Skyeye is a hardware simulation tool that can run embedded operating systems, so that you can develop embedded systems without hardware conditions. The following operations are performed in Fedora Core 1.0.
Skyeye project resource
Written using recursive algorithms, similar to the "Tree" command in DOS
# Include # Include # Include # Include # Include # Include Int I;Int deep;Int cfil;Int cdir;Int HKG (){For (I = 0; I {Printf ("");}Return 0;}Int digui (char * X){Dir *
Http://www.isi.edu/nsnam/ns/tutorial/
1. The following table shows the approximate ing between ns2-and TCP/IP and OSI Layer-7 network structures (this table is very helpful)
TCP
NS2.
OSI
Application Layer
Application
1. Overview
Some common applications written using UDP include DNS (Domain Name System), NFS (Network File System), and SNMP (Simple Network Management Protocol)
Provides typical function calls for UDP client/server programs:
2. recvfrom
The UNP summary at the beginning only lists the simplified details of the relatively important content. For details, see the UNP socket API third edition.
1. the customer and the server are in the same Ethernet and have the following communication
Int main (INT argc, char * argv [], char * envp [])The main () function generally uses Int or void. I prefer to use the int type to define main. Because at the end of the operation, a value can be returned to the operating system to indicate
To add a hidden account,
Add the following in the registry:
Therefore, set this [HKEY_LOCAL_MACHINE/SAM/domains/account/users/names/A $]@ = Hex (1f4 ):
It is valid for 2000 and XP, but after restart, it cannot be opened in the management tool.
In
TCP learning: Building a simple customer/Server System -- A bounce System
For more information, see UNIX network programming. This is only a modified version. It does not need to depend on any files and can be compiled independently on two different
(UNIX basics)1. Unix Architecture
Vc/U2tfuuvOjqTwvcD4NCjxoMiBpZD0 = "2-List the names of all files in a directory, that is, the implementation of the command ls"> 2. List the names of all files in a directory, that is, the implementation of the
Add commands to vivi and vivi
Add your own commands in lib/command. c of vivi
The core data structure is user_command.
Typedef struct user_command {
Const char * name; // command name
Void (* prop func) (int argc, const char **); // command
Linux multi-process learning and Linux Process Learning1Linux Process Overview a process is a process executed once by a program. It is essentially different from a program. The program is static. It is a set of commands stored on disks in sequence.
View the internal representation of the RenderObject tree and view the renderobject tree
Sometimes we need to know the specific details of the page layout we write. DumpRenderTree is a good tool. It is located in the WebKit/WebKitBuild/[Debug |
ArticleDirectory
Iii. Application
Iv. References
I. Overview
Trusted CT is a software tool used in UNIX systems for automated control and testing. It is made by Don libes and is an extension of the Tcl scripting language. It is
Chen Zhimin dd---- Detours is a function library developed by Microsoft ( Source code Available for free in http://research.microsoft.com/sn/detours), used to modify running Program Images in the memory, even if there is no source Code It can also
Pipeline creation function:
# Include IntPipe (IntPipefd [2]);
Pipefd [0] indicates the file descriptor of the pipe Reading end, And pipefd [1] indicates the file descriptor of the pipe writing end. Information can only be read from pipefd [0],
Applicable to: overflow fans
Prerequisites: Basic Principles of assembly language and Buffer Overflow
Ollydbg Format String 0day analysis and utilization
Text/figure gyzy [Department of Information Security, Jiangsu University & Est]
As a debugger
/******************** This article can be forwarded, but the forwarder must retain the author's signature permission
* *** Li Hao
* *** MSN: lihao_nx@hotmail.com
****
* Email: lihaoyxj@gmail.com
* *** Source: lihaoyxj.cublog.cn
* *** Www.cnblogs.com/
Linux epoll introduction and program example
1. Where is epoll sacred?
Epoll is currently a hot candidate for developing large-scale concurrent network programs in Linux. epoll is officially introduced in the linux2.6 kernel, similar to select, in
Objective: To detect the idle MAC address of a wireless node every 0.0005 seconds
Implementation Scheme:
Solution 1: print the is_idle () value in a handler loop.
Implementation: Refer to season29, simulate the DSR handler class in the DSR protocol,
A simple example illustrates how TCL maps to C ++. The purpose of a program is to create a new network object class "myagent", which is a subclass of "agent.
Below I paste the ex-linkage.cc code here:
// This is a simple agent just for show# Include
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.