Posts

Compiling Linux kernel modules

Image
Compiling kernel modules (this writing is with Ubuntu distro) ============================== 1) Getting Linux (simple way) get any Linux distribution(for beginners i recommend Ubuntu which is easy for install) 1.1) if you are running Windows and want learn Linux the best way is to begin with Virtualized linux with Vmawre player you can get Vmware player from http://www.vmware.com/vmwarestore/ by creating user account 1 .2) download Vmware player(it is free) and install under windows. download linux image(.iso image) of your choice distribution; if you choose Ubuntu image it can downloaded from http://www.ubuntu.com/download/ubuntu/download 1.3) install Linux with Vmware player once you install vmware player and run it you will see option shown in below picture; select option create new virtual machine to install Linux once you choose create new virtual machine you find below screen use the browse option and select the Linux imag e downloaded(place where...

C Program to get day, date and time @linux

/*  * Program to get day, date  and time details  */   #include #include int main() {  time_t t;  char  buf[80];  struct tm *ts;  t=time(0);  ts= localtime(&t);  strftime(buf, sizeof(buf),  "%a %Y-%m-%d %H:%M:%S %Z", ts);  printf("The day, date and  time %s\n", buf);  return 0; } output : The day, date and  time  Mon 2011-08-22 01:54:28 PDT

Kind of malware and Names for malicious code

We commonly come across the security issues while using PC/Smart phones, we commonly call it as virus attack. here is gist of few terms(very few) what are the terms used to explain kind of threats malicious code(malware) is mainly classified based on the ability to self replicate i.e. 1) Self replicating malware          example: Virus, Worms       2) Non-self replicating malware          example: Trojan horse Non-replicating malware typically hide their presence on computer or its malicious function We call as Virus if it attaches to itself to running program and start creating damage to victim, it depends on the execution of the  host program,  at some point of execution Virus hijacks execution of running program and executes the malicious code, which could create panic or cause damage to victim we call as Worm  is program , it will look for victim(computer which is not protected) through network ...

App for turning phone to hacking tool

Android App called “Anti” is designed and developed by an Israeli security firm called Zimperium Anti is kind of Android Network Toolkit. it seems it is collection hacking tools available to test smartphones. full story is available at http://www.itnext.in/content/android-app-turn-your-phone-hacking-tool.html?utm_source=newsletter-core&utm_medium=email&utm_campaign=20110809 courtesy IT NEXT

Know tracers mostly available at Linux

following are the tracers can be used for performance tuning and debugging in Linux 1) strace -- system call tracer 2) ltrace -- library tracer 3) ptrace -- Process tracer 4) ktrace -- kernel tracer originally developed for BSD, it has better performance than strace 5) dtrace -- dynamic tracer (hopefully ) can be used to tune both kernel and user application originally developed for Solaris 6) ftrace -- some times called as function tracer 7) btrace -- it is dynamic tracing tool for the Java programs and it is used for debugging java programs 8) xtrace -- is used for X server, it is for displaying the communication between the clients and the server in an human readable form 9) rtrace -- is a program for image synthesis by the ray tracing method; rtrace traces rays from the standard input through the RADIANCE scene given by octree and sends the results to the standard output 10) mtrace -- in Linux, The mtrace interprets the output from when the MALLOC_TRACE environ...

List of bootloaders available on Unix like OS

following are the commonly found boot loaders on Unix like OS 1) U boot (universal boot loader) - choice for Embedded Linux 2) GRUB (GNU Grand unified boot loader) - usually it is used with Debian distro of linux 3) LILO (LInux Loader) - usually it is used with Redhat distro and its derivatives 4) BTX (boot extender ) - is for Free BSD and dragonfly BSD 5) SILO (SPARC improved bootLoader) is mostly used for Solaris 6) NTLDR - boot loader for windows NT 7) elilo - is the standard Linux boot loader for EFI-based( Extensible Firmware Interface ) PC hardware few other bootloaders --------------------- PALO (PA/Linux LOader) Bootman (first bootman appeared in BeOS R4.0,)

Multi processors notes

symmetric multiprocessors In which each processor runs an identical copy of the operating system - all processors are peers - no master slave relation exists between processors asymmetric multiprocessors ( master slave model) - In which each processor is assigned a specific task - this scheme defines a master slave relationship Real time Systems ===== ======== - It is special purpose operating system - It is used when rigid time requirements have been placed on the operation of a processor or the flow of data - real time system has well defined, fixed time constraints, processing must be done within the defined constraints else the system fails they can be classified as Soft and Hard ----------------------------------------- HARD ===== Guarantees that critical tasks be completed on time delay in system must be bounded secondary storage of any kind is minimal(limited) or missing most advanced feature of OS will not be supported(ex: virtual memory) None of the existing General purpose ...