系统的不同服务。
|
||||
|
||||
"OCFS2 Userspace Clustering"允许集群栈在用户空间执行。
|
||||
|
||||
"OCFS2 statistics"驱动允许用户得到关于文件系统的统计信息。
|
||||
|
||||
像大多树Linux内核一样,OCFS2提供日志(OCFS2 logging support)。这可能被用来监视错误或者调试目的。
|
||||
|
||||
"OCFS2 expensive checks"驱动以性能为代价提供了存储一致性检测。一些Linux用户建议只有在调试目的在才启用它。
|
||||
|
||||
Linux内核同样包含了新的B树文件系统;这个驱动提供了磁盘格式化程序(Btrfs filesystem Unstable disk format)。BTRFS仍在开发中并被计划某天变的比EXT4更流行。[http://www.linux.org/threads/b-tree-file-system-btrfs.4430/][7]
|
||||
|
||||
"Btrfs POSIX Access Control Lists"提供了额外的原生BTRFS没有提供的权限模型。
|
||||
|
||||
下面,是一个BTRFS检测工具(Btrfs with integrity check tool compiled in (DANGEROUS))。由于BTRFS是一个最新在开发中的文件系统,大多数相关软件还并不稳定。
|
||||
|
||||
Linux系统也支持NIL-FileSystem(NILFS2 file system support)。[http://www.linux.org/threads/new-implementation-of-a-log-structured-file-system-nilfs.4547/][8]。
|
||||
|
||||
为了支持一些文件系统使用到的flock()系统调用,启用这个驱动(Enable POSIX file locking API)。禁用这个去的那个会减少11KB的内核大小。这个驱动提供了文件锁定。文件锁定是一个允许进程在某刻读取文件的过程。这通常用于网络文件系统,就像NFS。
|
||||
|
||||
"Dnotify support"驱动是一个古老的文件系统通知系统,它提醒文件系统上的事件的用户空间。它的一个用处和它的继承者被用于监控应用的文件系统。某个应用告诉守护进程需要监视哪些事件。不然,每个用户空间应用需要它们自己完成这个任务。
|
||||
|
||||
记住,Dnotify是一个古老的系统,那么什么是新的通知系统?它就是由这个驱动提供的Inotify (Inotify support for userspace)。
|
||||
|
||||
一个可选的通知系统是fanotify (Filesystem wide access notification)。Fanotify与Inotify一样,但是fanotify比Inotify传递更多的信息到用户空间中。
|
||||
|
||||
用这个驱动Fanotify可以检测权限(fanotify permissions checking)。
|
||||
|
||||
对于用户想要划分存储空间的系统需要 "Quota support"。 [http://www.linux.org/threads/atomic-disk-quotas.4277/][9]
|
||||
|
||||
接下来的驱动允许通过netlink报告磁盘配额警告和信息(Report quota messages through netlink interface)。netlink是一个用于与内核通信的用户空间的套接字接口。
|
||||
|
||||
配额信息同样可以发送到控制台(Print quota warnings to console (OBSOLETE))。
|
||||
|
||||
这个驱动允许配额系统执行额外的完整性检查(Additional quota sanity checks)。在计算机技术中,完整性检查是检测由于不良编程导致的错误。文件和输出都被检查来确保数据正确而不是以奇怪的方式构造。
|
||||
|
||||
一些旧的系统使用老的配额系统但希望在升级新内核时保留旧的配额系统。可以通过启用这个来容易解决(Old quota format support)。许多读者可能想要知道为什么一些人想要保留旧的配额系统而不是更新新的。好的,想想一下你是一家很大公司的IT部门的经理,公司有许多服务器运行着非常重要的任务。当你可以继续使用现在工作的很好的系统,你想要创建并配置一个新的(也可能很大)的文件系统么? 通常上,对于计算机,坚持下面的原则 - 如果它没有坏或者不会导致安全问题,不要去修复它。
|
||||
|
||||
用这个驱动,新的配额系统支持32位UID和GID(Quota format vfsv0 and vfsv1 support)。
|
||||
|
||||
为了自动挂载远程存储单元,启用这个驱动(Kernel automounter version 4 support)。
|
||||
|
||||
这个驱动支持FUSE文件系统(FUSE (Filesystem in Userspace) support)。用户空间文件系统(FUSE)支持任何用户创建他们自己的文件系统并在用户空间内使用。
|
||||
|
||||
一个特殊的FUSE扩展可以用于在用户空间使用字符设备Character device in Userspace support)。
|
||||
|
||||
In the next article, we will discuss caches, optical disc filesystems, FAT32 on Linux, and other interesting filesystem topics. Mahalo!
|
||||
下一篇文章中,我们会继续讨论缓存,光盘文件系统,Linux上的FAT32和其他有趣的文件系统话题。谢谢!
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: http://www.linux.org/threads/the-linux-kernel-configuring-the-kernel-part-19.4929/
|
||||
|
||||
译者:[geekpi](https://github.com/geekpi) 校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||
|
||||
[1]:http://www.linux.org/threads/ext-file-system.4365/
|
||||
[2]:http://www.linux.org/threads/ext-file-system.4365/
|
||||
[3]:http://www.linux.org/threads/journal-file-system.4136/
|
||||
[4]:http://www.linux.org/threads/reiser-file-system-reiser3-and-reiser4.4403/
|
||||
[5]:http://www.linux.org/threads/journaled-file-system-jfs.4404/
|
||||
[6]:http://www.linux.org/threads/xfs-file-system.4364/
|
||||
[7]:http://www.linux.org/threads/b-tree-file-system-btrfs.4430/
|
||||
[8]:http://www.linux.org/threads/new-implementation-of-a-log-structured-file-system-nilfs.4547/
|
||||
[9]:http://www.linux.org/threads/atomic-disk-quotas.4277/
|
Loading…
Reference in New Issue
Block a user