2008年6月30日星期一

2008.6.30 linux operating log

1. yumdownloader 下载到/etc/yum.repos.d
而不是yum.conf指定的cachedir

2. yum update更新系统时,临时下载的软件包放在/etc/yum.conf指定的cachedir中。在软件安装之后这些临时软件包会被删除。

3. opensuse11内核2.6.25.-1.1-pae
装vmware6.03,同样需要vmware-any-any-update117.tar.gz补丁

4. opensuse11上用非管理员用户使用vmware ws,将虚拟机文件所在的目录的owner改为使用者id。
chown -R user /mnt/vmwarefiles

标签:


fedora8下安装vmware tools

配置
host os: fedora 9
guest os: fedora 8 内核版本:2.6.23.1-42.fc8

1. yum install gcc
安装gcc

2. rpm -ivh VMwareTools-6.0.3-80004.i386.rpm
安装VMware tools源文件,此部分也可以tar.gz格式的安装实现

3. yum install kernel-devel-2.6.23.1-42.fc8
安装kernel-devel,即内核源文件,要与当前running kernel版本相符合

4. 运行/usr/bin/vmware-config-tools.pl
一步步完成安装。
之后可以自由调分辨率,爽吧!
guest和host之间拖动文件仍然没解决。
与host之间的共享通过hgfs实现
vi /etc/fstab
可以看到
.host:/ /mnt/hgfs vmhgfs
但启动时会提示mount local filesystem failed
进入系统后 mount .host:/ /mnt/hgfs -t vmhgfs即可,一定要指定文件系统类型:-t vmhgfs

标签:


fedora9下.7z的解压

#yum install p7zip
=============================================================================
Package Arch Version Repository Size
=============================================================================
Installing:
p7zip i386 4.51-4.fc9 fedora 661 k

#7za e Fedora-8.7z

标签:


scroll lock键用处

Scroll Lock键最早出现在IBM的PC/XT机型的83键盘和AT接口的84键盘上,现在这个键不仅仅出现在PC机的101键盘上,连苹果机的“增强”型键盘上也加上了该按键。该键在DOS时期用处很大,由于当时显示技术,限制了屏幕只能显示宽80个字符长25行的文字,在阅读文档时,使用该键能非常方便地翻滚页面。随着技术发展,在进入Windows时代后,Scroll Lock键的作用越来越小,不过在Excel中它还是有点用处:如果在Scroll Lock关闭的状态下使用翻页键(如Page Up和Page Down)时,单元格选定区域会随之发生移动;反之,若要在滚动时不改变选定的单元格,那只要按下Scroll Lock即可。

以上是官方说法

标签:


2008年6月29日星期日

gotta have you

吉他,手提箱,温暖的外套,
这里的天气还跟夏天一样烦恼。
不能没有你,任性、撒娇,幻想在凌晨枕着你的微笑。

寻找久违的感觉
感受久违的感动
复苏麻木的心
where is my desired happyness?


gray, quiet and tired and mean
  picking at a worried seam
  i try to make you mad at me over the phone
  red eyes and fire and signs
  i'm taken by a nursery rhyme
  i want to make a ray of sunshine and never leave home
  
  no amount of coffee
  no amount of crying
  no amount of whiskey
  no amount of wine
  no, nothing else will do
  i've gotta have you
  i've gotta have you
  
  the road gets cold
  there's no spring in the middle this year
  i'm the new chicken clucking open hearts and ears
  oh, such a prima donna
  sorry for myself
  but green, it is also summer
  and i won't be warm till i'm lying in your arms
  
  i see it all through a telescope:
  guitar, suitcase, and a warm coat
  lying in the back of the blue boat
  humming a tune...


The Weepies,一只由Deb Talan和Steve Tannen组成的流行民谣二重奏。两人初次相遇是在Tannen的波士顿音乐会上。在此之前,两人都已各自发表过自己的作品(Deb Talan发行过3张,Steve Tannen发行过2张)。二人相互钦佩,很快就一起开始了创作歌曲,并且Weepies很快诞生了。
2004年,他们独立发布了8只歌的EP“Happiness”,并且在二年后签约Nettwerk厂牌。
2005年12月,The Weepies在此厂牌录制完成全新专辑“Say I Am You”,并于2006年3月正式发行。特点是旋律简单,音乐流畅,人声舒服,清新自然。有女生独唱且有男声独唱,亦有男女声混唱,美丽却不张扬。
淡淡的感觉带着简洁和清新的味道,细腻的吉他,抒情的歌词,非常值得品味。

标签:


Web 设计十诫 (zz)

"最近 BusinessWeek.com 邀请了14名 Web 设计方面的顶尖专家,就 Web 设计发表自己的看法,最终,他们编写了 Web 设计的十条诫令。

1. 不可滥用 Flash

Adobe 备受欢迎的 Web 动画技术,Flash,在很多地方显示了它的威力,从 Nike 充满炫耀味道的整体 Flash 网站,到充斥各个网站的 Flash Banner 广告,然而该技术很容易被滥用,大量的,无节制的 Flash 动画不仅带来易用性问题,而且让用户的浏览器不堪重负。
2. 不可搅扰内容

广告对一个网站的生存也许很重要,但易用性研究者认为,弹窗广告,以及全屏广告会扰乱网站的内容,并挑战用户再次访问的信心。传统的 Banner 广告可能更好一些。

3. 不可失去条理

Web 是个大宝藏,但失去条理的网站让人无法访问其中的内容。包括 Amazon.com 在内的一些优秀网站向来将对内容的组织视为首要设计任务。

4. 不可滥用玻璃倒影效果

苹果向以时尚与酷绚的设计著称,但一些专家称,苹果在他们的产品图片中设计的玻璃倒影效果被大量模仿,最终将这种风格演变成恶俗。

5. 不可在网站命名中跟风

一些聪明的网站主在网站命名中不使用任何元音,或尽可能多用元音,比如,Flickr, Smibs, 以及 Meebo,这些命名方式会随着时间很快过时。(中国网站流行的恶俗命名方式包括使用数字谐音,所以,我们有数以万计的 51 什么什么的网站 - 译者)

6. 应当重视文字版面

尽管宽带连接无处不在,但纯文字版面的网站仍然拥有一种不可低估的势头。这类网站的典型包括 Craigslist ,Coudal Partners ,Daring Fireball 。(还有译者最推崇的 Alisapart.com)

7. 应当有吸引用户的内容和体验

单单漂亮还不够,Facebook 以及 YouTube 一类的站只所以吸引用户,是因为他们有抓人的内容。

8. 应当走向社会化

Web2.0 已经无处不在,MySpace 一类的站点引领了用户交流沟通的趋势。

9. 应当大众熟悉的技术

Wikipedia, YouTube, Facebook 一类的网站已经成为很多人生活的一部分。应当将这些网站中的元素引入你的设计,让你的用户感到亲切,熟悉。

10. 应当坚持内容为王

内容为王的口号已经不新鲜了,但仍然有用。外观的美丽无法弥补内容的空洞。

标签:


Is there a father of the Internet?zz

It could be claimed that J.C.R. Licklider was a forefather of the Internet, as his ideas of a "Galactic Network" do have a resemblance to the current Internet. He promoted the theories of networking to his successors at ARPA, without whose funding the development of ARPANET and hence Internet could be called into question.

Robert Kahn was responsible for the system design of the ARPANET whilst at Bolt Beranek and Newman (BBN). After joining ARPA, he conceived the idea of open-architecture networking, the underlying principle of the Internet, which led him to co-develop the protocols required to make the Internet a reality, namely TCP/IP.

Through working for Leonard Kleinrock, Vint Cerf helped to develop the host level protocols of the ARPANET and then on software for the Network Measurement Centre, which measured the performance of the ARPANET. His work led him to work with Robert Kahn in co-developing the protocols, TCP/IP.

Jon Postel is often touted as a father of the Internet. Indeed, he had a significant part to play in the development of the Internet, through his control of the Requests for Comments and founder of the Internet Assigned Numbers Authority.

For the Internet to exist there had to be a method of embracing open-architecture networking, this was only possible through the introduction of TCP/IP. I therefore believe that Robert Kahn and Vint Cerf have the strongest claims to be called father(s) of the Internet, In fact Vint Cerf maybe more so, he has continued to nurture and promote the Internet (as any father would do) through his roles as President of the Internet Society (the closest thing the Internet has to a governing body), Chairman of the Internet Societal Task Force and his work at the Jet Propulsion Laboratory to design an interplanetary Internet. Kahn and Cerf received the U.S. National Medal of Technology from President Clinton in December 1997, for founding and developing the Internet.

However, if we the use concept of Systems Thinking, i.e. looking at the whole, then the development of the Internet has relied on more than just the development of TCP/IP, developments such as packet-switching were vital, the freedom of information provided by Jon Postel enabled rapid growth, and support of Government in providing an envirnoment & funding for it to have been developed. In fact, Vice President of USA, Al Gore, has even claimed his role:

"During my service in the Unites States Congress,
I took the initiative in creating the Internet"
The Internet may have two father figures in Vint Cerf and Robert Kahn but there are many more who have a valid claim to its birth. The media will always look for an inventor or creator, but in this instance there is a whole family who are responsible for the fatherhood of the Internet.

标签:


2008年6月28日星期六

维基百科如何依赖极少的预算应付巨大的访问量

非赢利的维基百科是世界上访问量最高的几个网站之一,它的维护资金主要来自捐赠,数额并不大。因此维基百科提供了一个不可多得的研究案例,如何花最少的钱做最好的网站。在这样一个时代里,微软和Google的数据中心遍布全球,每一个都要投入5亿美元去建造,而维基百科的基本设施却只有不到300台服务器,安放在佛罗里达州Tampa市中的单一数据中心内。在周一的Velocity讨论会上,MySQL/Sun的 Domas Mituzas 提供了维基内部的技术信息,他称之为“压迫式运作”。Mituzas是Sun的MySQL支持工程师,他透露了维基百科是如何运作的:
每秒50,000次http请求;
每秒80,000次 SQL查询;
7百万注册用户;
英文版有1800万页面对象;
2.5亿链接;
2.2亿个修订版;
1.5T压缩数据;
2001年维基百科上线时是使用Perl CGI脚本,运行在单一服务器上。现在维基百科有200个应用服务器,20个数据库服务器,70个Squid cache代理和缓存服务器。

标签:


Powerset独家获得自然语言处理搜索技术使用权 将挑战Google

  这是今天的一则爆炸性的新闻。首先我们要知道"自然语言"即"natural language",把自然语言处理技术应用于搜索引擎里,那么理论上,搜索引擎即可拥有理解人类所使用的自然语言的含义的能力。Powerset是美国旧金山的一家搜索引擎公司,它的搜索引擎所使用的核心技术正是基自然语言处理技术。这使得Powerset与Google从本质上有区别。Google依靠的是PageRank技术,即通过一定的统计学方法计算用户所搜索的关键词在网页中出现的频率,从而把相关的结果返回给用户。尽管Google一直以来都在苦苦研究自然语言处理技术,但至今为止,我们还没看到这种技术被应用于Google的搜索引擎里(拼写纠正及搜索建议不算,因为它们属于基于统计学的一些延伸方法)。而这一次,Powerset走出了重要的一步,也是领先于Google的一步。
  根据venturebeat的报道,Powerset将在本周五公开对外宣布,它已经正式获得了PARC(施乐公司旗下的著名的帕洛阿尔托研究中心)所研发的自然语言处理技术的独家使用权。这种自然语言处理技术将使得Powerset搜索引擎能理解用户所搜索的关键词的含义以及多个关键词之间的关联,从而找出符合人类思维的真正的相关结果。这将使得Powerset的搜索引擎具备从现有的搜索市场突围而出的条件。Powerset从去年开始就与PARC进行了有交这项技术的商谈,现在终于成功。

  Google自家的PageRank技术虽然很有效,也使得Google搜索引擎成为了当前最好搜索引擎,但事实上,Yahoo!和微软都已经模仿了Google的这种技术而推出了各自的搜索引擎,这是因为在今天,要模仿Google的技术也并不是一件难事。Powerset也可以,并且它现在还拥有了这项独门秘技,它很可能会把这两种技术结合起来,应用于自己的搜索引擎,从而大幅度地提高搜索结果的准确度和相关性。Powerset一直以来招聘了不少来自Yahoo!及其它搜索引擎公司的技术专家,为自己的搜索引擎作准备。

  看了上面的消息,你可能很想马上试用一下Powerset的搜索引擎。不过很不幸的是,Powerset的搜索引擎现在还没正式推出,不过预计会在今年内推出。

  或许你早就厌倦了"Google杀手"、"比Google更好的搜索"这类口号,但这一次Powerset无疑更有实力。良好的自然语言处理能力是使得搜索引擎走向人工智能化的重要条件,也是必备的条件。如果你还在期待下一个Google,或许Powerset是你应该关注的候选人之一。

标签:


Liberation字体提高文档互操作性

在GNU/Linux系统上,如果你用OpenOffice.org打开Word文档,常会碰到乱码,多数时候这并非是OOo的问题,而是缺少字体。大多数Word文档使用了像“Arial”或“Times New Roman”等微软版权的核心字体,微软已经不再向非Windows用户免费发布它们,因此GNU/Linux发行版默认没有安装。字体本身可能是有版权的,但字体的结构并没有,因此可以据此创造外形不同,工作效果相同的免费字体。Red Hat就是如此做的,不久前它发布了Liberation字体。
Liberation fonts,最初是以GPLv2+两个例外的许可证发布。第一个例外没啥问题,只是声明在文档中植入该字体不表示是对文档的派生工作。第二个例外引发了异议,它是一个反固化条款,要求任何实际的发行必须允许安装它的修改版本,该条款甚至引发了RMS的反对。由于许可证问题,大的发行版没有加入Liberation字体。不过问题现在已经解决,Debian已经接受了Liberation,其它发行版预计不久后就会跟进。

On May 9, 2007, Red Hat announced the public release of these fonts under the trademark LIBERATION at the Red Hat Summit. There are three sets: Sans (a substitute for Arial, Albany, Helvetica, Nimbus Sans L, and Bitstream Vera Sans), Serif (a substitute for Times New Roman, Thorndale, Nimbus Roman, and Bitstream Vera Serif) and Mono (a substitute for Courier New, Cumberland, Courier, Nimbus Mono L, and Bitstream Vera Sans Mono). The fonts are now available for you to install.

Those running Red Hat® Enterprise Linux® and/or Fedora™ systems who want to install the fonts in RPM format can get them from the links below. In the future, they will be available through the Red Hat Network® service. We have also provided the fonts in the popular True Type format.

You are free to use these fonts on any system you would like. You are free to redistribute them under the GPL+exception license found in the download. Using these fonts does not subject your documents to the GPL--it liberates them from any proprietary claim. Once you have installed these fonts, we encourage you to make them your default in Thunderbird, Firefox, and Open Office. Heck, for that matter make them your default in Microsoft® Office®, in Microsoft Windows®, in Apple OSX®... in anything you would like. In many applications you can set Times New Roman, Arial, and Courier New to convert to these fonts.

This is just one way for Red Hat to say thank you to all our friends in the open source community for all you have done to make us successful.

标签:


ICANN Board Approves Wide Expansion of TLDs(zz)

"The Internet Corporation for Assigned Names and Numbers (ICANN) has approved the relaxation of the rules for the introduction of new Top-Level Domains — a move that could drastically change the Internet. 'We are opening up a new world and I think this cannot be underestimated,' said Roberto Gaetano, an ICANN board member. The future outcome of this decision was discussed on Slashdot a few days ago. It also seems, based on this post on CircleID from last month, that ICANN was already in preparation mode of mass TLD introductions. The new decision will allow companies to register their brands as generic top-level domain names (TLDs). For instance, Microsoft could apply to have a TLD such as '.msn', Apple apply for '.mac', and Google for '.goog'... The decision was taken unanimously on Thursday, June 26, 2008 at the 32nd ICANN Meeting in Paris."

标签:


linux下作校验

md5sum filename
sha1sum filename

标签:


2008年6月19日星期四

e2fsck/fsck.ext2/fsck.ext3

e2fsck is used to check a Linux second extended file system (ext2fs). E2fsck also supports ext2 filesystems containing a journal, which are also sometimes known as ext3 filesystems, by first applying the journal to the filesystem before continuing with normal e2fsck processing. After the journal has been applied, a filesystem will normally be marked as clean. Hence, for ext3 filesystems, e2fsck will normally run the journal and exit, unless its superblock indicates that further checking is required.

e2fsck support ext2/ext3

that is e2fsck = fsck.ext2 + fsck.ext3

in function they are equal.

标签:


e2fsck/fsck


让Fedora 支持创建reiserfs 文件系统(zz)

一、reiserfs 文件系统优点;

reiserfs 比ext3 、ext2 以及windows中的ntfs、fat 等文件系统更安全,更优秀,速度更快;至于更专业的,您可以访问reiserfs 官方网站;但Red Hat 公司却一直认为他的ext3文件系统是最好的;所以只能把reiserfs 打倒在地了;呵... ...

从我使用的情况来看reiserfs 的确是比较安全,到目前还没有出过什么大事;ext3或者ext2文件系统,文件系统mount 到一定次数后,会fsck 检查文件系统,这是在系统启动阶段中进行的。我们知道系统启动阶段的风险最大;如果到一定时间或者文件系统被挂载一定次数就fsck ,实在是有极大的风险;


二、让Fedora 支持创建reiserfs文件系统;

我们有两个方法,一个是通过到reiserfs 官方网站下载源码包安装reiserfsprogs ;第二个方法是在线安装 reiserfs-utils ,两种办法都可以;

1、通过系统盘安装 reiserfs-utils

在Fedora Core 9.0 中,您可以在安装盘中找到reiserfs-utils-*.*.*.i386.rpm ;用 rpm -ivh reiserfs* 来安装;最好是通过本地软件包管理器 system-config-packages来安装;


请参考: 《Fedora / Redhat 软件包管理指南》

如果您能用yum或apt来在线安装或更新包;请参考:《Fedora / Redhat 软件包管理指南》

[root@localhost beinan]# yum install reiserfs-utils

[root@localhost beinan]# apt install reiserfs-utils

您也可以下载 reiserfs-utils 的软件包,请到下面的网站去查询下载;

http://ayo.freshrpms.net/fedora/linux/4/i386/RPMS.core/
http://mirrors.kernel.org/fedora/core/4/i386/os/Fedora/RPMS/

reiserfs-utils包含工具如下:
/sbin/debugreiserfs 注:用来检察文件系统的内部结构,以便手工修理损坏了的文件系统或为 reiserfsck 提供修复线索
/sbin/fsck.reiserfs 注:检查和修复reiserfs文件系统工具;
/sbin/mkfs.reiserfs 注:在空白分区创建reiserfs文件系统工具
/sbin/mkreiserfs 注:同mkfs.reiserfs
/sbin/reiserfsck 注:同 fsck.reiserfs
/sbin/reiserfstune
/sbin/resize_reiserfs


简单用法:

[root@localhost beinan]# mkfs.reiserfs 设备

这是为存储设备创建文件系统,比如我们想在/dev/sda5创建文reiserfs 文件系统:
[root@localhost beinan]# mkfs.reiserfs /dev/sda5

[root@localhost beinan]# mkreiserfs /dev/sda5

检查及修复文件系统举例:

[root@localhost beinan]# reiserfsck /dev/sda5

2、源码包安装 reiserfsprogs

reiserfs 官方是: http://www.namesys.com ;

目前 reiserfsprogs 的最新版本是 reiserfsprogs-3.6.19.tar.gz ;
我们可以到reiserfs 的官方FTP 上得到: ftp://ftp.namesys.com/pub/reiserfsprogs/

1)解压安装;
[root@localhost beinan]# tar zxvf reiserfsprogs-3.6.19.tar.gz
[root@localhost beinan]# cd reiserfsprogs-3.6.19
[root@localhost reiserfsprogs-3.6.19]# ./configure
[root@localhost reiserfsprogs-3.6.19]# make
[root@localhost reiserfsprogs-3.6.19]# make install

2)应用;

如果您想添加新分区,或者新增了硬盘,想切割硬盘,请参考:
首先您要学会用fdisk -l 来查看目您的机器的硬盘和分区情况;请参考:

通过源码包安装支持创建reiserfs 文件系统的软件包 reiserfsprog ,其中有三个是我们常用的工具mkreiserfs 、reiserfsck和debugreiserfs。

mkreiserfs 是在空白分区创建文件系统用的;
reiserfsck是检查及修复文件系统用的;
debugreiserfs 用来检察文件系统的内部结构,以便手工修理损坏了的文件系统或为 reiserfsck 提供修复线索;

简单用法:

[root@localhost beinan]# mkreiserfs 设备

这是为存储设备创建文件系统,比如我们想在/dev/sda5创建文reiserfs 文件系统:
[root@localhost beinan]# mkreiserfs /dev/sda5
mkreiserfs 3.6.19 (2003 www.namesys.com)

A pair of credits:
Alexander Lyamin keeps our hardware running, and was very generous to our
project in many little ways.

The Defense Advanced Research Projects Agency (DARPA, www.darpa.mil) is the
primary sponsor of Reiser4. DARPA does not endorse this project; it merely
sponsors it.


Guessing about desired format.. Kernel 2.6.11-1.1369_FC4 is running.

Format 3.6 with standard journal
Count of blocks on the device: 49088
Number of blocks consumed by mkreiserfs formatting process: 8213
Blocksize: 4096
Hash function used to sort names: "r5"
Journal Size 8193 blocks (first block 18)
Journal Max transaction length 1024
inode generation number: 0
UUID: 7b1fc9a2-7dbf-4d21-8f8d-687102c9d41d
ATTENTION: YOU SHOULD REBOOT AFTER FDISK!
ALL DATA WILL BE LOST ON '/dev/sda5'!
Continue (y/n): y 注:在这里输入y,就进行创建了;

我们还可以通过 reiserfsck 来检查文件系统,用法;

[root@localhost beinan]# mkreiserfs 设备

举例:比如我们对/dev/sda5这个分区做检查;

[root@localhost beinan]# reiserfsck /dev/sda5
reiserfsck 3.6.19 (2003 www.namesys.com)

*************************************************************
** If you are using the latest reiserfsprogs and it fails **
** please email bug reports to reiserfs-list@namesys.com, **
** providing as much information as possible -- your **
** hardware, kernel, patches, settings, all reiserfsck **
** messages (including version), the reiserfsck logfile, **
** check the syslog file for any related information. **
** If you would like advice on using this program, support **
** is available for $25 at www.namesys.com/support.html. **
*************************************************************

Will read-only check consistency of the filesystem on /dev/sda5
Will put log info to 'stdout'

Do you want to run this program?[N/Yes] (note need to type Yes if you do):y


note:
how to install fedora9 on reiserfs?

boot option: linux reiserfs
then you can create costom layout with reiserfs

标签:


e2fsprogs intro.

E2fsprogs: Ext2/3/4 Filesystem Utilities

e2fsprogs (sometimes called the e2fs programs) is a set of utilities for maintaining the ext2 and ext3 and now ext4 file systems. Since those file systems are often the default for Linux distributions, it is commonly considered to be essential software.

Included with e2fsprogs are:

* e2fsck, a fsck program that checks for and corrects inconsistencies
* mke2fs, used for creating ext2 and ext3 file systems
* resize2fs, which can expand and shrink ext2 and ext3 file systems
* tune2fs, used to modify file system parameters
* dumpe2fs, which prints superblock and block group information.
* debugfs, used to manually view or modify internal structures of the file system

Many of these utilities are based on the libext2fs library.

Despite what its name might suggest, the e2fsprogs work not only with ext2, but also with ext3 and ext4, which is based on ext2. Although ext3's journaling capability can reduce the need to use e2fsck, it is sometimes still necessary to help protect from kernel bugs or bad hardware.

标签:


fedora 9 启用 ext4支持大分区

fedora9's kernel is 2.6.25-14
Open /boot/config-2.6.25-14-default and search EXT4
We can find that ext4 has been already supported but with Experimental flag

In order to have ext4 option when we create filesystem, we add ext4 boot option when we boot install from CD(just space + ext4)

Then download e2fsprogs-1.41-WIP-0617.tar.gz and install which provides newest utilities support to ext2/3/4 file system.

make sure parted's version >= 1.8.8, maybe it is not the case.

Now, we can create a partition larger than 8TB, as is limited by 4KB Block's ext3 file system.

parted /dev/sdb

mklabel
mkpart
print

Then mkfs.ext3 or mkfs.ext4, all are the same case, guess mkfs.ext3 can self adjust to mkfs.ext4 when partition is larger than 8TB.

标签:


parted

1. 什么是parted

parted是一个磁盘分区管理管理工具,它比fdisk更加灵活,功能也更丰富,同时还支持GUID分区表(GUID Partition Table), 这在IA64平台上管理磁盘时非常有用。

2. parted的作用

parted同时支持交互模式和非交互模式. 它除了能够进行分区的添加,删除等常见操作外,还可以移动分区, 制作文件系统, 调整文件系统大小, 复制文件系统.

3. 使用parted

删除一个分区


Suse:~ # parted /dev/sda print

Disk /dev/sda: 160GB
Sector size (logical/physical): 512B/512B
Partition Table: msdos

Number Start End Size Type File system Flags
1 32.3kB 21.0GB 21.0GB primary ext3 boot, , , , , , , , , type=83, ,
2 21.0GB 22.0GB 1045MB primary linux-swap , , , , , , , , , type=82, ,
3 22.0GB 160GB 138GB extended , , , , , , , , , type=05, ,
5 22.0GB 160GB 138GB logical ext3 , , , , , , , , , type=83, ,

Information: Don't forget to update /etc/fstab, if necessary.

Suse:~ # parted /dev/sda rm 1
删除number为1的分区


添加一个分区


parted device mkpart part-type [fs-type] start end

添加一个大小为3GB的主分区
Suse:~ # parted /dev/sda mkpart primary 32.3kB 3GB
添加用mkpart命令
primary fs-type
32.3kB start
3GB end


制作文件系统

Suse:~ # parted /dev/sda mkfs
Warning: The existing file system will be destroyed and all data on the partition will be lost. Do you want to continue?
Yes/No? y
Partition number? 1
File system? [ext2]?
Information: Don't forget to update /etc/fstab, if necessary.


调整文件系统大小

命令格式:

parted device resize partition start end

Suse:~ # parted /dev/sda resize 1 32.3kB 5GB
前题是有空余空间


移动分区


命令格式:

parted device move partition start end

Suse:~ # parted /dev/sda move 1 5001MB
End? [10.0GB]?
Warning: You should reinstall your boot loader before rebooting. Read section 4 of the Parted User documentation for more
information.
Information: Don't forget to update /etc/fstab, if necessary.

注意: 不同于fdisk命令的使用w功能来确认来写入分区表信息, parted命令执行后立即生效,因此输入时需要谨慎.

标签:


Parted Magic intro.

Optimized at approximately 40MB, the Parted Magic OS employs core programs of VisParted and Parted to handle partitioning tasks with ease, while featuring other useful programs (e.g. Partition Image, TestDisk, fdisk, sfdisk, dd, ddrescue, etc.) and an excellent set of documentation to benefit the user. An extensive collection of fileystem tools are also included, as Parted Magic supports the following: ext2, ext3, fat16, fat32, hfs, hfs+, jfs, linux-swap, ntfs, reiserfs, reiser4, and xfs. Version 2 includes unspecified updates.


Parted Magic,一个主要用来完成硬盘分区操作的 Live CD 系统,其 2.0 版最终于近日推出。新版本使用 GParted 的分支版本 VisParted,其中包括一些 GParted 所不具有的功能,如磁盘擦除、读写卷标等。同时,Parted Magic 2.0 支持连接 Internet,可通过 Firefox 访问各种 Web 资源。此外,该版本还添加了其他一些特性,像挂载 CD/DVD、优盘时自动创建桌面图标、按 F1 可以显示所有引导选项等。

标签:


2008年6月17日星期二

42 of the Best Commercial Linux Games

Are there many high quality commercial games available for Linux? That's one of the frequently asked questions we receive in our mailbox every week.

It is true to say that the number of commercial games released for Linux each year remains small compared to other platforms. Nevertheless, we faced lots of difficult choices compiling a list of 42 of the best commercial Linux games. The selection we have finally chosen covers a wide range of different game genres, so hopefully there will be something here that will interest all.

To be eligible for inclusion in this list each game needed to be:

Released under a proprietary license with a fee required either to purchase the game, or a monthly charge

Not require Wine to run. Wine is a compatibility layer for running Windows software

Probably the best known game developer in the industry supporting Linux is id Software. They have ported many of their star titles to Linux, including Quake 4 and Doom 3. The other major innovator in the video game industry is Epic Games. They produced one of the all time classics, Unreal Tournament 2004, which we agonised over whether to include, but the list was already heavyweight in quality action games.

In any feature on Linux commercial games, there also deserves to be a special mention for Loki Entertainment Software. Between 1998 and 2001, they ported a number of games to Linux, almost all to an extremely high standard. Classic titles that spring to mine include Heretic II, Quake III Arena (featured below), Soldier of Fortune, Tribes 2, Myth II: Soulblighter, and Heavy Gear II.

Following in Loki’s footsteps, Linux Game Publishing was established in 2001 to port commercial games to Linux. Their first port was Creatures: Internet Edition.

Advocates of free software may dislike the presence of commercial games. However, having Linux games released commercially sometimes indirectly benefits gamers who prefer, or can only afford, to play freeware games. The most notable example of an awesome commercial game that was subsequently released as freeware is Wolftenstein: Enemy Territory.

Other high quality free Linux games were covered in our features, 42 of the Best Free Linux games and 42 More of the Best Free Linux Games.

Please appreciate that the list below is constantly evolving, and only represents a current snapshot. There are some very exciting games to be released shortly for Linux. Watch out for Rage, Unreal Tournament 3, Sacred Gold, Jack Keane, X3: Reunion, and Celetania in particular. It's highly probable all of these games will feature in a later 'Best of 42' article.



Now, let's scrutinize the 42 games at hand. For each game we have compiled its own portal page, providing screenshots of the game in action, a full description of the game, with an in-depth analysis of the features of the game, together with links to relevant resources and reviews.

Action
Cold War Real Time Strategy Action
Darwinia Similar to the classic Cannon Fodder
DOOM 3 Science fiction, survival horror, first-person shooter video
Enemy Territory: Quake Wars Multiplayer first-person shooter mixing Enemy Territory and Quake 4
Eve Online Massive multiplayer online game set in a persistent world
Medal of Honor: Allied Assault First-person military shooter
Quake 3 Arena Multiplayer first-person shooter game
Quake 4 Fourth title in the series of Quake first-person shooters
Savage 2 Fantasy and science-fiction; Sequel to Savage: The Battle for Newerth
ThinkTanks Tank combat designed to be a blast
Toribash Ragdoll-physics, turn-based fighting

Adventure
Penumbra: Black Plague First person horror adventure focusing on story, immersion and puzzles
Penumbra: Overture Focuses on story, immersion and puzzles

Arcade
Droid Assault
Top down fast paced high action scrolling space shooter
Galcon High-paced multi-player galactic game
H-Craft Championship Futuristic 3D racing
Marble Blast Gold 3D arcade action game with simple yet addictive gameplay

Role Play
A Tale in the Desert 3 Massive Multiplayer Online Roleplaying set in ancient Egypt
Ankh 2 Adventure game set in ancient Egypt
Neverwinter Nights Set in a huge medieval fantasy world of Dungeons and Dragons
Penny Arcade Adventures Episodic video series based on the webcomic Penny Arcade
Vendetta Online
3D space combat Massively Multiplayer Online Role-Playing Game
Wurm Online Community-centric Massively multiplayer online role-playing

Strategy
Ancient Empires Lux Play as all the great ancient civilizations
DEFCON Online multiplayer strategy global thermonuclear war
Dominions 3
Turn-based fantasy strategy
Gorky 17 Turn-based tactics mixing elements of strategy and RPG gameplay
Knights and Merchants Medieval-time based real-time strategy
Northland Adventure-Strategy; solve enigmas
Robin Hood Guide a team through missions by avoiding the sentries
Uplink Immersive "computer hacking" simulation

Simulation
Creatures Internet Edition Supervise the upbringing of a simulated AI creature
Mindrover Intelligent Robot Simulation
X²: The Threat Space trading and combat simulator set in the fictional X-Universe
X-Plane
Comprehensive, powerful flight simulator

Sports
MasterKick
Table football


Board & Card

Shredder Chess Extremely strong chess program
SmallRockets BackGammon
Backgammon for the beginner and the experienced enthusiast


Puzzle
Professor Fizzwizzle Platform based mind-expanding puzzle with over 230 levels
Runes of Avalon 2
Puzzle game with a twist
Spandex Force Create your own hero to clean up Vigilance Valley
The Amazing Brain Train Brain-boosting adventure

标签:


7大最有影响力的GNU/Linux发行版

Debian:可能最有影响力的发行版。最大特色是软件包管理系统,最令人诟病的是新版推出太慢,但用户可以通过软件包系统获得最新软件,能满足新手和专业人士的不同需求。

Fedora和Red Hat Enterprise Linux (RHEL):时间最久和最成功的商业发行版。Fedora面向社区,RHEL面向企业。Fedora特点在于创新,最新的技术和软件经常是Fedora第一个使用,开发社区很兴旺,但不适合服务器使用。RHEL则相对更为稳定。

Gentoo:其理念接近FreeBSD,强调安全性和最优化。但自从创始人Daniel Robbins加入微软后,其管理出现了混乱。

Mandriva:最初基于Red Hat,强调桌面易用性,是比较成功的商业发行版之一。

Slackware:最大特色是命令行安装工具,配置文件需要在文本下编辑,没有软件包系统,这样做的目的是让系统运行更快,可靠性更强(超越Debian)。它不流行,但给人留下深刻印象。

SUSE Linux Enterprise / OpenSUSE:和Red Hat类似,SUSE是商业版,OpenSUSE是社区开发版。由于与微软达成了受争议的专利交易,发行版的未来还无法确定。

Ubuntu:当前最流行的发行版。基于Debian,Ubuntu的成功也与Debian分不开。Ubuntu的强势文化也吸引了许多顶尖的Debian开发者,目前对它的批评声音也很少听到,争论主要集中在非自由软件的使用和发行版的商业化上。

标签:


Google的创新模式

工程师每天平均有14美元的免费食品和午餐,可以任意布置自己的工位,有20%的工作时间做自己想做的事情。衡量他们工作成绩的标准,是他们灵机一动做出来的产品能够吸引多少互联网用户使用。他们不用考虑这个产品能否卖钱。Google的创新模式是典型的互联网企业的创新模式——自下而上的创新。


Google只需要把公司的理念和战略描述出来,剩下的就是激发出每个人的热情,让他们在平等、自由、完全放权的环境中任意发挥。软件与互联网的产品差别很大。软件需要非常庞大的构思,由一个天才设计出蓝图,然后由一大群不错的工程师来完成编程。而且软件产品需要完全成熟之后,才可能推向市场,产品周期比较长。互联网上的产品非常好切割,但变化非常快,产品周期短,所以互联网更需要这样的“天才”+“全才”,快速推出新产品、新应用,然后拿到网络上让用户体验。这种在互联网时代畅行的创新模式,在中国遇到怀疑:在Google真的能平等?真的能自由?真的没有特权?李开复看到了中美工程师的差别:美国的教育体制与创新的思维更吻合,那里的IT专业人士往往EQ比较高,对市场也比较敏感,更全才一些。另外,中国人对风险的担心比较重,容易产生怀疑,甚至不相信20%的自由时间是真的。"

标签:


什么叫网络中立

  所谓“网络中立”,是指在法律允许范围内,所有互联网用户都可以按自己的选择访问网络内容、运行应用程序、接入设备、选择服务提供商。

  这一原则要求平等对待所有互联网内容和访问,旨在防止运营商从商业利益出发控制传输数据的优先级,保证网络数据传输的“中立性”。

标签:


Google To Develop ISP Throttling Detector(zz)

Update: The news story below was originally posted on Friday, June 13. It is a brief summary of a longer news article written by Cade Metz of The Register. After our article posted we were contacted by Technology Consultant George Ou, who was briefly referenced in our news story. Ou felt that Metz's coverage--and therefore our coverage as well--did not accurately represent his statements or some of the arguments for network prioritization. For the sake of balanced news coverage, we are adding a link to Ou's blog here, where he provides another perspective on this story.


Google has been very vocal on its stance for net neutrality. Now, Richard Whitt--Senior Policy Director for Google--announces that Google will take an even more active role in the debate by arming consumers with the tools to determine first-hand if their broadband connections are being monkeyed with by their ISPs:


"We're trying to develop tools, software tools...that allow people to detect what's happening with their broadband connections, so they can let [ISPs] know that they're not happy with what they're getting -- that they think certain services are being tampered with," Google senior policy director Richard Whitt said this morning during a panel discussion at Santa Clara University, an hour south of San Francisco.

In an article written by Cade Metz, a reporter for The Register, Metz explains that when the net neutrally debate first popped up at Google, Google actually considered playing along with the network-throttling ISPs:


"We were pretty well known on the internet. We were pretty popular. We had some funds available. We could essentially buy prioritization that would ensure we would be the search engine used by everybody. We would come out fine – a non-neutral world would be a good world for us."

But more idealist minds prevailed at Google, and the company has advocated network neutrality ever since--"or as Whitt likes to call it 'broadband neutrality'." Whitt didn't mention when the network analysis tools would become available.


Other participants of the panel discussion had very different opinions on network neutrality, such as "George Ou and Richard Bennett, two networking-obsessed pals who have vehemently defended Comcast's right to throttle peer-to-peer traffic." The one thing that everyone on the panel appeared to agree on, however, was that ISPs need to be transparent with how they manage their network traffic. Google's stance is that if the ISPs won't disclose that information to the public, then consumers should have the tools at hand to determine for themselves what their ISPs are doing.

标签:


2008年6月16日星期一

_T()宏

_T()是一个宏。
用了这个,可以支持UNICODE编码模式。

Windows使用两种字符集ANSI和UNICODE,前者就是通常使用的单字节方式,但这种方式处理象中文这样的双字节字符不方便,容易出现半个汉字的情况。而后者是双字节方式,方便处理双字节字符。Windows NT的所有与字符有关的函数都提供两种方式的版本,而Windows 9x只支持ANSI方式。_T一般同字常数相关,如_T("Hello")。如果你编译一个程序为ANSI方式,_T实际不起任何作用。而如果编译一个程序为UNICODE方式,则编译器会把"Hello"字符串以UNICODE方式保存。_T和_L的区别在于,_L不管你是以什么方式编译,一律以以UNICODE方式保存。

标签:


2008年6月13日星期五

China denies hacking into US computers zz

BEIJING - China denied accusations by two U.S. lawmakers that it hacked into congressional computers, saying Thursday that as a developing country it wasn't capable of sophisticated cybercrime.

ADVERTISEMENT

"Is there any evidence? ... Do we have such advanced technology? Even I don't believe it," Foreign Ministry spokesman Qin Gang told a regularly scheduled news conference.

Rep. Frank Wolf, R-Va., and New Jersey Rep. Chris Smith, a senior Republican on the House Foreign Affairs Committee, said Wednesday that their office computers were hacked into by people working from China. Both lawmakers, longtime critics of China's human rights record, said the compromised computers had information regarding political dissidents.

Wolf said four of his computers were compromised beginning in 2006. Smith said two of the computers at his global human rights subcommittee were attacked in December 2006 and March 2007.

China has a thriving information technology industry and claims to have 221 million Internet users — equal to the U.S. as the most in the world.

Qin repeated previous denials that the government sponsors computer attacks overseas and said China also was a victim of cybercrime.

"I'd like to urge some people in the U.S. not to be paranoid," Qin said. "They should do more to contribute to mutual understanding, trust and friendship between the U.S. and China."

The lawmakers' allegations came as U.S. officials were investigating whether Chinese officials had secretly copied the contents of a government laptop during a visit to China last December by U.S. Commerce Secretary Carlos M. Gutierrez and used the information to try to hack into Commerce Department computers.

China has also denied that it was involved in that incident, calling the charges groundless.

The Pentagon acknowledged last month at a closed House Intelligence committee meeting that its vast computer network is scanned or attacked by outsiders more than 300 million times each day.

Wolf said the FBI had told him that computers of other House members and at least one House committee had been accessed by sources working from inside China.

The FBI and the White House have declined to comment. The Bush administration has been increasingly reluctant to publicly discuss or acknowledge cyber attacks, especially ones traced to China.

The allegations are the latest in a series of cybersecurity problems blamed on China. Reports last year cited officials in Germany, the United States and Britain as saying government and military networks had been broken into by hackers backed by the Chinese military.

标签:


2008年6月11日星期三

Fedora9 下设置时间

shell:

date -s 11/6/2008

date -s 20:06:02

 

System->Date&Time


基于cell的超级计算机突破Petaflop记录

《纽约时报》报道,美国军方的一台超级计算机,组装了原先用于游戏主机的处理器,其计算能力比已占据TOP500头名多时的IBM BlueGene/L的两倍还多,最高运算速度超过了1.026 Petaflop(每秒1000万亿次)。

IBM的BlueGene/L位于Lawrence Livermore国家实验室,新的耗资1.33亿美元的超级计算机被命名为Roadrunner(走鹃),为Los Alamos国家实验室所在地新墨西哥州的州鸟,它将主要进行模拟核武器研究,当然也会被用于研究全球变暖之类的科学项目。Roadrunner由6948个双核芯片和 12,960个改良型Cell处理器组成。为了能直观的展现这台超级电脑的性能,美国核安全局局长Thomas P. D’Agostino说,如果全世界所有的60亿居民拿着掌上计算器,一天24小时,一周7天连续不断的进行计算,要花费46年才能抵得上Roadrunner一天的计算。

标签:


2008年6月7日星期六

有关GUID

什么是GUID
GUID是全球唯一标识符,它是一个字母数字标识符,用于指示产品的唯一性安装。在许多流行软件应用程序(例如 Web 浏览器和媒体播放器)中,都使用 GUID。

GUID是一个128位长(16字节)的数,格式为“xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx”,其中每个 x 是 0-9 或 a-f 范围内的一个十六进制的数字。例如:6F9619FF-8B86-D011-B42D-00C04FC964FF 即为有效的 GUID 值。其中前4字节为随机数;5-8字节为时间戳,记录了从1490年开始到该GUID的生成时间(低16位字在前,以分钟为单位),从而保证了时间上的唯一;9-10字节与机器重启次数有关;最后6字节一般为该机器的网卡地址(如果这台机器没有网卡,则使用另一常数),从而保证了空间上的唯一。通常平台会提供生成GUID的API。生成算法很有意思,用到了以太网卡地址、纳秒级时间、芯片ID码和许多可能的数字。GUID的唯一缺陷在于生成的结果串会比较大。

在系统中,GUID 保存在注册表的 HKEY_CLASSES_ROOT\CLSID 项下。HKEY_CLASSES_ROOT 其实是 HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\ 的快捷键,里面有很多长长的字串命名的子项,这些字串就是 GUID。


为什么要使用 GUID ?
世界上的任何两台计算机都不会生成重复的 GUID 值。GUID 主要用于在拥有多个节点、多台计算机的网络或系统中,分配必须具有唯一性的标识符。在 Windows 平台上,GUID 应用非常广泛:注册表、类及接口标识、数据库、甚至自动生成的机器名、目录名等。

“我的电脑”的GUID就是{20D04FE0-3AEA-1069-A2D8-08002B30309D},试着新建一个文件夹,将其重命名为“DD.{20D04FE0-3AEA-1069-A2D8-08002B30309D}”(DD随便),看看有什么效果。

标签:


2008年6月6日星期五

SMM Rootkit

Hackers may soon have a new weapon as a hardware-level SMM rootkit has been developed that is virtually undetectable by current computer software protection.

The SMM rootkit - short for Systems Management Module rootkit - was long known to be a theoretical possibility and now the first prototype will be demonstrated at the hacker DEFCON Black Hat conference in Las Vegas this summer.

Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer’s microprocessor, hidden from current antivirus products.

Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer’s memory that can be locked and rendered invisible to the operating system, but which can give attackers a picture of what’s happening in a computer’s memory.

The SMM rootkit comes with keylogging and communications software and could be used to steal sensitive information from a victim’s computer. It was built by Shawn Embleton and Sherri Sparks, who run an Oviedo, Florida, security company called Clear Hat Consulting.

The proof-of-concept software will be demonstrated publicly for the first time at the Black Hat security conference in Las Vegas this August.

The rootkits used by cyber crooks today are sneaky programs designed to cover up their tracks while they run in order to avoid detection. Rootkits hit the mainstream in late 2005 when Sony BMG Music used rootkit techniques to hide its copy protection software. The music company was ultimately forced to recall millions of CDs amid the ensuing scandal.

In recent years, however, researchers have been looking at ways to run rootkits outside of the operating system, where they are much harder to detect. For example, two years ago researcher Joanna Rutkowska introduced a rootkit called Blue Pill, which used AMD’s chip-level virtualization technology to hide itself. She said the technology could eventually be used to create “100 percent undetectable malware.”

“Rootkits are going more and more toward the hardware,” said Sparks, who wrote another rootkit three years ago called Shadow Walker. “The deeper into the system you go, the more power you have and the harder it is to detect you.”

Blue Pill took advantage of new virtualization technologies that are now being added to microprocessors, but the SMM rootkit uses a feature that has been around for much longer and can be found in many more machines. SMM dates back to Intel’s 386 processors, where it was added as a way to help hardware vendors fix bugs in their products using software. The technology is also used to help manage the computer’s power management, taking it into sleep mode, for example.

In many ways, an SMM rootkit, running in a locked part of memory, would be more difficult to detect than Blue Pill, said John Heasman, director of research with NGS Software, a security consulting firm. “An SMM rootkit has major ramifications for things like [antivirus software products],” he said. “They will be blind to it.”

Researchers have suspected for several years that malicious software could be written to run in SMM. In 2006, researcher Loic Duflot demonstrated how SMM malware would work. “Duflot wrote a small SMM handler that compromised the security model of the OS,” Embleton said. “We took the idea further by writing a more complex SMM handler that incorporated rootkit-like techniques.”

In addition to a debugger, Sparks and Embleton had to write driver code in hard-to-use assembly language to make their rootkit work. “Debugging it was the hardest thing,” Sparks said.

Being divorced from the operating system makes the SMM rootkit stealthy, but it also means that hackers have to write this driver code expressly for the system they are attacking.

“I don’t see it as a widespread threat, because it’s very hardware-dependent,” Sparks said. “You would see this in a targeted attack.”

But will it be 100 percent undetectable? Sparks says no. “I’m not saying it’s undetectable, but I do think it would be difficult to detect.” She and Embleton will talk more about detection techniques during their Black Hat session, she said.

Brand new rootkits don’t come along every day, Heasman said. “It will be one of the most interesting, if not the most interesting, at Black Hat this year,” he said.

标签:


Yahoo、MSN和Google(zz)

2006.2

我自己经常使用的网络服务无非就是这3家公司的,MSN Messenger、Hotmail、Gmail等等,用起来都很不错,对于这3个世界上访问量最大的网站,我这里简要地对其进行一下比较和分析。

  流量:Yahoo,Google,MSN是世界上流量最大的三个网站。如果以三个月平均流量计算,排名是:Yahoo,MSN,Google,如果按本月流量计算,排名是:Yahoo,Google,MSN。值得注意的是,Yahoo的平均每用户浏览页面数几乎是MSN和Google的2倍多。如果按照年来统计,Google是这三个网站中唯一去年整年呈现流量增加趋势的网站。

  流量来源:根据第三方机构Alexa的统计,Yahoo有52%的流量来自Yahoo邮件,8%来的流量自搜索,MSN则有高达73%的流量来自Hotmail邮件,8%的流量来自搜索。Google则有76%的流量来自搜索,9%的流量来自图片搜索,7%的流量来自Gmail邮件。在这个流量统计中我们可以看到Google在搜索方面的明显优势。

  邮件系统:Google的Gmail无论从功能上、使用方便、甚至广告上都远远超过了MSN和Yahoo了。速度快如飞,强大的反垃圾邮件和邮件搜索功能,支持smtp和pop,容量高达2.7G,并引入了邮件会话这样全新的概念,没有图片广告,文字广告内容和邮件内容相关,可以说是邮件系统中的极品了。MSN Hotmail的初始容量只有2M,美国用户可以增加到250M,反垃圾邮件功能还不错,支持httpmail,可以从Outlook中接收邮件,速度较慢。Yahoo Mail的邮箱容量为1G,不支持Outlook接收,反垃圾邮件功能平平,速度一般。

  工具条:Google的工具条我用的时间最长,里面的一些实用功能值得称道,可惜beta版的网络书签功能太简陋,不提供导入导出功能,实在遗憾。Yahoo的工具条我最欣赏的是其网络书签,可以导入导出IE收藏夹,在不同机器间可以迅速同步,非常方便,管理也不错,另外请注意千万不要误装了雅虎助手工具条,那可是3721的变种。MSN的工具条竟然有8.8M,还绑定了桌面搜索,让人没心情安装了,其网络书签功能也有导入导出IE收藏夹,但感觉速度慢,而且在浏览器左边打开,用起来不很方便。

  BLOG:Google的Blogger是世界上使用最多的Blog系统之一,可惜在中国一直被封。最近Google的中国员工开通了“Google黑板报”,系统好像也是用Blogger搭建的,具体搭建方法我以前也介绍过,黑板报里面的内容是Google普通员工的一些文章和想法,不过没有评论系统。MSN的MSN space在中国可以访问,喜欢封人是其一大特色,但我觉得其Blog系统不怎么样,不如Blogger标准,有点不伦不类的感觉。Yahoo的360还处于测试阶段,看起来用户也不多。

标签:


2008年6月5日星期四

Fedora9下安装vmware6.0.3

1. 全安装i386的dvd版本,没有kernel source,无法编译vmware,下载与内核版本对应的kernel-devel安装包(2.6.25-14.i386),安装。
2. 安装vmware-6.0.3.i386.rpm。
3. 运行/usr/bin/vmware-config.pl,此时编译还是通不过。下载vmware-any-any-update117.tar.gz,对vmware打补丁。114、115可能只适合老版本的fedora,此处必须是117。
4. 再运行/usr/bin/vmware-config.pl,即可正常编译,有几个warning,忽略之。

安装之后运行体验
1. 3G内存,core duo q6600四核cpu下,开两个640M内存xp虚拟机,即感到力不从心。
2. 虚拟机外往虚拟机里托东西顺利,但是从虚拟机往外托东西托不动。
3. 在工作一段时间后,shell会死掉。

标签:


2008年6月4日星期三

走近 WSH(Windows Scripting Host)

WSH--这个在词典中都很难找寻的名词,对许多朋友来讲也许还比较陌生。但正是WSH ,使 Windows 操作系统具备了更为强大的功能。它让我们在使用系统时拥有了许多的便利,但同时,也让我们的电脑遭遇了不少的麻烦。 下面,就让我们一步步走进 WSH 的神秘世界,共同评判它的是非功过。

一、WSH 是什么?

WSH,是“Windows Scripting Host”的缩略形式,其通用的中文译名为“Windows 脚本宿主”。对于这个较为抽象的名词,我们可以先作这样一个笼统的理解:它是内嵌于 Windows 操作系统中的脚本语言工作环境。

Windows Scripting Host 这个概念最早出现于 Windows 98 操作系统。大家一定还记得 MS-Dos 下的批处理命令,它曾有效地简化了我们的工作、带给我们方便,这一点就有点类似于如今大行其道的脚本语言。但就算我们把批处理命令看成是一种脚本语言,那它也是 98 版之前的 Windows 操作系统所唯一支持的“脚本语言”。而此后随着各种真正的脚本语言不断出现,批处理命令显然就很是力不从心了。面临这一危机,微软在研发 Windows 98 时,为了实现多类脚本文件在 Windows 界面或 Dos 命令提示符下的直接运行,就在系统内植入了一个基于 32 位 Windows 平台、并独立于语言的脚本运行环境,并将其命名为“Windows Scripting Host”。WSH 架构于 ActiveX 之上,通过充当 ActiveX 的脚本引擎控制器,WSH 为 Windows 用户充分利用威力强大的脚本指令语言扫清了障碍。

再具体一点描述:你自己编写了一个脚本文件,如后缀为 .vbs 或 .js 的文件,然后在 Windows 下双击并执行它,这时,系统就会自动调用一个适当的程序来对它进行解释并执行,而这个程序,就是 Windows Scripting Host,程序执行文件名为 Wscript.exe (若是在命令行下,则为 Cscript.exe)。

WSH 诞生后,在 Windows 系列产品中很快得到了推广。除 Windows 98 外,微软在 Internet Information Server 4.0、Windows Me、Windows 2000 Server,以及 Windows 2000 Professional 等产品中都嵌入了 WSH。现在,早期的 Windows 95 也可单独安装相应版本的 WSH。(附:各种版本 WSH 的安装程序可以从 http://msdn.microsoft.com/scripting 站点下载)。

二、WSH 有什么用?

WSH 的设计,在很大程度上考虑到了“非交互性脚本(noninteractive scripting)”的需要。在这一指导思想下产生的 WSH,给脚本带来非常强大的功能,例如:我们可以利用它完成映射网络驱动器、检索及修改环境变量、处理注册表项等工作;管理员还可以使用 WSH 的支持功能来创建简单的登陆脚本,甚至可以编写脚本来管理活动目录。

而事实上,上述功能的实现,均与 WSH 内置的多个对象密切相关,这些内置对象肩负着直接处理脚本指令的重任。因此,我们也可以通过了解 WSH 的内置对象来探寻 WSH 可以实现的功能。

图 1 是 WSH 的内置对象构成情况。



(图1)
从图中我们可以看出,WSH 共有 14 个内置对象,它们各自有着明确分工。具体而言,位于最底部的 Wscript ,主要作用是提取命令行变量,确定脚本文件名,确定 WSH 执行文件名(wscript.exe 还是 cscript.exe),确认 host 版本信息,创建、关连及分离 COM 对象,写入事件,按程序结束一个脚本文件的运行,向默认的输出设备(如对话框、命令行)输出信息等;WshArguments 的作用是获取全部的命令行变量; WshNamed 负责获取指定的命令行参数集;WshUnnamed 负责获取未经指定的命令行参数集;WshNetwork 的主要作用是开放或关闭网络共享,连接或断开网络打印机,映射或取消网络中的共享,获取当前登陆用户的信息;WshController 可以创建一个远程脚本对象;WshRemote 可以实现网络中对计算机系统的远程管理,也可按计划对其它程序/脚本进行处理;WshRemote Error 的作用在于:当一个远程脚本(WshRemote 对象)因脚本错误而终止时,获取可用的错误信息;WshShell 主要负责程序的本地运行,处理注册表项、创建快捷方式、获取系统文件夹信息,处理环境变量;WshShortcut 主要用于按计划创建快捷方式;WshSpecialfolders 用于获取任意一个 Windows 特殊文件夹的信息;WshURLShortcut 用于按程序要求创建进入互联网资源的快捷方式;WshEnvironment 用于获取任意的环境变量(如 WINDIR, PATH, 或 PROMPT);WshScriptExec 用于确定一个脚本文件的运行状态及错误信息。

在这些内置对象的帮助下,我们就可以利用 WSH 充分发挥 VBScript 及 JScript 等脚本的强大威力,极大地提高我们的工作效率。

标签:


Intel unveils new chip sets at Computex show

June 3, 2008 (Computerworld) Intel Corp. today unveiled new chip sets for desktop PCs at the Computex trade show in Taiwan.

Sean Maloney, executive vice president of Intel, made the announcement during a keynote address at the conference Tuesday. The Intel 4 Series chip sets, which include the G45, G43, P45 and P43, will be used with the 45 nanometer Intel Core 2 Duo and Intel Core 2 Quad processors.

"The Internet is going high-def," Maloney said during his keynote. "Desktop PCs with these new chip sets let you enjoy, share and protect your digital life. They have the processing power and graphics to deliver stutter-free HD video playback, improved 3-D performance and leading storage capabilities."

Maloney noted that people increasingly are looking to be able to store all of their high-definition videos, photographs, music and games in one place — a central library — and be able to access that entertainment and data library from small mobile Internet devices while they're on the go.

The new Intel G45 Express chip set sports the updated Intel Graphics Media Accelerator X4500HD and is designed to deliver strong visual performance and quality. According to the company, it's the first Intel platform to integrate complete hardware high-definition pipelines for Blu-ray and other HD content playback. It's also the first Intel platform to post-process HD content for improved visual quality.

The Intel G43 Express chip set is designed to deliver strong graphics for everyday computing. It uses Intel Clear Video Technology for HD playback and also has an enhanced 3-D graphics engine with full support of Microsoft Windows Vista Premium.

A chip set is a group of integrated chips or circuits that are designed to work together. Often sold as a single product, chip sets are designed to work with a main processor.

Just last week, Intel confirmed that a problem with its integrated graphics chip set had forced the company to postpone the launch of its new Centrino 2 laptop system.

The company said that its Centrino 2 mobile platform, code-named Montevina, is being pushed back from a scheduled release in June to a partial release in July and a more expansive release in August. The new mobile processor and at least one chip set is now set to ship on July 14, according to Patrick Ward, an Intel spokesman. Wireless components and all the accompanying chip sets are slated to ship in August.

标签:


This page is powered by Blogger. Isn't yours?

订阅 博文 [Atom]