Merge pull request #3 from LCTT/master

sync
This commit is contained in:
Terence Ng 2013-12-11 06:37:28 -08:00
commit a7db91e059
14 changed files with 376 additions and 599 deletions

View File

@ -0,0 +1,23 @@
GCC 4.9现在处于修复BUG的第三阶段
================================================================================
拥有很多[新功能][2]的[GCC 4.9][1]将定于2014年上半年发布。这个GCC的基础代码将不会增加新的功能目前将只修改大的BUG。
Richard Biener宣称代码主干目前处于第三阶段因此在之后的八个月这些功能将融入到4.9版本除非有发布主管认可的特例发生不然不会增加新的功能了。第三阶段只做普通BUG的修复工作将在2个月内完成而后到达只编写文档和回归测试的第四阶段。
目前GCC4.9有63个P1 回归测试最严重的回归测试其次是136个P2回归测试14个P3回归测试88个P4回归测试 以及60个P5回归测试。直到P1阶段的63个回归测试完成GCC4.9才接近发布。GCC 4.9.0发布版将可能在2014第二季度左右到来
GCC 4.9.0状态报告可以在[GCC mailing list][3]中被找到。GCC 4.9将会是一个非常棒的更新,并会挑战下个月发布的[LLVM3.4][4]。
--------------------------------------------------------------------------------
via: http://www.phoronix.com/scan.php?page=news_item&px=MTUyMjk
译者:[Vic___](http://blog.csdn.net/Vic___) 校对:[wxy](https://github.com/wxy)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.phoronix.com/scan.php?page=search&q=GCC+4.9
[2]:http://www.phoronix.com/scan.php?page=news_item&px=MTUxNzQ
[3]:http://gcc.gnu.org/ml/gcc/2013-11/msg00435.html
[4]:http://www.phoronix.com/scan.php?page=search&q=LLVM+3.4

View File

@ -1,110 +0,0 @@
tomatoKiller 翻译中
10 Linux Interview Questions and Answers for Linux Beginners Part 3
================================================================================
Continuing the **Interview Questions** series, with a big thanks for the nice feedback on last two articles of this series, we are here presenting **10 questions** again for interactive learning.
- [11 Basic Linux Interview Questions and Answers Part 1][1]
- [10 Basic Linux Interview Questions and Answers Part II][2]
![](http://www.tecmint.com/wp-content/uploads/2013/12/Basic-Interview-Questions-Part-3.png)
### 1. How will you add a new user (say, tux) to your system.? ###
- useradd command
- adduser command
- linuxconf command
- All of the above
- None of the above
> **Answer** : All of the above commands i.e., **useradd, adduser** and **linuxconf** will add an user to the Linux system.
### 2. How many primary partition is possible on one drive? ###
- 1
- 2
- 4
- 16
> **Answer** : There are a maximum of **4** primary partition possible on a drive.
### 3. The default port for Apache/Http is? ###
- 8080
- 80
- 8443
- 91
- None of the above.
> **Answer** : By default Apache/Http is configured on port **80**.
### 4. What does GNU stand for? ###
- GNUs not Unix
- General Unix
- General Noble Unix
- Greek Needed Unix
- None of the above
> **Answer** : GNU stands for **GNU**s not **Unix**.
### 5. You typed at shell prompt “mysql” and what you got in return was “cant connect to local MySQL server through socket /var/mysql/mysql.sock”, what would you check first. ###
> **Answer** : Seeing the error message, I will first check if mysql is running or not using commands **service mysql status** or **service mysqld status**. If mysql service is not running, starting of the service is required.
**Note**:The above error message can be the result of ill configured **my.cnf** or mysql **user permission**. If mysql service starting doesnt help, you need to see into the above said issues.
### 6. How to Mount a windows ntfs partition on Linux? ###
> **Answer** : First install **ntfs­3g** pack on the system using **apt** or **yum** tool and then use “**mount sudo mount ­t ntfs­3g /dev/<Windows­partition>/<Mount­point>**” command to mount Windows partition on Linux.
### 7. From the following which is not an RPM based OS.? ###
- RedHat Linux
- Centos
- Scientific Linux
- Debian
- Fedora
> **Answer** : The **Debian** operating system is not an **RPM** based and all listed above are **RPM** based except Debian.
### 8. Which command can be used to rename a file in Linux.? ###
- mv
- ren
- rename
- change
- None of the Above
> **Answer** : The **mv** command is used to rename a file in Linux. For example, **mv /path_to_File/original_file_name.extension /Path_to_File/New_name.extension**.
### 9. Which command is used to create and display file in Linux? ###
- ed
- vi
- cat
- nano
- None of the above
Answer : The **cat** command can be used to create and display file in Linux.
### 10. What layer protocol is responsible for user and the application program support such as passwords, resource sharing, file transfer and network management? ###
- Layer 4 protocols
- Layer 5 protocols
- Layer 6 protocols
- Layer 7 protocols
- None of the above
> **Answer** : The **Layer 7 Protocol** is responsible for user and the application program support such as passwords, resource sharing, file transfer and network management.
--------------------------------------------------------------------------------
via: http://www.tecmint.com/linux-interview-questions-and-answers-for-linux-beginners/
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.tecmint.com/basic-linux-interview-questions-and-answers/
[2]:http://www.tecmint.com/basic-linux-interview-questions-and-answers-part-ii/

View File

@ -1,5 +1,3 @@
translated by coolpigs
Basic Linux Interview Questions and Answers Part II
================================================================================
Continuing the Interview Series, we are giving 10 Questions here, in this article. These questions and the questions in the future articles doesnt necessarily means they were asked in any interview. We are presenting you an interactive learning platform through these kind of posts, which surely will be helpful.

View File

@ -1,44 +0,0 @@
Canonical Dev Calls Linux Mint Vulnerable, Wouldnt Use it For Online Banking
================================================================================
> Linux Mint has since responded to the comments by Oliver Grawert. [You can read them here][1].
**Users of the popular Ubuntu-based operating system Linux Mint should not use it for online banking, a Canonical [engineer has advised][2].**
Mints decision to prevent packages with known security issues from updating from the kernel and browser to the boot-loader and Xorg display server leaves its users with a “vulnerable system”, says *Oliver Grawert*.
> “Instead of just integrating changes properly with the packages in the ubuntu archive they instead suppress doing (security) updates at all for them. i would say forcefully keeping a vulnerable kernel browser or xorg in place instead of allowing the provided security updates to be installer makes it a vulnerable system, (sic)”.
>
> “I personally wouldnt do online banking with it.”
Grawert certainly isnt alone in considering Mint a sub-par choice for the security conscious. Mozilla contributor and former Ubuntu member Benjamin **Kerensa* feels the same:**
> “It is unclear why Linux Mint disables all of their security updates. I can say that it took them many months to get a fixed version of Firefox packaged while Ubuntu and Debian had already had security fixes in their package.
>
> This puts Linux Mint users at risk and is one of the key reasons I never suggest Linux Mint to anyone as an alternative to Ubuntu.”
Oliver Grawert is no fly-by-night contributor. As one of Canonicals Ubuntu Engineering bods hes better placed than most to know what hes talking about.
> But are Mint users in actual risk? Yes and no…
But are Mint users in actual risk?
Yes and no. The majority of security “holes” (for want of a better word) of the kind present in the packages that Mints developers steadfastly refuse to update are both documented and known, but rarely exploited by those of a nefarious breed. As such the “actual threat” posed to users remains, at least for now, largely a theoretical one.
Thats to say that there are no known incidents of identify theft or worse resulting from use of Mint (or any other Ubuntu-based distribution with unpatched packages) through any of the exploits referenced by Grawert on the Ubuntu Dev Mailing List.
But just because no-one has entered through the window left ajar thus far, isnt to say someone wont ever do it.
**After seeing Ubuntu given a long and sustained kicking about its own (largely theoretical) privacy issues, it will be interesting to see if, now the boot is placed firmly on the other foot, the vehement concern for users wellbeing will extend to other distributions. **
Notice: We reached out to Linux Mint for comment & clarification but received no reply.
--------------------------------------------------------------------------------
via: http://www.omgubuntu.co.uk/2013/11/canonical-dev-dont-use-linux-mint-online-banking-unsecure
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:这个地址在发布的时候填写成“Linux Mint Respond to Ubuntu Developers Vulnerable Claim”这篇文章的发布的地址
[2]:https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2013-November/014770.html

View File

@ -1,49 +0,0 @@
Luox 翻译
How to Repack Deb Files on Debian and Ubuntu
================================================================================
**The following tutorial will teach Ubuntu, Linux Mint and Debian GNU/Linux users how to easily unpack and repack a .deb file on their Debian-based Linux operating system.**
![](http://i1-news.softpedia-static.com/images/news2/How-to-Repack-Deb-Files-on-Debian-and-Ubuntu-404930-2.jpg)
Once in a while you reach a moment in life when, among other things, you want to modify a .deb file, to change something in it and repackage it back. But, only if you are truly into computing and hacking.
The following example is a true story, as it happen to me a while ago. A Linux developer created a Debian package (.deb) for a software, which Ive install on my Ubuntu powered computer with success.
Apparently, the software did not worked correctly, as it was always stuck when it tried to retrieve some files from a Git repository. So, I knew where the files where installed (in the /opt directory), Ive searched the code, found the issue and repair it in place. After that, the program was no longer stuck when it tried to retrieve the packages it needed.
So, long story short, I wanted to unpack the .deb file, replace the file Ive patched in it, and repackage it back so I can install it on other computers or give it to my friends. How do I do that?
After searching the Internet for an answer to my problem, Ive found a small blog called [ailoo.net][1] where it was explained like this:
mkdir -p extract/DEBIAN
dpkg-deb -x package.deb extract/
dpkg-deb -e package.deb extract/DEBIAN [...do something, e.g. edit the control file...]
mkdir build
dpkg-deb -b extract/ build/
These five commands will do the job like a charm. Let me explain them to you: the first one creates a folder called “extract” and a subfolder called “DEBIAN”; the second command will extract some files from your .deb package in the “extract” folder; the third command will extract the content of the .deb package in the “DEBIAN” subfolder, where you can modify/patch the files you want; the fourth command will create a folder called “build”; and the fifth command will repack the modified files into a new .deb package, which will be generated in the “build” folder.
Thats it! Just remember to stick with the commands above, and modify the files visually with a graphical text editor via your default file manager, after youve executed the third command. Do not hesitate to comment below if you run into problems during this tutorial.
--------------------------------------------------------------------------------
via: http://news.softpedia.com/news/How-to-Repack-Deb-Files-on-Debian-and-Ubuntu-404930.shtml
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://ailoo.net/2009/06/repack-a-deb-archive-with-dpkg-deb/
[2]:
[3]:
[4]:
[5]:
[6]:
[7]:
[8]:
[9]:
[10]:
[11]:
[12]:

View File

@ -1,3 +1,4 @@
(申领 by runningwater)
Proprietary Unix Continues to Fall
================================================================================
Analysts at International Data Corporation (IDC) posted a [press release][1] Wednesday highlighting the rapid decline of IBM's AIX and P-Series hardware. Along side the drop in proprietary Unix systems is an associated rise in sales of X86 servers running Linux. IBM has clearly identified this as a long term trend, investing $1 billion dollars in Linux development on Power systems. With the reported 20% drop in sales, the writing my finally be on the wall for AIX.
@ -16,7 +17,7 @@ IBM may not be able to turn things around for AIX, but they could prolong its li
via: http://ostatic.com/blog/proprietary-unix-continues-to-fall
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
译者:[runningwater](https://github.com/runningwater) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出

View File

@ -1,88 +0,0 @@
Security Headers on the Top 1,000,000 Websites: November 2013 Report
================================================================================
It has been almost exactly a year since we conducted the first top 1 million security headers report so it is a great time to re-run the analysis and see how well security header adoption is growing. As before, the latest Chrome and Firefox User-Agent strings were used to make requests to the top 1 million sites over both HTTP and HTTPS. Out of the 2,589,918 responses we had over 100,000 distinct security headers and values to analyze.
Comparing with previous scans, we had 514,288 URLs that matched the first run we did in November 2012 and 1,207,169 URLs that matched from March 2013. This time around we added yet another security header “X-XSS-Protection” due to a request from a commenter on this blog. Unfortunately, we did not store this header in any of the prior scans so we are unable to compare its adoption rate.
### Changes, Additions and Removals Yearly Review ###
A total of 7,258 new security headers were added over the course of a year to the 514,288 URLs that existed in both data sets. As before, we see the largest increase in additions to X-Frame-Options and CORS headers. In a not so distant fourth we see Strict-Transport-Security steadily climbing with 538 new sites using the header. Even though X-Content-Security-Policy and X-WebKit-CSP are deprecated, we still see a small increase in their additions. Once again the highest used headers also end up having the highest number of removals with X-Frame-Options being removed from 365 sites over the course of the year.
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/add_change_remove_11.12-11.131.png)
You may notice that the Content-Security-Policy header is missing from the yearly review, this is because it was not standardized when we first started this analysis. To see the adoption rate of the standardized CSP, we need to look at a comparison of the scan that was conducted in March 2013.
### Changes, Additions and Removals from March 2013 ###
We have a lot more URLs that matched since last March, yet surprisingly, the charts look extremely similar. 7,099 new security headers were added for the 1,207,169 URLs that matched between this run and March 2013. Of these sites, a disappointingly small number of 62 sites enabled Content-Security-Policy with 47 sites enabling the soon to be disabled X-Content-Security-Policy header.
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/add_change_remove_03.13-11.13.png)
While it would be nice to see CSPs adoption rates increase more, it is quite understandable as it is such a large undertaking for any website to create a compliant policy.
### November 2013 Results ###
#### X-XSS-Protection ####
This time around another header was added to the analysis. The Microsoft endorsed header was built to allow sites to control how Internet Explorers XSS Filtering feature is to be handled on a resource by resource basis. Valid values for X-XSS-Protection are as follows:
1. 0 Disables XSS protections
1. 1 Enables XSS protections, in IE the filter will attempt to sanitize potential malicious characters.
1. 1; mode=block Enables XSS protections and instructs IE to block the response instead of sanitizing.
1. 1; report=[url] Allows reports to be sent to the specified URL of potential XSS attempts.
It should be noted that Google Chromes XSS Auditor will also be disabled if a resource responds with 0 as the value for the X-XSS-Protection header.
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/x_xss_protection_11.13.png)
As previous readers will remember, invalid header values are a serious problem and X-XSS-Protection is no exception. Almost 480 sites incorrectly specified the value of “0; mode=block”. This means that 477 sites who think they are blocking XSS attacks are actively disabling the XSS protections built in to IE and Chrome. Please note that [YouTube][1] and [Blogspot][2] make up the majority of URLs using X-XSS-Protection with 14,210 for YouTube and 18,587 for Blogspot.
### X-Frame-Options ###
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/x_frame_options_11.13.png)
X-Frame-Options is still holding strong with SAMEORIGIN being by far the largest setting with YouTube again taking up the majority with 14,178 URLs all of which are set to SAMEORIGIN. Along with the jump in sites using X-Frame-Options we are also seeing an increase in invalid values being configured.
### Cross Origin Request Sharing (CORS) Headers ###
Once again we looked at the two CORS headers Access-Control-Allow-Origin and Access-Control-Allow-Credentials.
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/acao_11.13.png)
Unfortunately, we are still seeing a large number of sites incorrectly configuring Access-Control-Allow-Origin by specifying wildcards or multiple origins separated by various characters. As a reminder Access-Control-Allow-Origin only allows either * (wildcard value) or a single origin with a valid scheme specified.
As for Access-Control-Allow-Credentials, 1388 sites have set the value to true, 51 for false. Surprisingly, we identified 196 sites setting wildcard origin access but setting Access-Control-Allow-Credentials to true which is an invalid combination of settings.
### Strict-Transport-Security ###
Due to readers suggestions we have changed the long max-age value to be anything greater than 604800 seconds, or 7 days. Likewise, values below are considered to be a short max-age. [Facebook][3] and [Etsy][4] comprise 74 and 61 URLs respectively in the Max Age of 0 column. As a reminder, a header value of 0 clears the domain from the browsers Strict Transport Security cache. Of the more interesting invalid values, a large number of sites incorrectly use , as a delimiter between the max-age value and includeSubDomains directives. Unfortunately, both Firefox and Chrome are extremely strict in this regard and will refuse to add the site to the STS cache if the , character is used instead of the RFC defined token of ;. Once again, please check the RFCs before implementing any of these security headers.
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/sts_11.131.png)
#### Content-Security-Policy ####
Content Security Policy continues to grow in usage but extremely slowly. Only 269 sites are using the [w3 specifications Content-Security-Policy][5] header, with 95 of these URLs coming from Facebook. Interestingly, 584 sites are using X-Content-Security-Policy and 487 sites are using X-Webkit-CSP. It should be noted that these two headers are already considered deprecated but have yet to be disabled. Only an extremely small number of sites using the report-only versions of the CSP headers were observed. It would be expected that web site operators wishing to test out CSP would use the report only mode to determine how Content Security Policy would impact their site, yet we only see 24 sites using Content-Security-Policy-Report-Only.
![](http://www.veracode.com/blog/wp-content/uploads/2013/11/csp_11.13.png)
The most interesting result of the CSP analysis is the large number of sites which use CSP with the unsafe directives. It is assumed the reason unsafe-inline has such a high rate of usage is due to how extremely hard it is for developers to remove all inline script from web page elements. While disappointing to see, it is understandable to anyone who has attempted to enact a strict CSP policy.
### Conclusion ###
It is safe to say that we have a long way to go to making sure our sites use all available means to protect themselves. While security headers are only a small part of defense, applied appropriately they can and do help us all be more secure internet users. While encouraging to see the numbers increasing, we must keep in mind that less than 10% (199,350) of the 2,589,918 URLs analyzed have security headers. While strict adherence to RFCs is necessary, typos, combined with the rigidness of directive parsing, do not help site administrators or users when encountering these headers. While hope should not be given up on CSP, its extremely low adoption rate is rather concerning and it may be worth considering creation of tools to help create, verify and support site administrators that wish to adopt CSP.
As before, Veracode has released the raw data from this analysis, so feel free to download the November 2013 results here.
--------------------------------------------------------------------------------
via: http://www.veracode.com/blog/2013/11/security-headers-on-the-top-1000000-websites-november-2013-report/
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.youtube.com/
[2]:http://www.blogspot.com/
[3]:http://www.facebook.com/
[4]:http://www.etsy.com/
[5]:http://www.w3.org/TR/CSP/

View File

@ -1,191 +0,0 @@
translating by zsJacky
Setup FTP Server On openSUSE 13.1
================================================================================
**vsftpd** (**V**ery **S**ecure **F**ile **T**ransport **P**rotocol **D**aemon) is a secure, fast FTP server for Unix/Linux systems. In this how-to article, let us see how to setup a basic FTP server using vsftpd on openSUSE 13.1.
### Install vsftpd ###
Login as root user and Enter the following the following command.
# zypper in vsftpd
Start vsftpd service and make it to start automatically on every reboot.
# systemctl enable vsftpd.service
# systemctl start vsftpd.service
### Configure vsftpd ###
Create a folder for ftp users.
# mkdir /srv/ftp
Create a group called **ftp-users**.
# groupadd ftp-users
Let us create a sample user called unixmen with home directory **/srv/ftp** and group **ftp-users**.
# useradd -g ftp-users -d /srv/ftp/ unixmen
Set password for the new user.
# passwd unixmen
Make the ftp home directory **/srv/ftp/** accessible by ftp users.
# chmod 750 /srv/ftp/
# chown unixmen:ftp-users /srv/ftp/
Edit file vsftpd.conf,
# nano /etc/vsftpd.conf
Make the changes as shown below.
[...]
#Uncomment and Set YES to enable write.
write_enable=YES
[...]
# Uncomment and Set banner name for your website
ftpd_banner=Welcome to Unixmen FTP service.
[...]
# Uncomment
ls_recurse_enable=YES
[...]
# Uncomment and set YES to allow local users to log in.
local_enable=YES
[...]
# To disable anonymous access, set NO.
anonymous_enable=NO
[...]
# Uncomment to enable ascii download and upload.
ascii_upload_enable=YES
ascii_download_enable=YES
[...]
## Add at the end of this file ##
use_localtime=YES
Save and exit file.
### Test FTP Server Locally ###
First let us try to login to our FTP server as shown below.
# ftp localhost
Trying ::1:21 ...
Connected to localhost.
220 (vsFTPd 3.0.2)
Name (localhost:root): unixmen
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
As you in the above output, we will be able to login to ftp server using unixmen user.
### Test FTP Server Remotely ###
By default openSUSE built-in firewall wont allow to login to FTP from remote systems. So let us allow vsftpd service through suse firewall. To do that go to **Yast -> Security and Users -> Firewall**.
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/openSUSE-12.3-Running-Oracle-VM-VirtualBox_001.jpg)
In the Firewall section, go to **Allowed Services**. In the zone selection drop down box, select **External Zone** and in Service to Allow drop-down box, select **vsftpd server** and click add.
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/openSUSE-12.3-Running-Oracle-VM-VirtualBox_004.jpg)
Click Next and close Yast Control center.
Now try to connect from a remote system.
I tried to login to FTP server from my ubuntu desktop.
sk@sk:~$ ftp 192.168.1.53
Connected to 192.168.1.53.
220 (vsFTPd 3.0.2)
Name (192.168.1.53:sk): unixmen
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
As you see in the above output, I will be able to connect to FTP server. If you doesnt allow the vsftpd service through firewall you will get a Connection timed out error.
### Connect from Browser ###
Open up your browser and Navigate to **ftp://ip-address/**. Enter the ftp user name and password.
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/Index-of-ftp-192.168.1.53-Mozilla-Firefox_005.jpg)
### Connect to FTP server using FileZilla ###
Working from command-line mode might be little bit annoying to newbies. So let us install a graphical FTP client called [**Filezilla**][1] to get things done quite easier:
Mostly all distribution will have filezilla client in their official repository. To install filezilla on Linux based systems enter the following command:
On Ubuntu based systems:
$ sudo apt-get install filezilla
On Fedora/Redhat systems:
$ sudo yum install filezilla
On openSUSE:
# zypper in filezilla
After installing filezilla open it. Enter the ftp server IP address, user name and password and click quickconnect.
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/unixmen@192.168.1.53-FileZilla_006.jpg)
For added security, you can restrict FTP access to certain users by adding them to **/etc/vsftpd.chroot_list** file.
Edit vsftpd.conf file,
nano /etc/vsftpd.conf
Make the changes as shown below.
[...]
# Uncomment and set YES
chroot_local_user=YES
chroot_list_enable=YES
chroot_list_file=/etc/vsftpd.chroot_list
[...]
Create **file /etc/vsftpd.chroot_list**,
nano /etc/vsftpd.chroot_list
Add the users that you want to give access to FTP server. I added the user **unixmen**.
unixmen
Restart ftp service.
# systemctl restart vsftpd.service
Now you will be able to connect to FTP server with users who are listed in the chroot list file.
If users other than in the chroot list want to access FTP server, they will get the following error.
500 OOPS: could not read chroot() list file:/etc/vsftpd.chroot_list
ftp: Login failed
Thats it for now. Your FTP server is ready to use. Enjoy!
--------------------------------------------------------------------------------
via: http://www.unixmen.com/setup-ftp-server-opensuse-13-1/
译者:[zsJacky](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:https://filezilla-project.org/

View File

@ -1,38 +0,0 @@
SuperTuxKart 0.8.1 Release Candidate Revved Up And Ready for Testing
================================================================================
**Hands up if you dont like open-source racing game SuperTuxKart? You, folks, are strange.**
As kart-racers go, its one of the most popular freely available. And for good reason: its fun, easy to play and has a dedicated team of developers who are continually adding to and improving what is already a really polished game.
But its getting even better. The first release candidate of build 0.8.1 the first update since last years 0.8 build [has been made available for testing][1] (for testing see excuse to play it for hours and not feel guilty).
SuperTuxKart 0.8.1 adds a number of improvements, including:
- A new Star Trek themed track “STK Enterprise”
- Three tracks updated (Old Mines, Lighthouse & Zen Garden)
- New Egg Hunt and Soccer modes
- New and updated karts
- New difficulty level
- Bubblegum shield weapon
- Option to save and resume Grand Prix mode
- [WiiMote Support][2]
### Geting SuperTuxKart 0.8.1 ###
No release date has been given on when to expect the final, stable release of 0.8.1 but Id expect it to land sometime in December marking one year from the previous release in the 0.8.x series.
In the meantime, if youre okay with “Release Candidate”-quality software, youll find a pre-compiled binary for Linux over on the projects Sourceforge Page.
- [Download SuperTuxKart 0.8.1 Release Candidate][3]
--------------------------------------------------------------------------------
via: http://www.omgubuntu.co.uk/2013/11/supertux-kart-0-8-1-release-candidate
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://supertuxkart.blogspot.co.uk/2013/11/supertuxkart-081-rc1.html
[2]:http://supertuxkart.net/Wiimote
[3]:http://sourceforge.net/projects/supertuxkart/files/SuperTuxKart/0.8.1-rc1/

View File

@ -1,48 +0,0 @@
Household Brands Interested In Ubuntu for Phones and Tablets, Says Shuttleworth
================================================================================
![](http://www.omgubuntu.co.uk/wp-content/uploads/2013/02/tablet-hero.jpg)
**Mark Shuttleworth has said that an interesting set of household brands are looking at putting Ubuntu Touch on their own phones and tablets.**
The Ubuntu founder was speaking in the [keynote address][1] at the Ubuntu Developer Summit which kicked off this week.
No specific names, details or dates were offered up alongside the tantalising tidbit, though Mark did hint at one point that he expects Ubuntu Touch devices to be available to buy within the next couple of years.
### Ubuntu Tablets = Renewed Opportunity ###
[As mentioned by Jono Bacon recently][2], honing the Ubuntu Tablet experience will be the key focus of the Ubuntu 14.04 development cycle. This was touched upon by Shuttleworth in response to a question on whether Ubuntu plan to make dual-booting Touch with Android easier (they are):
> “Im excited about the tablet form-factor because I think its going to be a lot easier for people to enjoy Ubuntu on a tablet [because] doing it on a phone full time is a bit of a deep-device commitment [though] weve heard some interesting reports of government departments using it because we dont work for the NSA!”
Other notable points mentioned in the keynote included:
- Helping developers tailor Ubuntu Touch apps for the desktop
- Stable, dependable and performant desktop experience based on Unity 7
- Point releases of Ubuntu 14.04 LTS wont be introducing Mir or Unity 8
- Ubuntu on ARM x64
- Sidestage to be re-introduced to tablet
- Supporting Android apps on Ubuntu is a goal but not a focus right now
> Shuttleworth must be hoping that some of those interested household names make a firm commitment soon…
This latter point appears to represent an about-turn, if true. Earlier in the year Canonicals Richard Collins [told Engadget][1] that there were no plans to “engineer middleware for running Android apps [on Ubuntu Touch]“.
Android apps or not, Shuttleworth must be hoping that some of those interested household names make a firm commitment soon. The longer the gap the more ground competitors are gaining.
Samsung and Intels open-source mobile OS Tizen [recently gained the backing of a further 36 companies][4], including an array of mobile networks, electronics bigwigs and game publishers.
Elsewhere, Mozillas Firefox OS continues to grow its users, OEM and carrier base; while [Jollas first Sailfish OS-powered handset ships later this month][5]. And although Ubuntu Touch isnt aiming for the low-end segment, Android 4.4 debuted with a number of performance optimisations when used on hardware with limited resources.
--------------------------------------------------------------------------------
via: http://www.omgubuntu.co.uk/2013/11/household-brands-ubuntu-phone-tablets
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.youtube.com/watch?v=D4kHQeu4SJk
[2]:http://www.omgubuntu.co.uk/2013/11/ubuntu-tablet-will-key-focus-ubuntu-14-04-lts-cycle
[3]:http://www.engadget.com/2013/01/25/canonical-richard-collins-interview/
[4]:http://www.theverge.com/2013/11/12/5093588/tizen-open-operating-system-partners-with-36-companies
[5]:http://www.theregister.co.uk/2013/11/15/jolla_phones_to_ship_in_november/

View File

@ -0,0 +1,110 @@
对于Linux菜鸟的10 个Linux面试问题及答案---第三部分
================================================================================
在有关**面试问题**的这一系列话题的前两篇文章中,我们收到了许多好的反馈,在此表示极大的感谢,同时,我们将延续这一系列话题。在这里,我们将再次展示**10个问题**来进行相互学习。
- [11个基本的Linux面试问题及答案 第一部分][1]
- [10个基本的Linux面试问题及答案 第二部分][2]
![](http://www.tecmint.com/wp-content/uploads/2013/12/Basic-Interview-Questions-Part-3.png)
### 1. 你如何向你的系统中添加一个新的用户(例如tux) ###
- 使用useradd指令
- 使用adduser 指令
- 使用linuxconf指令
- 以上所有
- 以上答案全都不对
> **答案** : 上面的指令即useradd, adduser 和 linuxconf 都可向你的linux系统添加新用户
### 2. 在一个驱动器上,可能有多少主分割槽? ###
- 1
- 2
- 4
- 16
> **答案** : 一个驱动器上最多可能有4个主分割槽
### 3. Apache/Http 的默认端口号是多少? ###
- 8080
- 80
- 8443
- 91
- 以上答案全都不对
> **答案** : Apache/Http默认配置在**80**端口
### 4. GNU代表什么 ###
- GNUs not Unix
- General Unix
- General Noble Unix
- Greek Needed Unix
- 以上答案全都不对
> **答案** : GNU意为**GNUs not Unix**.
### 5. 如果你在shell提示符中输入mysql并得到“cant connect to local MySQL server through socket /var/mysql/mysql.sock ”的提示,你首先应该检查什么? ###
> **答案** : 看到这条错误消息,我首先会使用**service mysql status**或者**service mysqld status**指令来检查mysql服务是否正在运行。如果mysql服务没有运行就启动所需服务。
**注意**:上面的错误消息可能是由于**my.cnf**或者mysql的**用户权限**错误配置导致的。如果启动mysql服务之后仍不管用你需要检查这两项。
### 6. 如何将windows ntfs分割槽挂在到Linux上面 ###
> **答案** : 首先,使用**apt**或者**yum**工具安装ntfs3g包然后使用
“**mount sudo mount ­t ntfs­3g /dev/<Windows­partition>/<Mount­point>**” 命令来将windows分割槽挂载到Linux上面
### 7. 下面哪一个不是基于RPM的操作系统 ###
- RedHat Linux
- Centos
- Scientific Linux
- Debian
- Fedora
> **答案** : **Debian** 系统不是基于**RPM**的
### 8. Linux中哪一个指令用来重命名文件 ###
- mv
- ren
- rename
- change
- 以上答案全都不对
> **答案** : 在Linux中**mv** 指令用来重命名一个文件。例如:**mv /path_to_File/original_file_name.extension /Path_to_File/New_name.extension**
### 9. 在Linux中哪个命令用来创建并显示文件 ###
- ed
- vi
- cat
- nano
- 以上答案全都不对
Answer : **cat** 命令用来创建并且显示文件
### 10. 哪层协议对用户和程序负责,用以支持如密码、资源分享、文件传输和网络管理? ###
- Layer 4 protocols
- Layer 5 protocols
- Layer 6 protocols
- Layer 7 protocols
- 以上答案全都不对
> **答案** : **第七层协议**
--------------------------------------------------------------------------------
via: http://www.tecmint.com/linux-interview-questions-and-answers-for-linux-beginners/
译者:[tomatoKiller](https://github.com/tomatoKiller) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.tecmint.com/basic-linux-interview-questions-and-answers/
[2]:http://www.tecmint.com/basic-linux-interview-questions-and-answers-part-ii/

View File

@ -1,28 +0,0 @@
GCC 4.9现在处于修复BUG的第3阶段
================================================================================
[GCC 4.9][1]将拥有很多[新功能][2]将定于2014年上半年发布。早先的GCC代码基础将不会支持新的功能因为它是一个大修复的标记。
Richard Biener今早宣称分支已经发展到了阶段三因此在之后的八月将这些功能融入4.9版本除非发布经理授权的异常发生不然毫无变化。阶段三只允许一般BUG的修复工作将在2个月内完成而到达只允许文档和回归的阶段四。
目前GCC4.9有63 P1 回归最严重的回归其次是136 P2回归14 P3回归88 P4 回归 以及 60 P5回归。直到63回归的P1阶段被清零GCC4.9才会被关闭去发布。GCC 4.9.0 发布版将可能在2014第二季度左右到来
早先的GCC 4.9.0状态报告可以在[GCC mailing list][3]中被找到。GCC 4.9将会是一个美好的编译器更新,并会挑战下个月发布的[LLVM3.4][4]。
--------------------------------------------------------------------------------
via: http://www.phoronix.com/scan.php?page=news_item&px=MTUyMjk
译者:[Vic___](http://blog.csdn.net/Vic___) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.phoronix.com/scan.php?page=search&q=GCC+4.9
[2]:http://www.phoronix.com/scan.php?page=news_item&px=MTUxNzQ
[3]:http://gcc.gnu.org/ml/gcc/2013-11/msg00435.html
[4]:http://www.phoronix.com/scan.php?page=search&q=LLVM+3.4

View File

@ -0,0 +1,52 @@
如何在Debian和Ubuntu下重新打包Deb文件
================================================================================
**以下教程会教导Ubuntu,Linux Mint和Debian GUN/Linux用户如何在它们基于Debian的Linux操作系统上轻松的解开和重建.deb文件。**
![](http://i1-news.softpedia-static.com/images/news2/How-to-Repack-Deb-Files-on-Debian-and-Ubuntu-404930-2.jpg)
有时候你会碰到这样或那样的问题,你想要修改.deb文件的部分内容然后重新打包。但是也只有你真正的进入计算机世界之中。
下面的例子是刚发生在我身上真实的经历。一位Linux的开发者为一个软件构建了一个Debian包.deb,我也成功得将它安装在我的装载Ubuntu的电脑上。
当我试图从一个Git库中检索一些文件时它总是卡顿佷显然该软件并没有正常工作。我知道安装的文件在哪里/opt目录所以我搜查了代码并适当的将部分问题修复。之后当程序试图检索需要的包时不再卡顿。
所以,长话短说,我要将.deb文件解包替换上我的补丁文件然后再重新打包回来。这样我可以其他电脑上安装或者将有效的包文件给我的朋友。我要怎么做呢
在网络上搜索问题的答案,我发现一个名叫[ailoo.net][1]的小型博客,类似这样解释:
mkdir -p extract/DEBIAN
dpkg-deb -x package.deb extract/
dpkg-deb -e package.deb extract/DEBIAN [...do something, e.g. edit the control file...]
mkdir build
dpkg-deb -b extract/ build/
这五个命令像一个魔法来完成工作。让我向你解释第一条命令创建了一个名为“extract”文件夹和一个名为“DEBIAN”的子文件夹第二条命令会从你的.deb包提取程序文件到“extract”文件夹第三条命令会解压.deb包的控制文件到“DEBIAN”子文件夹在那里你就可以 修改/补丁 你想要的文件第四条命令建立一个名为“build”的文件夹而第五条命令会将修改后的文件重新构建到一个新的.deb包中并在 “build” 文件夹中生成。
这就是本次的教程!牢牢地记住上面的命令吧,在你执行第三条命令后,可以通过你默认的文件管理器用一个图形化的文本编辑器,可视化的修改文件。如果你在这个教程上遇到问题,你可以毫不犹豫的评论给我们。
--------------------------------------------------------------------------------
via: http://news.softpedia.com/news/How-to-Repack-Deb-Files-on-Debian-and-Ubuntu-404930.shtml
译者:[Luoxcat](https://github.com/Luoxcat) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://ailoo.net/2009/06/repack-a-deb-archive-with-dpkg-deb/
[2]:
[3]:
[4]:
[5]:
[6]:
[7]:
[8]:
[9]:
[10]:
[11]:
[12]:

View File

@ -0,0 +1,189 @@
translating by zsJacky
在openSUSE 13.1中配置FTP服务器
================================================================================
**vsftpd** **非常****安全的****文件****传输****协议****守护进程** 是Unix/Linux系统中的一个安全快速的FTP服务器。 在这篇 how-to 文章中让我们看看在openSUSE 13.1中怎样使用vsftpd来配置一个基本的FTP服务器。
### 安装 vsftpd ###
作为root用户登录然后输入以下的命令。
# zypper in vsftpd
启动 vsftpd 服务然后设置让它在每次系统重启时自动启动
# systemctl enable vsftpd.service
# systemctl start vsftpd.service
### 配置 vsftpd ###
为ftp用户新建一个文件夹。
# mkdir /srv/ftp
创建一个叫 **ftp-users** 的组。
# groupadd ftp-users
让我们来创建一个叫unixmen的示例用户 并设置其主目录为 **/srv/ftp** 组为**ftp-users**。
# useradd -g ftp-users -d /srv/ftp/ unixmen
为新用户设置密码。
# passwd unixmen
使ftp主目录 **/srv/ftp/** 可以被ftp用户所访问。
# chmod 750 /srv/ftp/
# chown unixmen:ftp-users /srv/ftp/
编辑 vsftpd.conf 文件
# nano /etc/vsftpd.conf
设置如下的更改。
[...]
#Uncomment and Set YES to enable write.
write_enable=YES
[...]
# Uncomment and Set banner name for your website
ftpd_banner=Welcome to Unixmen FTP service.
[...]
# Uncomment
ls_recurse_enable=YES
[...]
# Uncomment and set YES to allow local users to log in.
local_enable=YES
[...]
# To disable anonymous access, set NO.
anonymous_enable=NO
[...]
# Uncomment to enable ascii download and upload.
ascii_upload_enable=YES
ascii_download_enable=YES
[...]
## Add at the end of this file ##
use_localtime=YES
保存并退出文件。
### 测试本地FTP服务器 ###
首先 让我们按如下步骤尝试登陆FTP服务器
# ftp localhost
Trying ::1:21 ...
Connected to localhost.
220 (vsFTPd 3.0.2)
Name (localhost:root): unixmen
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
正如你在上面所输出的那样, 我们将能够用unixmen用户登录到ftp服务器。
### 测试远程FTP服务器 ###
默认地 openSUSE内置的防火墙不允许从远程系统登陆FTP。所以让我们允许vsftpd服务通过suse的防火墙。然后我们需要打开 **Yast -> 安全性与用户 -> 防火墙**.
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/openSUSE-12.3-Running-Oracle-VM-VirtualBox_001.jpg)
在防火墙界面,进入 **允许服务**. 在区域选择下拉框中,选择 **外部区域** 在服务允许下拉框中,选择 **vsftpd 服务器** 然后点击添加。
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/openSUSE-12.3-Running-Oracle-VM-VirtualBox_004.jpg)
单击下一步并关闭Yast控制中心
现在尝试从远程系统连接FTP。
我试着从我的ubuntu桌面系统登录FTP服务器。
sk@sk:~$ ftp 192.168.1.53
Connected to 192.168.1.53.
220 (vsFTPd 3.0.2)
Name (192.168.1.53:sk): unixmen
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
正如你在上面输出中所看到的我将能够连接到ftp服务器。如果不允许vsftpd服务通过防火墙 你将会得到一个连接超时的错误。
### 从浏览器连接 ###
打开你的浏览器并导航到**ftp://ip-address/**。输入ftp用户名和密码。
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/Index-of-ftp-192.168.1.53-Mozilla-Firefox_005.jpg)
### 使用FileZilla连接到FTP服务器 ###
对于新手来说,在命令行模式下工作可能会很烦恼。所以让我们来安装一个叫[**Filezilla**][1]的图形化的FTP客户端。它可以让我们登陆FTP变得更加简单:
几乎所有的发行版在他们的官方软件仓库中都有filezilla客户端。 为了在基于Linux的系统上安装filezilla 需要键入以下的命令:
在基于Ubuntu的系统中:
$ sudo apt-get install filezilla
在Fedora/Redhat系统中:
$ sudo yum install filezilla
在openSUSE中:
# zypper in filezilla
安装完fielzilla后打开它。输入ftp服务器的IP地址用户名和密码然后点击快速链接。
![](http://180016988.r.cdn77.net/wp-content/uploads/2013/11/unixmen@192.168.1.53-FileZilla_006.jpg)
为了增加安全性,你可以通过将用户添加到 **/etc/vsftpd.chroot_list**文件中来限制特定用户对FTP服务器的访问。
编辑 vsftpd.conf 文件,
nano /etc/vsftpd.conf
设置如下的更改.
[...]
# Uncomment and set YES
chroot_local_user=YES
chroot_list_enable=YES
chroot_list_file=/etc/vsftpd.chroot_list
[...]
创建 **文件 /etc/vsftpd.chroot_list**,
nano /etc/vsftpd.chroot_list
添加你希望其能够访问FTP服务器的用户。我添加了用户**unixmen**。
unixmen
重启ftp服务.
# systemctl restart vsftpd.service
现在你将能够使用chroot_list文件中列出的用户来连接到FTP服务器。
如果chroot_list以外的用户想访问FTP服务器 他们将得到如下的错误。
500 OOPS: could not read chroot() list file:/etc/vsftpd.chroot_list
ftp: Login failed
现在就是这样。 你的FTP服务器已经可以使用了。 享受吧!
--------------------------------------------------------------------------------
via: http://www.unixmen.com/setup-ftp-server-opensuse-13-1/
译者:[zsJacky](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:https://filezilla-project.org/