installed Red Hat, Caldera, TurboLinux or any system that uses RPM. You can use RPM to verify the integrity of system files:
First, you should find out which software package the files you want to view come from. you can use the rpm command to find out which file belongs to a certain package:
# Rpm-qf/bin/netstat
Net-tools-1.51-3
Then, you can scan the entire rpm Package to view the changes. If you use this command for a packet that has not changed, there will be no output information, as sh
collection, the use of content publishing system to publish the content of the site into a static page is very necessary. For example:
http://www.why100000.com/_ftp/than http://www.why100000.com/_ftp/Man.php?mode=manamp;parameter=introamp;section= 3
easier access to search engine index. And in the URL hit sometimes than in the title can also highlight keywords. And the more pages you can get into the Google index, the better. You can use a script similar to the following to count your site b
. If I use RPM-QF to test PS and top commands, I can get it belonging to the package Procps and then
Verify the integrity of the package Procps. The following is the result of a "black" site:
# Rpm-qf/bin/ps Procps.2.0.2-2
# rpm-v Procps
SM5.. Ugt/bin/ps
.. Ugt/usr/bin/top
The attacker hacked into the system and replaced the commands in our system with their own PS and top commands. So that administrators
1 /************************************************************2 title: Frequent values (POJ 3368)3 Links:http://poj.org/problem?id=33684 Test Instructions: Give the n number and Q query (L,R), for each query to find (L,R)5 the maximum number of consecutive occurrences6 algorithm: RMQ7 idea: With the help of array f[i]. Indicates that F[i] is the same number in front of the first bit. For8 each interval (l,r). The violence begged for several of the same numbers before. And then use the RMQ9 the
Tip: ARGB alpha channel A + original YUV surface y0 + to write in Y1 = calculate a new y2.The calculation formula is(y1 * A + y0 * (255-a))/255void Rgb2yuv (int r, int g, int b, int *y, int *u, int *v) {int y0, u0, v0;y0 = 66*r + 129*g + 25*b;u0 = -38*r + -74*g + 112*b;v0 = 112*r + -94*g + -18*b;y0 = (y0+128) >>8;u0 = (u0+128) >>8;v0 = (v0+128) >>8;*y = y0 + 16;*u = u0 + 128;*v = v0 + 128;} void Yuv2rgb (int y, int u, int v, int *r, int *g, int *b) {int r0,g0,b0;v = V-128;u = U-128;r0 = y + V +
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.