background preloader

C++ Reference [C++ Reference]

C++ Reference [C++ Reference]

Virtual Machine Creator Note! The required green field decides your disk size! " Floppy Disk Drive " Enable this if you want access to your floppy drive. " CDROM #1 " This is your physical CDROM. " Disk #1 " Select the size of your virtual disk. " Disk #2 " If you want a second disk, activate it and select disk size. " SCSI? You will need VMware Tools to support the LsiLogic SCSI controller in Windows!

GNU Korea Blog : Mathematica and NVIDIA in Action: See Your GPU in a Whole... September 14, 2010 — Angela Sims, Partnership Support Specialist Wolfram Research is partnering with NVIDIA to integrate GPU programming into Mathematica. CUDA is NVIDIA’s performance computing architecture that harnesses modern GPU’s potential. Afraid of the programming involved? If you find yourself near San Jose, California the week of September 20, stop by the GPU Technology Conference 2010.

ANSI/ISO 표준 C 1983년, 미국 규격 협회(American National Standards Institute, ANSI)는 C 언어의 표준을 제정하기 위해 X3J11이라는 위원회를 열었습니다. 매우 긴 기간동안 토론한 끝에 이 위원회의 보고서는 1989년 12월 14일 ANSX3.159-1989라는 이름으로 비준받아서, 1990년에 출판되었습니다. 대부분의 내용은 기존의 C 언어에서 가져온 것이며, 몇몇은 C++에서 (대부분 함수 prototype에 대한 것) 가져온 것입니다. 그리고 (논쟁의 여지가 있던 3중 음자(trigraph) 문자 시퀀스를 포함한) 다국적 문자 세트를 지원하는 기능도 포함시켰습니다. 그 후에 국제 표준 기구인 ISO는 미국 표준인 X3.159를 ISO/IEC 9899:1990으로 대체하여 국제 표준으로 만들었습니다. 1994년 `Technical Corrigendum 1(TC1)'은 표준에서 약 40 가지를 수정하였습니다. 이 글을 쓸 때, 표준의 완전한 개정판은 이제 막바지 작업에 들어 갔습니다. 오리지널 ANSI 표준은 많은 부분에서 결정한 부분에 대한 설명과, 작은 문제들에 대한 논의를 포함한 ``Rationale (이론적 해석)''을 포함하고 있습니다. CloudUSB - CloudUSB Computer gcc make : gcc ì´ì „íŽ˜ì´ì§€ë‹¤ìŒíŽ˜ì´ì§€ì°¨ë¡€ 2. gcc 강좌 2.1 gcc 에 대한 기본 이해 ëª…ë ¹í–‰ 상태에서 다음과 같이 ìž…ë ¥í•´ë´…ì‹œë‹¤. 여러분이 ì‚¬ìš©í•˜ê°™ê³ ìžˆëŠ” gcc ë²„ì „ì€ ì•Œì•„ë‘ê³ ì‹œìž‘í•˜ì…”ì•¼ê² ì£ ? [yong@redyong yong]$ gcc -v Reading specs from /usr/lib/gcc-lib/i386-linux/2.7.2.1/specs gcc version 2.7.2.1 [yong@redyong yong]$ gcc -v ì´ë¼ê³ ìž…ë ¥í•˜ë‹ˆê¹Œ ``Reading specs from..'' ì´ë¼ê°™ê³ ë§í•˜ë©´ì„œ ê·¸ 결과값을 ``gcc version 2.7.2.1''ì´ë¼ê³ ë§í•´ì£¼ê³ ìžˆìŠµë‹ˆë‹¤. 자, 어디서 gcc 에 대한 ì •ë³´ë¥¼ 읽어오는지 봅시다. /usr/lib/gcc-lib/i386-linux/2.7.2.1/specs gcc 패키지가 ì–´ë–¤ 것으로 구성되어 있는지.. gcc ê°€ ì œëŒ€ë¡œ 설치되어 있는지 알아보면 ì¢‹ê² ì£ ? 다음과 같습니다. 마지막 /usr/lib/gcc-lib ë””ë ‰í† ë¦¬ì— 아래에 gcc 에 관한 ëª¨ë“ ë‚´ìš©ì´ 설치됩니다. 보통 다음과 같은 ë””ë ‰í† ë¦¬ 구조를 가집니다. /usr/lib/gcc-lib/<플랫폼>/< gcc ë²„ì „ > 2.2 gcc 사용하기 main () {} $ .

Removing Volumes - (Using Solaris 9 Volume Manager Commands) The process for unmirroring a regular file system (one that can be unmounted) is fairly easy and straightforward. In this example, I have a two-way mirrored volume named d20. It consists of two submirrors d21 and d22. This two-way mirror was created from an already existing UFS file system mounted on /dev/dsk/c1t3d0s7. For the purpose of this example, I want to unmirror the file system while preserving the data, remove all volumes that were involved in the mirrored volume, and return the file system back to normal to where it existed; mounted on /dev/dsk/c1t3d0s7. The following example unmounts the file system (/db20) from the mirrored volume, d20. First unmount the file system: # umount /db20 Next, remove the entry (or comment it out) you made to the /etc/vfstab file for automatically mounting the /dev/md/dsk/d20 volume.

Extension Watch: Turn Firefox into an Ebook Reader with EPUBReader - Linux... Mar 12, 2010 GMT Dmitri Popov You can use a dedicated application like FBReader or Calibre to read and manage ebooks on your machine, or you can do it without leaving the convenience of the Firefox browser courtesy of the EPUBReader extension. With this extension, you can open any ebook in the ePub format directly in the browser using the File -> Open File command. To configure EPUBReader's settings, press the Preferences button.

Monte - machine learning in Python 7 Chrome Annoyances and How to Fix Them Guest post by Shankar Ganesh Google Chrome was released more than two years ago and it's the browser of choice for many people. Despite having won hearts for its speed and elegance, Google Chrome does have some minor flaws that you might want to fix. Here are some of them: 1. Google Chrome does't show a warning when you close a window with multiple tabs. 2. Google Chrome's history page is pretty basic and you can't restrict the list to a certain time interval. The History 2 extension comes to the rescue by allowing you to sort web pages based on the day/week you visited them. 3. There's no way to quickly examine an image when you're in Chrome. 4. Chrome simply doesn't recognize RSS feeds and all you get is a page with gibberish text. 5. While other popular browsers allow you to quickly send any web page you're viewing by email, such an option is nowhere to be found in Google Chrome. 6. Closing Google Chrome and reopening it does not restore previously opened tabs. 7.

Securing your ssh server | Racker Hacker One of the most common questions that I see in my favorite IRC channel is: “How can I secure sshd on my server?” There’s no single right answer, but most systems administrators combine multiple techniques to provide as much security as possible with the least inconvenience to the end user. Here are my favorite techniques listed from most effective to least effective: SSH key pairs By disabling password-based authentication and requiring ssh key pairs, you reduce the chances of compromise via a brute force attack. If you’re new to using ssh keys, there are many great guides that can walk you through the process. Firewall Limiting the source IP addresses that can access your server on port 22 is simple and effective. The iptables rules would look something like this: Use a non-standard port I’m not a big fan of security through obscurity and it doesn’t work well for ssh. If you prefer this method, simply adjust the Port configuration parameter in your sshd_config file.

An Illustrated Guide to Cryptographic Hashes With the recent news of weaknesses in some common security algorithms (MD4, MD5, SHA-0), many are wondering exactly what these things are: They form the underpinning of much of our electronic infrastructure, and in this Guide we'll try to give an overview of what they are and how to understand them in the context of the recent developments. But note: though we're fairly strong on security issues, we are not crypto experts. We've done our best to assemble (digest?) A "hash" (also called a "digest", and informally a "checksum") is a kind of "signature" for a stream of data that represents the contents. Let's first see some examples of hashes at work. Many Unix and Linux systems provide the md5sum program, which reads a stream of data and produces a fixed, 128-bit number that summarizes that stream using the popular "MD5" method. $ cat smallfile This is a very small file with a few characters $ cat bigfile This is a larger file that contains more characters. Verifying file integrity #!

Re: [Google Chrome Browser] Google Mail Checker Plus: JavaScript Code Execution Full Disclosure mailing list archives Re: [Google Chrome Browser] Google Mail Checker Plus: JavaScript Code Execution From: Jardel Weyrich <jweyrich () gmail com> Date: Sun, 20 Feb 2011 15:23:00 -0300 The XSS in Google Mail Checker Plus was reported in 06/2010. Well, at least "><script>alert(/XSS/)</script> works great: Thx to Friedrich Hausberger for his mail to FD :) ck _______________________________________________ Full-Disclosure - We believe in it. _______________________________________________ Full-Disclosure - We believe in it. By Date By Thread Current thread:[Google Chrome Browser] Google Mail Checker Plus: JavaScript Code Execution ck (Feb 20)Re: [Google Chrome Browser] Google Mail Checker Plus: JavaScript Code Execution Jardel Weyrich (Feb 20)

Re: University of Central Florida Multiple LFI Full Disclosure mailing list archives Re: University of Central Florida Multiple LFI From: Hack Talk <hacktalkblog () gmail com> Date: Sun, 20 Feb 2011 14:23:59 -0500 Caspian, I'm not here to catch flies, I'm here to ensure holes get patched. Chris and Luis, Thinking that a university IT department is a centralized, monolithic structure (like it is in most businesses) is stretching it. Weev, I actually know many of the "techrangers" who are UCF employed students which are in charge of maintaining websites and have spoken to them personally about these and other vulnerabilities many times in the past and they have yet to patch them. Shawn, "Hack Talk" would rather fire off 5 emails than pick up a phone, make a phone call and call someone from the WHOIS information since by his own admission he's a Florida resident who lives near UCF or maybe he's worried about law enforcement after all ;-) On 02/19/2011 12:46 PM, Hack Talk wrote: Luis Santana By Date By Thread Current thread:

Related: