Alibabacloud.com offers a wide variety of articles about information system security notes, easily find your information system security notes information here online.
20145216 20145330 "Fundamentals of Information Security system design" a familiar experimental report cover for the Experimental development environmentExperimental content1. Connecting the ARM Development Board2. Build HyperTerminal3. Start the experimental platform4. Modify the IP of the XP system and the Redhat virt
20145239 "Information Security system Design Fundamentals" The 7th Week study summary textbook Learning content Summary6.1 Storage Technology6.1.1 Random access memory (divided into two categories)Static RAM (SRAM): Fast, as cache memory. (hundreds of thousands of MB)Dynamic RAM (DRAM): As main memory, the frame buffer of the graphics
exception.
The typical errors are:scanf("%d",val);
(2) Read uninitialized memory
Although the bass memory location is always initialized to 0 by the loader, it is not the case for heap storage.
A common mistake is to assume that the heap memory is initialized to 0.
(3) Allow stack buffer overflow
If a program writes to the target buffer in the stack without checking the size of the input string, the program will have a buffer overflow error.
(4) Assume t
. Garbage collectionvoid Garbage (){int *p = (int *) Malloc (15213)Return}garbage collector:is a dynamic storage allocator that automatically frees allocated blocks that are no longer needed by the program. These blocks are called garbage. The process of automatically reclaiming heap storage is called garbage collection. The following functions are used in the description of Marksweep: where PTR is defined as typedef void *PTRPtrisptr (PTR p): if p points to a word in an allocated block, it ret
20145222 Summary of the sixth week of information security system design (1) Chapter 4 processor architecture
Command architecture: Byte encoding of commands and commands supported by a processor4.1y86 instruction set architecture
· Y86: includes defining various state elements, instruction sets and Their encoding, a set of programming specifications, and excepti
2018-2019 20165227 "Information Security system Design Fundamentals" The third week to learn to summarize learning objectives
Understanding the concept of reverse
Master X86 compilation base, able to read (reverse) Assembly code
Understanding ISA (Instruction set architecture)
Understand the concept of function call stack frames and can debug
-2018-2019-1 20165206 "basis of information security system design" weekly learning Summary-textbook learning content Summary-hexadecimal conversion and bitwise calculation:
Converts a hexadecimal parameter to a binary representation and performs binary operations.
And, or, not, or, in bitwise operations, corresponds to , |, ~ in C ,~ ^-Logical operation:
Only 0
folder4. Modify Makefile5. Run make to generate the executable file httpd6. Use the NFS service mode to download the HTTPD to the Development Board and copy the test page for debugging, in this case the index test page.1. The understanding of the experiment process, the understanding of the knowledge point in the experiment instruction book.(1). Signal () functionSignal (SIGHUP, sig_ign);Signal signal function, the first parameter represents the signal value to be processed (SIGHUP), the second
, such as read, are stopped in the Read function, and so on, the Read function is finished, in fact, the control is no longer in main, but through the read function to jump to the kernel. Also such as the signal, the process receives the signal, the trigger control jumps to the signal processing program.This is also true of the non-local jump that is now spoken. The control jumped away.
The user-level exception control flow form, called a non-local jump, transfers control directly from one
)That is, the number is rounded up or down, and the lowest valid number of the result is even.Can be used in binary decimals.2. Rounding to 0That is, rounding down integers and negative numbers rounded up.3. Rounding DownBoth positive and negative numbers are rounded down.4. Rounding upBoth positive and negative numbers are rounded up.Iv. floating-point arithmetic 1. floating-point addition
Floating-point addition is exchangeable
Floating point addition not binding
The floating-
# Summary of "Fundamentals of Information Security system Design" courseNo. 0 Week SummaryBrief content:Using the virtual machine VirtualBox successfully installed Linux system, preview the Linux basic primer, read Lou teacher recommended blog Impressions.Two-dimensional code:1th Week SummaryBrief content:Introduced Li
20145336 Zhang Ziyang "The foundation of Information Security system Design" 9th Week Study Summary Learning goal
Mastering the concepts of system programming and system invocation
Mastering the way of system programm
);
Functions for reading and writing strings (Fgets and Fputs)
Flow application: A stream is a pointer to a structure of type file (for example, every Asni C file opens, it will open stdin,stdout,stderr three streams at the same time).
Meaning: A stream is an abstraction of a file descriptor and a stream buffer. (The purpose of the stream buffer is similar to Rio, which is to reduce the number of expensive UNIX system calls)
descriptor table entry OLDFD to the Descriptor table entry NEWFD, overwriting the previous contents of the Descriptor Sheet table entry newfd. If the NEWFD is already open, Dup2 will close NEWFD before copying the OLDFD.#include int dup2(int oldfd,int newfd);8 Standard I/OThe standard I/O library models an open file as a stream, which is a pointer to the structure of the file type.#include *stdin; /*标准输入,文件描述符为0*/extern FILE *stdout; /*标准输出,文件描述符为1*/extern FILE *stderr; /*标准错误,文件描述符为2*/A strea
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.